CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In 2022(Execute Code)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2022-46414 Exec Code 2022-12-04 2022-12-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Unauthenticated remote command execution can occur via the management portal.
2 CVE-2022-46413 Exec Code 2022-12-04 2022-12-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal.
3 CVE-2022-46412 Exec Code 2022-12-04 2022-12-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup Flex Scale through 3.0. A non-privileged user may escape a restricted shell and execute privileged commands.
4 CVE-2022-46366 502 Exec Code 2022-12-02 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry.
5 CVE-2022-46156 Exec Code 2022-11-30 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
The Synthetic Monitoring Agent for Grafana's Synthetic Monitoring application provides probe functionality and executes network checks for monitoring remote targets. Users running the Synthetic Monitoring agent prior to version 0.12.0 in their local network are impacted. The authentication token used to communicate with the Synthetic Monitoring API is exposed through a debugging endpoint. This token can be used to retrieve the Synthetic Monitoring checks created by the user and assigned to the agent identified with that token. The Synthetic Monitoring API will reject connections from already-connected agents, so access to the token does not guarantee access to the checks. Version 0.12.0 contains a fix. Users are advised to rotate the agent tokens. After upgrading to version v0.12.0 or later, it's recommended that users of distribution packages review the configuration stored in `/etc/synthetic-monitoring/synthetic-monitoring-agent.conf`, specifically the `API_TOKEN` variable which has been renamed to `SM_AGENT_API_TOKEN`. As a workaround for previous versions, it's recommended that users review the agent settings and set the HTTP listening address in a manner that limits the exposure, for example, localhost or a non-routed network, by using the command line parameter `-listen-address`, e.g. `-listen-address localhost:4050`.
6 CVE-2022-46152 129 Exec Code 2022-11-29 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_invoke_command()` and `entry_open_session()`. The commands `OPTEE_MSG_CMD_OPEN_SESSION` and `OPTEE_MSG_CMD_INVOKE_COMMAND` can be executed from the normal world via an OP-TEE SMC. This function is not validating the `num_params` argument, which is only limited to `OPTEE_MSG_MAX_NUM_PARAMS` (127) in the function `get_cmd_buffer()`. Therefore, an attacker in the normal world can craft an SMC call that will cause out-of-bounds reading in `cleanup_shm_refs` and potentially freeing of fake-objects in the function `mobj_put()`. A normal-world attacker with permission to execute SMC instructions may exploit this flaw. Maintainers believe this problem permits local privilege escalation from the normal world to the secure world. Version 3.19.0 contains a fix for this issue. There are no known workarounds.
7 CVE-2022-45939 78 Exec Code 2022-11-28 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
8 CVE-2022-45908 94 Exec Code 2022-11-26 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
9 CVE-2022-45907 77 Exec Code 2022-11-26 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely.
10 CVE-2022-45562 Exec Code 2022-12-02 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access.
11 CVE-2022-45482 Exec Code 2022-12-02 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated users to easily and quickly brute force the PIN and execute arbitrary commands. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
12 CVE-2022-45476 352 Exec Code CSRF 2022-11-25 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files.
13 CVE-2022-45475 352 Exec Code CSRF 2022-11-25 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application is vulnerable to CSRF, processes uploaded files server-side (instead of just returning them for download), and allows unauthenticated users to access uploaded files.
14 CVE-2022-45461 78 Exec Code 2022-11-17 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root.
15 CVE-2022-45378 287 Exec Code 2022-11-14 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
** UNSUPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arbitrary remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
16 CVE-2022-45188 787 Exec Code Overflow 2022-11-12 2022-11-17
0.0
None ??? ??? ??? ??? ??? ???
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
17 CVE-2022-45151 79 Exec Code XSS 2022-11-23 2022-11-26
0.0
None ??? ??? ??? ??? ??? ???
The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several "social" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
18 CVE-2022-45150 79 Exec Code XSS 2022-11-23 2022-11-26
0.0
None ??? ??? ??? ??? ??? ???
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.
19 CVE-2022-45132 94 Exec Code 2022-11-18 2022-11-23
0.0
None ??? ??? ??? ??? ??? ???
In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server.
