Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-2054

Summary
Assigner-@huntrdev
Assigner Org ID-c09c270a-b464-47c1-9133-acb35b22c19a
Published At-12 Jun, 2022 | 13:55
Updated At-03 Aug, 2024 | 00:24
Rejected At-
Credits

Code Injection in nuitka/nuitka

Code Injection in GitHub repository nuitka/nuitka prior to 0.9.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:@huntrdev
Assigner Org ID:c09c270a-b464-47c1-9133-acb35b22c19a
Published At:12 Jun, 2022 | 13:55
Updated At:03 Aug, 2024 | 00:24
Rejected At:
▼CVE Numbering Authority (CNA)
Code Injection in nuitka/nuitka

Code Injection in GitHub repository nuitka/nuitka prior to 0.9.

Affected Products
Vendor
nuitka
Product
nuitka/nuitka
Default Status
unaffected
Versions
Affected
  • From unspecified before 0.9 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-94CWE-94 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Type: CWE
CWE ID: CWE-94
Description: CWE-94 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Metrics
VersionBase scoreBase severityVector
3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
x_refsource_CONFIRM
https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
x_refsource_MISC
Hyperlink: https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
x_refsource_CONFIRM
x_transferred
https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
x_refsource_MISC
x_transferred
Hyperlink: https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@huntr.dev
Published At:12 Jun, 2022 | 14:15
Updated At:02 Aug, 2023 | 09:15

Code Injection in GitHub repository nuitka/nuitka prior to 0.9.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.18.4HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

nuitka
nuitka
>>nuitka>>Versions before 0.9(exclusive)
cpe:2.3:a:nuitka:nuitka:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarysecurity@huntr.dev
CWE-94Secondarynvd@nist.gov
CWE ID: CWE-94
Type: Primary
Source: security@huntr.dev
CWE ID: CWE-94
Type: Secondary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcadsecurity@huntr.dev
Patch
Third Party Advisory
https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7security@huntr.dev
Exploit
Patch
Third Party Advisory
Hyperlink: https://github.com/nuitka/nuitka/commit/09647745d7cbb6ff32f9fa948f19d5558b32bcad
Source: security@huntr.dev
Resource:
Patch
Third Party Advisory
Hyperlink: https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
Source: security@huntr.dev
Resource:
Exploit
Patch
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

101Records found

CVE-2021-41228
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.48%
||
7 Day CHG~0.00%
Published-05 Nov, 2021 | 22:25
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code injection in `saved_model_cli`

TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it calls `eval` on user supplied strings. This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs. However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-3695
Matching Score-4
Assigner-SUSE
ShareView Details
Matching Score-4
Assigner-SUSE
CVSS Score-8.4||HIGH
EPSS-0.12% / 31.28%
||
7 Day CHG~0.00%
Published-03 Mar, 2020 | 11:05
Updated-16 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
pcp: Local privilege escalation from user pcp to root

A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools 15, SUSE Linux Enterprise Module for Development Tools 15-SP1, SUSE Linux Enterprise Module for Open Buildservice Development Tools 15, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15, SUSE Linux Enterprise Software Development Kit 12-SP4, SUSE Linux Enterprise Software Development Kit 12-SP5; openSUSE Leap 15.1 allows the user pcp to run code as root by placing it into /var/log/pcp/configs.sh This issue affects: SUSE Linux Enterprise High Performance Computing 15-ESPOS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise High Performance Computing 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Module for Development Tools 15-SP1 pcp versions prior to 4.3.1-3.5.3. SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server 15-LTSS pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Server for SAP 15 pcp versions prior to 3.11.9-5.8.1. SUSE Linux Enterprise Software Development Kit 12-SP4 pcp versions prior to 3.11.9-6.14.1. SUSE Linux Enterprise Software Development Kit 12-SP5 pcp versions prior to 3.11.9-6.14.1. openSUSE Leap 15.1 pcp versions prior to 4.3.1-lp151.2.3.1.

Action-Not Available
Vendor-openSUSESUSE
Product-linux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_high_performance_computingpcpleapSUSE Linux Enterprise High Performance Computing 15-LTSSSUSE Linux Enterprise High Performance Computing 15-ESPOSSUSE Linux Enterprise Software Development Kit 12-SP4SUSE Linux Enterprise Software Development Kit 12-SP5openSUSE Leap 15.1SUSE Linux Enterprise Module for Development Tools 15-SP1SUSE Linux Enterprise Module for Open Buildservice Development Tools 15SUSE Linux Enterprise Server 15-LTSSSUSE Linux Enterprise Module for Development Tools 15SUSE Linux Enterprise Server for SAP 15
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-4000
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.71%
||
7 Day CHG~0.00%
Published-25 Feb, 2020 | 20:28
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.

Action-Not Available
Vendor-druvan/aApple Inc.
Product-macosinsyncDruva inSync Mac OS Client
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2003-0498
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 34.39%
||
7 Day CHG~0.00%
Published-04 Jul, 2003 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Caché Database 5.x installs the /cachesys/csp directory with insecure permissions, which allows local users to execute arbitrary code by adding server-side scripts that are executed with root privileges.

Action-Not Available
Vendor-intersystemsn/a
Product-cache_databasen/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-40671
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.09%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 17:25
Updated-17 Dec, 2024 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DevmemIntChangeSparse2 of devicemem_server.c, there is a possible way to achieve arbitrary code execution due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-862
Missing Authorization
CVE-2024-37855
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.74% / 71.87%
||
7 Day CHG~0.00%
Published-25 Jun, 2024 | 00:00
Updated-02 Aug, 2024 | 03:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Nepstech Wifi Router xpon (terminal) NTPL-Xpon1GFEVN, hardware verstion 1.0 firmware 2.0.1 allows a remote attacker to execute arbitrary code via the router's Telnet port 2345 without requiring authentication credentials.

