Vulnerabilities (CVE)

Filtered by CWE-94
Total 4646 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34456 1 Dell 1 Emc Metro Node 2024-11-21 N/A 8.8 HIGH
Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.
CVE-2022-32897 1 Apple 1 Macos 2024-11-21 N/A 7.8 HIGH
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution.
CVE-2022-32417 1 Pbootcms 1 Pbootcms 2024-11-21 7.5 HIGH 9.8 CRITICAL
PbootCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the function parserIfLabel at function.php.
CVE-2022-30580 1 Golang 1 Go 2024-11-21 N/A 7.8 HIGH
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.
CVE-2022-30083 1 Elliegrid 1 Elliegrid 2024-11-21 N/A 9.8 CRITICAL
EllieGrid Android Application version 3.4.1 is vulnerable to Code Injection. The application appears to evaluate user input as code (remote).
CVE-2022-2636 1 Hestiacp 1 Control Panel 2024-11-21 N/A 8.5 HIGH
Improper Control of Generation of Code ('Code Injection') in GitHub repository hestiacp/hestiacp prior to 1.6.6.
CVE-2022-2073 1 Getgrav 1 Grav 2024-11-21 6.5 MEDIUM 7.2 HIGH
Code Injection in GitHub repository getgrav/grav prior to 1.7.34.
CVE-2022-2054 1 Nuitka 1 Nuitka 2024-11-21 7.2 HIGH 8.4 HIGH
Code Injection in GitHub repository nuitka/nuitka prior to 0.9.
CVE-2022-2014 1 Diagrams 1 Drawio 2024-11-21 3.5 LOW 5.4 MEDIUM
Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.
CVE-2022-29821 1 Jetbrains 1 Pycharm 2024-11-21 4.4 MEDIUM 6.9 MEDIUM
In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible
CVE-2022-29819 1 Jetbrains 1 Intellij Idea 2024-11-21 4.4 MEDIUM 6.9 MEDIUM
In JetBrains IntelliJ IDEA before 2022.1 local code execution via links in Quick Documentation was possible
CVE-2022-29815 1 Jetbrains 1 Intellij Idea 2024-11-21 4.6 MEDIUM 6.9 MEDIUM
In JetBrains IntelliJ IDEA before 2022.1 local code execution via workspace settings was possible
CVE-2022-29814 1 Jetbrains 1 Intellij Idea 2024-11-21 4.4 MEDIUM 6.9 MEDIUM
In JetBrains IntelliJ IDEA before 2022.1 local code execution via HTML descriptions in custom JSON schemas was possible
CVE-2022-29813 1 Jetbrains 1 Intellij Idea 2024-11-21 4.6 MEDIUM 6.9 MEDIUM
In JetBrains IntelliJ IDEA before 2022.1 local code execution via custom Pandoc path was possible
CVE-2022-29307 1 Ionizecms 1 Ionize 2024-11-21 7.5 HIGH 9.8 CRITICAL
IonizeCMS v1.0.8.1 was discovered to contain a command injection vulnerability via the function copy_lang_content in application/models/lang_model.php.
CVE-2022-29221 3 Debian, Fedoraproject, Smarty 3 Debian Linux, Fedora, Smarty 2024-11-21 6.5 MEDIUM 8.8 HIGH
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
CVE-2022-29216 1 Google 1 Tensorflow 2024-11-21 4.6 MEDIUM 7.8 HIGH
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not severe. The maintainers have now removed the `safe=False` argument, so all parsing is done without calling `eval`. The patch is available in versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4.
CVE-2022-29171 1 Sourcegraph 1 Sourcegraph 2024-11-21 6.0 MEDIUM 6.6 MEDIUM
Sourcegraph is a fast and featureful code search and navigation engine. Versions before 3.38.0 are vulnerable to Remote Code Execution in the gitserver service. The Gitolite code host integration with Phabricator allows Sourcegraph site admins to specify a `callsignCommand`, which is used to obtain the Phabricator metadata for a Gitolite repository. An administrator who is able to edit or add a Gitolite code host and has administrative access to Sourcegraph’s bundled Grafana instance can change this command arbitrarily and run it remotely. This grants direct access to the infrastructure underlying the Sourcegraph installation. The attack requires: site-admin privileges on the instance of Sourcegraph, Administrative privileges on the bundled Grafana monitoring instance, Knowledge of the gitserver IP address or DNS name (if running in Kubernetes). This can be found through Grafana. The issue is patched in version 3.38.0. You may disable Gitolite code hosts. We still highly encourage upgrading regardless of workarounds.
CVE-2022-29078 1 Ejs 1 Ejs 2024-11-21 7.5 HIGH 9.8 CRITICAL
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
CVE-2022-26982 1 Simplemachines 1 Simple Machines Forum 2024-11-21 6.5 MEDIUM 7.2 HIGH
** DISPUTED ** SimpleMachinesForum 2.1.1 and earlier allows remote authenticated administrators to execute arbitrary code by inserting a vulnerable php code because the themes can be modified by an administrator. NOTE: the vendor's position is that administrators are intended to have the ability to modify themes, and can thus choose any PHP code that they wish to have executed on the server.