Show filters
555 Total Results
Displaying 91-100 of 555
Sort by:
Attacker Value
Unknown

CVE-2022-30580

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.
Attacker Value
Unknown

CVE-2022-33725

Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A vulnerability using PendingIntent in Knox VPN prior to SMR Aug-2022 Release 1 allows attackers to access content providers with system privilege.
Attacker Value
Unknown

CVE-2022-33721

Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A vulnerability using PendingIntent in DeX for PC prior to SMR Aug-2022 Release 1 allows attackers to access files with system privilege.
Attacker Value
Unknown

CVE-2022-2636

Disclosure Date: August 05, 2022 (last updated February 24, 2025)
Improper Control of Generation of Code ('Code Injection') in GitHub repository hestiacp/hestiacp prior to 1.6.6.
Attacker Value
Unknown

CVE-2022-37396

Disclosure Date: August 03, 2022 (last updated February 24, 2025)
In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution
Attacker Value
Unknown

CVE-2022-34625

Disclosure Date: August 02, 2022 (last updated February 24, 2025)
Mealie1.0.0beta3 was discovered to contain a Server-Side Template Injection vulnerability, which allows attackers to execute arbitrary code via a crafted Jinja2 template.
Attacker Value
Unknown

CVE-2022-30083

Disclosure Date: July 30, 2022 (last updated February 24, 2025)
EllieGrid Android Application version 3.4.1 is vulnerable to Code Injection. The application appears to evaluate user input as code (remote).
Attacker Value
Unknown

CVE-2022-36799

Disclosure Date: July 29, 2022 (last updated February 24, 2025)
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.
Attacker Value
Unknown

CVE-2022-37009

Disclosure Date: July 28, 2022 (last updated February 24, 2025)
In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible
Attacker Value
Unknown

CVE-2022-35649

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.