Action-Not Available
Vendor-n/anepstech
Product-n/antpl-xpon1gfevn_firmware
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-33228
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.17% / 38.18%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 15:23
Updated-13 Feb, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the component segwindrvx64.sys of Insyde Software Corp SEG Windows Driver v100.00.07.02 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests.

Action-Not Available
Vendor-n/aInsyde Software Corp. (ISC)
Product-n/aseg_windows_driver
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-30963
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.48%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 00:00
Updated-06 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via a crafted script.

Action-Not Available
Vendor-n/aopen_robotics
Product-n/aros2_navigation2ros2_humblenav2_humble
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-30964
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.08%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 00:00
Updated-06 Dec, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the initial_pose_sub thread created by nav2_bt_navigator

Action-Not Available
Vendor-n/aopen_robotics
Product-n/aros2_navigation2ros2_humblenav2_humble
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-47896
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-5||MEDIUM
EPSS-0.00% / 0.04%
||
7 Day CHG~0.00%
Published-22 Dec, 2022 | 10:25
Updated-15 Apr, 2025 | 13:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains IntelliJ IDEA before 2022.3.1 code Templates were vulnerable to SSTI attacks.

Action-Not Available
Vendor-JetBrains s.r.o.
Product-intellij_ideaIntelliJ IDEA
CWE ID-CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-3661
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-8.4||HIGH
EPSS-1.49% / 80.25%
||
7 Day CHG~0.00%
Published-21 Nov, 2022 | 21:19
Updated-29 Apr, 2025 | 05:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential security vulnerability has been identified in certain HP Workstation BIOS (UEFI firmware) which may allow arbitrary code execution. HP is releasing firmware mitigations for the potential vulnerability.

Action-Not Available
Vendor-HP Inc.
Product-z2_tower_g5z240_small_form_factorz2_mini_g3_firmwarez840z2_small_form_factor_g4z2_small_form_factor_g8_firmwarezcentral_4r_firmwarez4_g4z2_tower_g4_firmwarez440z2_mini_g3z240_towerz840_firmwarez238_microtower_firmwarezcentral_4rz440_firmwarez2_tower_g5_firmwarez2_mini_g4z8_g4z238_microtowerz2_small_form_factor_g8z2_mini_g4_firmwarez2_mini_g5_firmwarez2_mini_g5z240_small_form_factor_firmwarez6_g4_firmwarez6_g4z240_tower_firmwarez640z640_firmwarez8_g4_firmwarez2_tower_g8_firmwarez2_tower_g8z4_g4_firmwarez2_small_form_factor_g5_firmwarez1_all-in-one_g3z2_small_form_factor_g4_firmwarez2_small_form_factor_g5z1_all-in-one_g3_firmwarez2_tower_g4HP Workstation BIOS
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-30202
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.49%
||
7 Day CHG~0.00%
Published-25 Mar, 2024 | 00:00
Updated-01 May, 2025 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.

Action-Not Available
Vendor-n/aGNU
Product-emacsorg_moden/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-29513
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.64%
||
7 Day CHG+0.02%
Published-13 May, 2024 | 19:32
Updated-13 Feb, 2025 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in briscKernelDriver.sys in BlueRiSC WindowsSCOPE Cyber Forensics before 3.3 allows a local attacker to execute arbitrary code within the driver and create a local denial-of-service condition due to an improper DACL being applied to the device the driver creates.

Action-Not Available
Vendor-n/abluerisc
Product-n/awindowscope
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-28699
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.49%
||
7 Day CHG~0.00%
Published-22 Apr, 2024 | 00:00
Updated-02 Aug, 2024 | 00:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability in pdf2json v0.70 allows a local attacker to execute arbitrary code via the GString::copy() and ImgOutputDev::ImgOutputDev function.

Action-Not Available
Vendor-n/ajson
Product-n/apdf2json
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-25376
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.21%
||
7 Day CHG~0.00%
Published-11 Apr, 2024 | 00:00
Updated-17 Jun, 2025 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.

Action-Not Available
Vendor-thesyconn/athesycon
Product-tusbaudion/akg_tusbaudio_msi_based_installers
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-33225
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.72%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 15:15
Updated-13 Feb, 2025 | 15:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the component RTKVHD64.sys of Realtek Semiconductor Corp Realtek(r) High Definition Audio Function Driver v6.0.9549.1 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests.

Action-Not Available
Vendor-n/aDell Inc.
Product-n/arealtek_high_definition_audio_driver
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-41576
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.68%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-14 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-30961
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.18% / 40.28%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 00:00
Updated-18 Dec, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the error-thrown mechanism in nav2_bt_navigator.

Action-Not Available
Vendor-openroboticsn/a
Product-robot_operating_systemn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-30962
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.16% / 37.69%
||
7 Day CHG+0.01%
Published-05 Dec, 2024 | 00:00
Updated-09 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer Overflow vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the nav2_amcl process

Action-Not Available
Vendor-openroboticsn/aopen_robotics
Product-robot_operating_systemn/aros2_navigation2ros2_humblenav2_humble
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2024-13861
Matching Score-4
Assigner-Sophos Limited
ShareView Details
Matching Score-4
Assigner-Sophos Limited
CVSS Score-7.8||HIGH
EPSS-0.02% / 2.26%
||
7 Day CHG~0.00%
Published-11 Apr, 2025 | 12:41
Updated-07 May, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection vulnerability in the Debian package component of Taegis Endpoint Agent (Linux) versions older than 1.3.10 allows local users arbitrary code execution as root. Redhat-based systems using RPM packages are not affected.

Action-Not Available
Vendor-Debian GNU/LinuxSophos Ltd.
Product-debian_linuxtaegis_endpoint_agentTaegis Endpoint Agent (Linux)
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-37396
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-4.1||MEDIUM
EPSS-0.00% / 0.01%
||
7 Day CHG~0.00%
Published-03 Aug, 2022 | 15:40
Updated-03 Aug, 2024 | 10:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains Rider before 2022.2 Trust and Open Project dialog could be bypassed, leading to local code execution

Action-Not Available
Vendor-JetBrains s.r.o.
Product-riderRider
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-37009
Matching Score-4
Assigner-JetBrains s.r.o.
ShareView Details
Matching Score-4
Assigner-JetBrains s.r.o.
CVSS Score-3.9||LOW
EPSS-0.00% / 0.16%
||
7 Day CHG~0.00%
Published-28 Jul, 2022 | 10:25
Updated-03 Aug, 2024 | 10:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains IntelliJ IDEA before 2022.2 local code execution via a Vagrant executable was possible

Action-Not Available
Vendor-JetBrains s.r.o.
Product-intellij_ideaIntelliJ IDEA
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-36036
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-3.6||LOW
EPSS-0.05% / 15.80%
||
7 Day CHG~0.00%
Published-29 Aug, 2022 | 17:20
Updated-22 Apr, 2025 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Control of Generation of Code ('Code Injection') in mdx-mermaid

mdx-mermaid provides plug and play access to Mermaid in MDX. There is a potential for an arbitrary javascript injection in versions less than 1.3.0 and 2.0.0-rc1. Modify any mermaid code blocks with arbitrary code and it will execute when the component is loaded by MDXjs. This vulnerability was patched in version(s) 1.3.0 and 2.0.0-rc2. There are currently no known workarounds.

Action-Not Available
Vendor-mdx-mermaid_projectsjwall
Product-mdx-mermaidmdx-mermaid
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-24520
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.54%
||
7 Day CHG~0.00%
Published-29 Feb, 2024 | 00:00
Updated-01 May, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Lepton CMS v.7.0.0 allows a local attacker to execute arbitrary code via the upgrade.php file in the languages place.

Action-Not Available
Vendor-lepton-cmsn/alepton-cms
Product-leptoncmsn/aleptoncms
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-23727
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-1.16% / 77.71%
||
7 Day CHG~0.00%
Published-28 Mar, 2024 | 00:00
Updated-27 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The YI Smart Kami Vision com.kamivision.yismart application through 1.0.0_20231219 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.

Action-Not Available
Vendor-n/akamivision
Product-n/ayi_iot
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-21892
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.84%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 01:31
Updated-30 Apr, 2025 | 22:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Linux Kernel Organization, Inc
Product-node.jslinux_kernelNodenode.js
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-22117
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.99%
||
7 Day CHG~0.00%
Published-18 May, 2021 | 12:47
Updated-02 Apr, 2025 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Broadcom Inc.Microsoft Corporation
Product-rabbitmq_serverwindowsRabbitMQ
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2013-3200
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-0.45% / 62.58%
||
7 Day CHG~0.00%
Published-09 Oct, 2013 | 14:44
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The USB drivers in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allow physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_rtwindows_7windows_8windows_server_2008windows_vistawindows_server_2003windows_server_2012windows_xpn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-37274
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.6||HIGH
EPSS-0.06% / 18.27%
||
7 Day CHG~0.00%
Published-13 Jul, 2023 | 22:33
Updated-30 Oct, 2024 | 15:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Python code execution sandbox escape in non-docker version in Auto-GPT

Auto-GPT is an experimental open-source application showcasing the capabilities of the GPT-4 language model. When Auto-GPT is executed directly on the host system via the provided run.sh or run.bat files, custom Python code execution is sandboxed using a temporary dedicated docker container which should not have access to any files outside of the Auto-GPT workspace directory. Before v0.4.3, the `execute_python_code` command (introduced in v0.4.1) does not sanitize the `basename` arg before writing LLM-supplied code to a file with an LLM-supplied name. This allows for a path traversal attack that can overwrite any .py file outside the workspace directory by specifying a `basename` such as `../../../main.py`. This can further be abused to achieve arbitrary code execution on the host running Auto-GPT by e.g. overwriting autogpt/main.py which will be executed outside of the docker environment meant to sandbox custom python code execution the next time Auto-GPT is started. The issue has been patched in version 0.4.3. As a workaround, the risk introduced by this vulnerability can be remediated by running Auto-GPT in a virtual machine, or another environment in which damage to files or corruption of the program is not a critical problem.

Action-Not Available
Vendor-agptSignificant-Gravitas
Product-auto-gptAuto-GPT
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2019-0091
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.71%
||
7 Day CHG~0.00%
Published-17 May, 2019 | 15:41
Updated-04 Aug, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-converged_security_and_management_enginetrusted_execution_technologyIntel(R) Converged Security & Management Engine (CSME), Intel (R) Trusted Execution Engine Interface (TXE)
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-0521
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-9.3||CRITICAL
EPSS-0.08% / 24.83%
||
7 Day CHG~0.00%
Published-20 Jan, 2024 | 20:24
Updated-30 May, 2025 | 14:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection in paddlepaddle/paddle

Code Injection in paddlepaddle/paddle

Action-Not Available
Vendor-paddlepaddlepaddlepaddle
Product-paddlepaddlepaddle/paddle
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-6691
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.16%
||
7 Day CHG~0.00%
Published-18 Dec, 2023 | 17:52
Updated-02 Aug, 2024 | 08:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection vulnerability in Cambium ePMP Force 300-25

Cambium ePMP Force 300-25 version 4.7.0.1 is vulnerable to a code injection vulnerability that could allow an attacker to perform remote code execution and gain root privileges.

Action-Not Available
Vendor-cambiumnetworksCambium
Product-epmp_force_300-25epmp_force_300-25_firmwareePMP Force 300-25
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-6288
Matching Score-4
Assigner-Devolutions Inc.
ShareView Details
Matching Score-4
Assigner-Devolutions Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.44%
||
7 Day CHG~0.00%
Published-06 Dec, 2023 | 13:49
Updated-02 Aug, 2024 | 08:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on macOS allows an attacker to execute code via the DYLIB_INSERT_LIBRARIES environment variable.

Action-Not Available
Vendor-Apple Inc.Devolutions
Product-remote_desktop_managermacosRemote Desktop Manager
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2000-0155
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-1.72% / 81.63%
||
7 Day CHG~0.00%
Published-23 Feb, 2000 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_98windows_ntwindows_95n/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-5623
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7||HIGH
EPSS-0.06% / 17.74%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 16:25
Updated-09 Sep, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation

NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location

Action-Not Available
Vendor-Tenable, Inc.
Product-nessus_network_monitorNessus Network Monitornessus_network_monitor
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-45271
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.4||HIGH
EPSS-0.11% / 30.75%
||
7 Day CHG+0.07%
Published-15 Oct, 2024 | 10:27
Updated-26 Aug, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MB connect line/Helmholz: Remote code execution due to improper input validation

An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.

Action-Not Available
Vendor-helmholzmbconnectlineHelmholzMB connect linerex100mb_connect_line
Product-mbnet.minirex_100_firmwarerex_100mbnet.mini_firmwareREX100mbNET.minimbnet.minihelmholz
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-29216
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.15% / 35.67%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 23:35
Updated-22 Apr, 2025 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code injection in `saved_model_cli` in TensorFlow

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not severe. The maintainers have now removed the `safe=False` argument, so all parsing is done without calling `eval`. The patch is available in versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4.

Action-Not Available
Vendor-Google LLCTensorFlow
Product-tensorflowtensorflow
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23315
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-26 Aug, 2025 | 18:30
Updated-26 Aug, 2025 | 19:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NeMo Framework for all platforms contains a vulnerability in the export and deploy component, where malicious data created by an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NeMo Framework
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23313
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-26 Aug, 2025 | 18:30
Updated-26 Aug, 2025 | 19:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP component, where malicious data created by an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NeMo Framework
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23314
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-26 Aug, 2025 | 18:30
Updated-26 Aug, 2025 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP component, where malicious data created by an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NeMo Framework
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23307
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-26 Aug, 2025 | 18:25
Updated-26 Aug, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NeMo Curator for all platforms contains a vulnerability where a malicious file created by an attacker could allow code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NVIDIA NeMo Curator
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-23312
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-Not Assigned
Published-26 Aug, 2025 | 18:29
Updated-26 Aug, 2025 | 19:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA NeMo Framework for all platforms contains a vulnerability in the retrieval services component, where malicious data created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-NeMo Framework
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-48699
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.4||HIGH
EPSS-0.64% / 69.64%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 22:25
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
fastbots Eval Injection vulnerability

fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function `def __locator__(self, locator_name: str)` in `page.py`. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above.

Action-Not Available
Vendor-ubertidavideubertidavide
Product-fastbotsfastbots
CWE ID-CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-49314
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-9.42% / 92.47%
||
7 Day CHG~0.00%
Published-28 Nov, 2023 | 00:00
Updated-26 Nov, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack.

Action-Not Available
Vendor-asanan/aApple Inc.
Product-desktopmacosn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-48192
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.11% / 30.18%
||
7 Day CHG~0.00%
Published-20 Nov, 2023 | 00:00
Updated-02 Aug, 2024 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in TOTOlink A3700R v.9.1.2u.6134_B20201202 allows a local attacker to execute arbitrary code via the setTracerouteCfg function.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3700ra3700r_firmwaren/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2023-36923
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-7.8||HIGH
EPSS-0.06% / 20.28%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 00:36
Updated-10 Oct, 2024 | 19:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection vulnerability in SAP PowerDesigner

SAP SQLA for PowerDesigner 17 bundled with SAP PowerDesigner 16.7 SP06 PL03, allows an attacker with local access to the system, to place a malicious library, that can be executed by the application. An attacker could thereby control the behavior of the application.

Action-Not Available
Vendor-SAP SE
Product-powerdesignerSAP PowerDesigner
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-27537
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.26% / 48.93%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 21:26
Updated-27 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate these potential vulnerabilities.

Action-Not Available
Vendor-HP Inc.
Product-eliteone_1000_g1_23.8-in_all-in-one_business_firmwareprodesk_400_g4_microtower_firmwarez2_mini_g4_workstationelitebook_x360_1040_g7_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businesselitebook_845_g8_firmwarezhan_66_pro_15_g2_firmwareelitedesk_800_g6_desktop_miniprobook_x360_11_g7_eeprobook_430_g7elitebook_865_g9elitebook_x360_1030_g7_firmwareelitedesk_800_g5_desktop_minielitebook_735_g6_firmwareelitebook_x360_1030_g4_firmwareelitebook_840_g9_firmwarezhan_66_pro_13_g2probook_430_g8probook_440_g8elitebook_755_g5_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwarezbook_17_g6zbook_firefly_15_g7engage_flex_pro_retail_systemz2_small_form_factor_g5_workstationzbook_firefly_14_g9elite_sliceprodesk_405_g6_small_form_factorelitedesk_705_g4_small_form_factorprobook_445r_g6_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareeliteone_800_g8_27_all-in-oneelitebook_630_g9_firmwareelitedesk_800_g6_small_form_factor_firmwareprodesk_480_g4_microtowerproone_440_g6_24_all-in-one_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprodesk_400_g4_desktop_miniproone_600_g3_21.5-inch_non-touch_all-in-oneelitebook_1040_g3elitebook_735_g5elitedesk_880_g6_towerelitedesk_800_g8_tower_firmwareprobook_640_g4_firmwareelitedesk_800_65w_g3_desktop_mini_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwarezbook_studio_g7_firmwareprodesk_680_g4_microtower_firmwareprodesk_680_g6_firmwarezbook_power_g9zbook_power_g8pro_mini_400_g9elite_x2_1012_g1elitebook_835_g7_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onepro_mini_400_g9_firmwarezhan_66_pro_g3_24_all-in-one_firmwareproone_400_g6_24_all-in-oneproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_880_g3_towerzbook_studio_g9_firmwarezbook_studio_x360_g5_firmwareelitedesk_705_g3elitebook_830_g8_firmwarezhan_66_pro_g3_24_all-in-oneprobook_450_g8_firmwareprobook_650_g7elitebook_835_g9_firmwareprodesk_600_g2_desktop_mini_firmwareproone_600_g2_21.5-inch_non-touch_all-in-onemp9_g2_retail_system_firmwarez1_entry_tower_g5_workstation_firmwarepro_x360_fortis_g10prodesk_400_g6_small_form_factorprodesk_400_g4_small_form_factor_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitedesk_800_g3_tower_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businesselitedesk_805_g6_small_form_factor_firmwareprobook_x360_11_g7_ee_firmwarezbook_fury_15_g8_firmwareelite_tower_880_g9_firmwareengage_flex_pro_retail_system_firmwareelitedesk_880_g5_towerproone_400_g3_20-inch_non-touch_all-in-oneengage_flex_pro-c_retail_system_firmwareelitedesk_880_g5_tower_firmwareelitedesk_880_g3_tower_firmwareelitedesk_705_g5_desktop_mini_firmwareelite_dragonfly_g2engage_one_pro_aio_system_firmwarezbook_14u_g5elite_tower_680_g9probook_430_g7_firmwareelitedesk_800_g5_desktop_mini_firmwarezhan_66_pro_g3_22_all-in-oneelitebook_845_g9prodesk_680_g2_microtowerelitedesk_800_35w_g3_desktop_mini_firmwareprodesk_600_g5_desktop_mini_firmwareprobook_455_g6_firmwareprodesk_405_g8_desktop_mini_firmwareprobook_445_g8probook_445_g8_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwarez2_small_form_factor_g4_workstation_firmwareprodesk_600_g6_firmwareprobook_fortis_g9_firmwareelitebook_845_g7elitebook_645_g9zhan_66_pro_a_14_g3_firmwarepro_tower_400_g9_firmwareprodesk_480_g7_firmwareeliteone_800_g6_27_all-in-one_firmwareelitedesk_805_g8_desktop_mini_firmwareprodesk_405_g6_desktop_minielitebook_x360_1040_g6probook_455r_g6elite_dragonflyzhan_x_13_g2elitedesk_800_g5_tower_firmwareproone_600_g6_22_all-in-one_firmwarezhan_66_pro_14_g3z1_g9_tower_firmwareeliteone_800_g5_23.8-in_all-in-onepro_sff_400_g9_firmwarezbook_15u_g6probook_630_g8prodesk_600_g3_small_form_factorelitebook_830_g9elitedesk_800_g6_tower_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprodesk_480_g5_microtowerelitebook_840_g8_firmwareeliteone_1000_g2_34-in_curved_all-in-one_businessprobook_630_g8_firmwareelitebook_1030_g1_firmwareengage_one_pro_aio_systemprobook_x360_11_g3_eeelitebook_655_g9_firmwareprobook_455r_g6_firmwareprobook_x360_11_g6_eeelitedesk_800_g8_small_form_factorprodesk_600_g2_microtower_firmwareengage_go_mobile_systemelitebook_650_g9_firmwareprobook_640_g8_firmwareeliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprodesk_680_g3_microtower_firmwarez1_g8_towerprobook_455_g8probook_430_g5_firmwareelitedesk_705_g4_desktop_miniz1_entry_tower_g6_workstationzhan_66_pro_a_14_g5elite_x2_g4elitedesk_805_g8_small_form_factor_firmwareprodesk_405_g8_small_form_factorprobook_440_g9_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-oneelite_slice_firmwareprodesk_400_g6_desktop_mini_firmwarezbook_power_g7_firmwarezhan_66_pro_15_g3elitebook_745_g5elitedesk_800_g3_towerz2_tower_g5_workstation_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businesselite_sff_600_g9_firmwareprodesk_600_g3_microtower_firmwareprodesk_600_g4_microtower_firmwareproone_600_g2_21.5-inch_touch_all-in-onezhan_66_pro_g5_firmwareelitebook_840_aero_g8pro_sff_400_g9probook_x360_11_g5_ee_firmwarepro_tower_480_g9elitebook_x360_1040_g5_firmwareelitedesk_800_35w_g3_desktop_minielitebook_x360_1040_g6_firmwarezhan_66_pro_14_g4_firmwareprodesk_400_g5_small_form_factor_firmwarezhan_66_pro_g1elitedesk_805_g6_small_form_factoreliteone_800_g8_24_all-in-oneeliteone_800_g6_24_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minizbook_fury_15_g7_firmwareelitedesk_800_g6_towereliteone_800_g8_24_all-in-one_firmwareprodesk_480_g4_microtower_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwareprobook_x360_11_g4_ee_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareprobook_fortis_g10elitebook_840_g6zbook_15_g5prodesk_600_g3_small_form_factor_firmwareelitebook_x360_1040_g7prodesk_680_g4_microtowerelitedesk_800_g6_small_form_factorproone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_x360_830_g8prodesk_405_g6_small_form_factor_firmwareprodesk_480_g6_microtowerprodesk_600_g5_desktop_minielitebook_630_g9prodesk_400_g4_desktop_mini_firmwareelite_x2_1012_g2elitebook_840_g6_firmwarezhan_66_pro_g5prodesk_600_g2_small_form_factor_firmwareeliteone_800_g3_23.8-inch_touch_all-in-one_firmwareprodesk_600_g6_desktop_mini_firmwareelite_mini_800_g9eliteone_1000_g1_34-in_curved_all-in-one_businesseliteone_800_g4_23.8-in_all-in-one_business_firmwareprobook_455_g5_firmwareelitebook_845_g7_firmwarezhan_66_pro_g1_firmwareprodesk_400_g5_desktop_mini_firmwareelitebook_1050_g1elite_tower_600_g9prodesk_600_g6_microtower_firmwareelitebook_x360_830_g6_firmwarezbook_create_g7elitebook_855_g8_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_845_g8elitebook_655_g9eliteone_800_g6_24_all-in-oneelite_x2_g8prodesk_400_g7_small_form_factor_firmwarez2_small_form_factor_g8_workstation_firmwarez2_tower_g4_workstation_firmwareprodesk_600_g4_microtowerproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareprobook_x360_435_g8_firmwareprodesk_400_g6_desktop_minizbook_14u_g6_firmwareelitebook_830_g9_firmwareelite_tower_680_g9_firmwareprobook_645_g4probook_x360_440_g1_firmwareelitebook_x360_1030_g3prodesk_600_g4_small_form_factor_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarez2_tower_g5_workstationzbook_firefly_14_g8probook_450_g7elitedesk_705_g4_microtower_firmwareelitedesk_705_g5_small_form_factor_firmwareelitebook_755_g5eliteone_800_g4_23.8-inch_touch_all-in-oneprobook_445r_g6z2_small_form_factor_g4_workstationprobook_x360_435_g8proone_400_g6_20_all-in-oneprobook_650_g8_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-onez1_g8_tower_firmwareelitebook_x360_1030_g4eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwareproone_400_g6_20_all-in-one_firmwareprodesk_400_g5_microtower_firmwarezhan_66_pro_15_g2elitebook_745_g5_firmwareprodesk_600_g2_microtowerelite_dragonfly_maxelite_x360_830_g9_2-in-1elitedesk_800_g3_small_form_factor_firmwareelitebook_865_g9_firmwareelitebook_650_g9zbook_15_g6elitedesk_800_g5_small_form_factorzhan_66_pro_a_14_g4_firmwareprodesk_400_g6_small_form_factor_firmwarezbook_studio_g5elite_dragonfly_g3elitebook_1040_g3_firmwareelitedesk_805_g8_desktop_minieliteone_800_g4_23.8-inch_touch_all-in-one_firmwareelite_x2_1012_g2_firmwarez2_mini_g5_workstation_firmwareprodesk_400_g7_microtowerelitedesk_880_g8_towerprobook_650_g4prodesk_680_g3_microtowerrp9_g1_retail_systempro_x360_fortis_g10_firmwareengage_one_aio_system_firmwareprobook_640_g4z2_tower_g8_workstationelitebook_845_g9_firmwareproone_600_g6_22_all-in-oneelite_tower_800_g9proone_400_g3_20-inch_touch_all-in-oneelitebook_1030_g1elitedesk_800_65w_g2_desktop_mini_firmwareengage_go_10_mobile_systemprobook_455_g6zbook_fury_17_g8engage_go_10_mobile_system_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareprodesk_400_g4_small_form_factorprobook_fortis_g10_firmwaremt44_mobile_thin_client_firmwareprobook_640_g7proone_440_g6_24_all-in-oneprobook_450_g5_firmwarezbook_fury_17_g7zbook_15u_g5prodesk_480_g7elitebook_830_g8elite_x2_g4_firmwarezhan_66_pro_14_g3_firmwareproone_400_g4_20-inch_non-touch_all-in-one_businesselite_sff_600_g9mt45_mobile_thin_clientelitebook_830_g5elite_slice_g2zhan_66_pro_a_14_g5_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_600_g6_desktop_minimp9_g4_retail_systemelitebook_840_g5_firmwarezbook_14u_g6eliteone_800_g6_27_all-in-oneelitedesk_800_g4_tower_firmwareelitebook_1040_g4zbook_power_g9_firmwareelitedesk_880_g6_tower_firmwareelite_sff_800_g9elitedesk_705_g4_microtowerelitedesk_800_35w_g2_desktop_mini_firmwareeliteone_840_23.8_inch_g9_all-in-onerp9_g1_retail_system_firmwareprobook_x360_11_g3_ee_firmwareprodesk_480_g5_microtower_firmwareelitedesk_705_g4_workstationzhan_66_pro_15_g3_firmwarez1_entry_tower_g6_workstation_firmwareprodesk_600_g4_small_form_factorzbook_studio_g8_firmwareelitebook_x360_830_g7elitebook_x360_1030_g3_firmwareelitebook_850_g8elitedesk_800_65w_g4_desktop_mini_firmwareelitebook_846_g5_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareeliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareprobook_635_aero_g8_firmwareelite_dragonfly_g2_firmwareeliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelitedesk_800_35w_g4_desktop_mini_firmwareelitedesk_800_g8_desktop_mini_firmwareelitedesk_705_g4_desktop_mini_firmwareprobook_440_g5elitedesk_800_g5_small_form_factor_firmwareproone_440_g5_23.8-in_all-in-one_businesselitedesk_800_g2_small_form_factorelite_tower_880_g9zbook_studio_g5_firmwarezbook_fury_15_g7probook_640_g5_firmwareelitebook_840_aero_g8_firmwareelite_slice_g2_firmwareelitebook_x360_1040_g8prodesk_405_g8_desktop_minieliteone_1000_g2_23.8-in_all-in-one_businesselitebook_735_g6elitedesk_800_65w_g3_desktop_miniprobook_450_g7_firmwareprobook_650_g4_firmwareprodesk_405_g4_desktop_miniprobook_640_g7_firmwareelitebook_830_g6_firmwarezbook_fury_16_g9_firmwareprobook_430_g6_firmwarezbook_firefly_14_g8_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businessprodesk_400_g3_desktop_mini_firmwareelitebook_x360_1030_g8zbook_create_g7_firmwarez2_tower_g4_workstationzbook_17_g6_firmwareelitebook_840_g7elitedesk_800_g3_small_form_factorprobook_445_g6_firmwareprobook_445_g9_firmwarezbook_studio_g7elitebook_645_g9_firmwareelite_tower_800_g9_firmwareeliteone_1000_g2_34-in_curved_all-in-one_business_firmwareprodesk_600_g6_small_form_factor_firmwarezhan_66_pro_14_g2proone_400_g6_24_all-in-one_firmwareprobook_440_g9elitedesk_880_g4_towerzbook_fury_16_g9elite_x360_830_g9_2-in-1_firmwaremt45_mobile_thin_client_firmwareeliteone_800_g5_23.8-inch_all-in-one_firmwareprobook_x360_435_g7prodesk_400_g6_microtowerproone_440_23.8_inch_g9_all-in-oneeliteone_800_g8_27_all-in-one_firmwareelitebook_745_g6_firmwareelitedesk_705_g3_firmwareengage_flex_pro-c_retail_systemproone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwareprodesk_600_g3_desktop_miniprobook_470_g5elitebook_745_g6eliteone_800_g3_23.8-inch_touch_all-in-oneeliteone_800_g4_23.8-in_all-in-one_businessprodesk_400_g3_desktop_miniprodesk_600_g4_desktop_minielitedesk_880_g8_tower_firmwareelitebook_830_g7prodesk_400_g6_microtower_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businesseliteone_840_23.8_inch_g9_all-in-one_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_860_g9elite_dragonfly_max_firmwareelitebook_855_g7eliteone_800_g3_23.8-inch_non-touch_all-in-onez1_entry_tower_g5_workstationprobook_645_g4_firmwareproone_400_g5_23.8-inch_all-in-one_businesselitebook_835_g7elitebook_860_g9_firmwareelitebook_1040_g9prodesk_405_g4_small_form_factor_firmwareprobook_650_g5proone_600_g4_21.5-inch_touch_all-in-one_businesselite_x2_g8_firmwareelitebook_840_g9elitedesk_800_35w_g2_desktop_minipro_tower_400_g9prodesk_600_g4_desktop_mini_firmwareelite_x360_1040_g9_2-in-1_firmwareprobook_440_g7elite_folio_2-in-1elite_mini_800_g9_firmwareelitebook_835_g9prodesk_600_g3_desktop_mini_firmwareelite_sff_800_g9_firmwareprobook_445_g6probook_640_g8probook_455_g9_firmwareelitebook_830_g5_firmwarezbook_firefly_15_g8_firmwaremp9_g4_retail_system_firmwareprobook_650_g8elitebook_836_g6_firmwareelitedesk_800_g4_workstationz2_small_form_factor_g8_workstationprodesk_680_g2_microtower_firmwareprobook_635_aero_g8eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareprobook_445_g7_firmwareelitedesk_800_65w_g2_desktop_minielitebook_850_g6_firmwareprobook_455_g5mp9_g2_retail_systemengage_flex_mini_retail_systemelitedesk_800_35w_g4_desktop_minielitebook_846_g5zbook_firefly_15_g7_firmwarez1_g9_towermt46_mobile_thin_client_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwareprobook_440_g6zbook_studio_g8eliteone_800_g2_23-inch_non-touch_all-in-oneprodesk_600_g2_desktop_minieliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwarezbook_studio_x360_g5elitebook_x360_830_g7_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwarez2_tower_g8_workstation_firmwareproone_400_g2_20-inch_touch_all-in-one_firmwareprobook_450_g8zbook_17_g5zbook_firefly_14_g7zhan_66_pro_a_14_g3probook_640_g5zbook_17_g5_firmwareelitebook_850_g5prodesk_600_g5_small_form_factor_firmwareelitedesk_800_g5_towerelitedesk_705_g5_small_form_factorelitebook_840_g5elitedesk_800_g4_small_form_factor_firmwareprodesk_600_g6_small_form_factorprobook_450_g9elitebook_835_g8_firmwarezbook_15u_g5_firmwareprobook_650_g7_firmwarezhan_66_pro_14_g4elitebook_850_g8_firmwarezbook_studio_g9elitebook_850_g7elitedesk_800_g6_desktop_mini_firmwareelitedesk_805_g6_desktop_minielitedesk_805_g8_small_form_factorzbook_15_g6_firmwarezbook_fury_17_g8_firmwareelitedesk_800_g2_small_form_factor_firmwarezbook_15u_g6_firmwareproone_600_g3_21.5-inch_non-touch_all-in-one_firmwarezbook_firefly_15_g8elite_x2_1013_g3_firmwareprobook_450_g9_firmwareelitedesk_800_g4_small_form_factorprodesk_600_g6_microtowerprodesk_680_g6elitebook_x360_1040_g5elitebook_x360_1040_g8_firmwareelitebook_x360_830_g5_firmwareprobook_445_g7proone_600_g5_21.5-in_all-in-one_businesselitebook_640_g9elitedesk_800_95w_g4_desktop_minidragonfly_folio_g3_2-in-1elite_dragonfly_firmwarezbook_firefly_14_g9_firmwareelitebook_x360_830_g8_firmwareprobook_445_g9prodesk_400_g4_microtowerprobook_455_g9mt46_mobile_thin_clientelite_dragonfly_g3_firmwarepro_x360_fortis_g9zhan_66_pro_14_g2_firmwareelitedesk_800_g8_desktop_minizbook_15_g5_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_450_g5proone_400_g2_20-inch_touch_all-in-oneprodesk_400_g7_microtower_firmwareelitebook_840r_g4_firmwareprobook_x360_435_g7_firmwareeliteone_800_g2_23-inch_touch_all-in-oneprobook_fortis_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareprodesk_600_g3_microtowerproone_400_g2_20-inch_non-touch_all-in-oneelitedesk_800_g8_small_form_factor_firmwareelitebook_735_g5_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_840r_g4elitebook_836_g5_firmwareprodesk_405_g4_desktop_mini_firmwareengage_one_aio_systemprodesk_405_g6_desktop_mini_firmwareelitebook_x360_1030_g7probook_x360_11_g4_eezhan_x_13_g2_firmwareeliteone_1000_g2_23.8-in_touch_all-in-one_businesselite_x2_1013_g3proone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g4zhan_66_pro_g3_22_all-in-one_firmwareprobook_430_g6proone_400_g3_20-inch_non-touch_all-in-one_firmwareelitebook_850_g6elitedesk_800_g8_towerprodesk_400_g5_microtowerprodesk_405_g8_small_form_factor_firmwareproone_400_g5_20-inch_all-in-one_business_firmwarezbook_fury_17_g7_firmwareelitebook_1040_g9_firmwareelitebook_836_g6elitebook_x360_830_g5prodesk_480_g6_microtower_firmwareelite_x360_1040_g9_2-in-1elitebook_836_g5probook_x360_440_g1z2_small_form_factor_g5_workstation_firmwareprodesk_600_g5_microtower_firmwareelitebook_835_g8elitedesk_705_g5_desktop_minielitebook_850_g5_firmwareprobook_440_g7_firmwareelitebook_1040_g4_firmwarezbook_fury_15_g8zbook_14u_g5_firmwareelitebook_x360_830_g6elitedesk_880_g4_tower_firmwareprobook_440_g5_firmwareelitebook_830_g6probook_x360_11_g5_eezbook_firefly_16_g9_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businesszbook_firefly_16_g9probook_650_g5_firmwareelitedesk_800_g4_towereliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneprobook_450_g6prodesk_600_g2_small_form_factorelitebook_855_g7_firmwarezbook_power_g7engage_go_mobile_system_firmwareprobook_440_g6_firmwareelite_tower_600_g9_firmwareelitebook_850_g7_firmwareelitebook_x360_1030_g8_firmwareelitedesk_705_g4_workstation_firmwareprobook_455_g7_firmwareprodesk_405_g4_small_form_factorelitebook_840_g8zbook_firefly_14_g7_firmwareprodesk_400_g7_small_form_factorzbook_power_g8_firmwareprobook_455_g8_firmwareprodesk_600_g5_microtowerelitebook_640_g9_firmwareelitebook_830_g7_firmwareprobook_470_g5_firmwaremt44_mobile_thin_clientelitebook_840_g7_firmwareelite_folio_2-in-1_firmwareelitebook_855_g8eliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwareelite_mini_600_g9_firmwareelitedesk_705_g4_small_form_factor_firmwareprodesk_400_g5_desktop_miniprodesk_400_g5_small_form_factordragonfly_folio_g3_2-in-1_firmwarez2_mini_g5_workstationprobook_440_g8_firmwareelitedesk_800_g4_workstation_firmwarepro_x360_fortis_g9_firmwarezhan_66_pro_13_g2_firmwareprobook_450_g6_firmwareelitebook_1050_g1_firmwareprobook_430_g8_firmwarez2_mini_g4_workstation_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_x2_1012_g1_firmwareelite_mini_600_g9pro_tower_480_g9_firmwareproone_480_g3_20-inch_non-touch_all-in_oneprodesk_600_g6probook_x360_11_g6_ee_firmwareprobook_430_g5probook_455_g7eliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareHP PC BIOS
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-25926
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-7.4||HIGH
EPSS-0.16% / 37.02%
||
7 Day CHG~0.00%
Published-04 Jan, 2023 | 17:01
Updated-10 Apr, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Versions of the package window-control before 1.4.5 are vulnerable to Command Injection via the sendKeys function, due to improper input sanitization.

Action-Not Available
Vendor-window-control_projectn/a
Product-window-controlwindow-control
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-9050
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 22.24%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 12:14
Updated-05 Jul, 2025 | 02:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Networkmanager-libreswan: local privilege escalation via leftupdown

A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRed Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRed Hat Enterprise Linux 9.2 Extended Update SupportRed Hat Enterprise Linux 7 Extended Lifecycle SupportRed Hat Enterprise Linux 7.7 Advanced Update SupportRed Hat Enterprise Linux 8.4 Telecommunications Update ServiceRed Hat Enterprise Linux 8Red Hat Enterprise Linux 8.2 Advanced Update SupportRed Hat Enterprise Linux 9Red Hat Enterprise Linux 9.4 Extended Update SupportRed Hat Enterprise Linux 8.8 Extended Update SupportRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRed Hat Enterprise Linux 8.6 Telecommunications Update ServiceRed Hat Enterprise Linux 10Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2022-23120
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-1.20% / 78.03%
||
7 Day CHG~0.00%
Published-20 Jan, 2022 | 18:11
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro IncorporatedLinux Kernel Organization, Inc
Product-deep_security_agentlinux_kernelTrend Micro Deep Security Agent for Linux
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found