20 CVE-2022-45063 77 Exec Code 2022-11-10 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
21 CVE-2022-45050 79 Exec Code XSS 2022-12-01 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
A reflected XSS vulnerability has been found in Axiell Iguana CMS, allowing an attacker to execute code in a victim's browser. The title parameter on the twitter.php endpoint does not properly neutralise user input, resulting in the vulnerability.
22 CVE-2022-45045 Exec Code 2022-12-01 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.131900.00000 and NBD6808T-PL V4.02.R11.C7431119.12001.130000.00000, allow authenticated users to execute arbitrary commands as root, as exploited in the wild starting in approximately 2019. A remote and authenticated attacker, possibly using the default admin:tlJwpbo6 credentials, can connect to port 34567 and execute arbitrary operating system commands via a crafted JSON file during an upgrade request. Since at least 2021, Xiongmai has applied patches to prevent attackers from using this mechanism to execute telnetd.
23 CVE-2022-45039 434 Exec Code 2022-11-25 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
An arbitrary file upload vulnerability in the Server Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary code via a crafted PHP file.
24 CVE-2022-44830 1236 Exec Code 2022-11-21 2022-11-23
0.0
None ??? ??? ??? ??? ??? ???
Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.
25 CVE-2022-44808 78 Exec Code 2022-11-22 2022-11-23
0.0
None ??? ??? ??? ??? ??? ???
A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability.
26 CVE-2022-44794 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Object First 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in 1.0.13.1611.
27 CVE-2022-44789 119 Exec Code Overflow Mem. Corr. 2022-11-23 2022-11-29
0.0
None ??? ??? ??? ??? ??? ???
A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.
28 CVE-2022-44749 22 Exec Code Dir. Trav. 2022-11-24 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though.
29 CVE-2022-44748 22 Exec Code Dir. Trav. 2022-11-24 2022-11-30
0.0
None ??? ??? ??? ??? ??? ???
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised.
30 CVE-2022-44635 22 Exec Code Dir. Trav. 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1.
31 CVE-2022-44542 502 Exec Code 2022-11-01 2022-11-10
0.0
None ??? ??? ??? ??? ??? ???
lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
32 CVE-2022-44384 434 Exec Code 2022-11-17 2022-11-18
0.0
None ??? ??? ??? ??? ??? ???
An arbitrary file upload vulnerability in rconfig v3.9.6 allows attackers to execute arbitrary code via a crafted PHP file.
33 CVE-2022-44262 Exec Code 2022-12-01 2022-12-02
0.0
None ??? ??? ??? ??? ??? ???
ff4j 1.8.1 is vulnerable to Remote Code Execution (RCE).
34 CVE-2022-44118 Exec Code 2022-11-23 2022-11-28
0.0
None ??? ??? ??? ??? ??? ???
dedecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php.
35 CVE-2022-44089 Exec Code 2022-11-10 2022-11-15
0.0
None ??? ??? ??? ??? ??? ???
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component IS_GETCACHE.
36 CVE-2022-44088 Exec Code 2022-11-10 2022-11-15
0.0
None ??? ??? ??? ??? ??? ???
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component INPUT_ISDESCRIPTION.
37 CVE-2022-44087 Exec Code 2022-11-10 2022-11-15
0.0
None ??? ??? ??? ??? ??? ???
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component UPFILE_PIC_ZOOM_HIGHT.
38 CVE-2022-44054 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0.
39 CVE-2022-44053 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.
40 CVE-2022-44052 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0.
41 CVE-2022-44051 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-stats for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-math package. The affected version of d8s-htm is 0.1.0.
42 CVE-2022-44050 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-json package. The affected version of d8s-htm is 0.1.0.
43 CVE-2022-44049 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0.
44 CVE-2022-44048 434 Exec Code 2022-11-07 2022-11-08
0.0
None ??? ??? ??? ??? ??? ???
The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-domains package. The affected version of d8s-htm is 0.1.0.
45 CVE-2022-44038 Exec Code 2022-11-29 2022-12-01
0.0
None ??? ??? ??? ??? ??? ???
Russound XSourcePlayer 777D v06.08.03 was discovered to contain a remote code execution vulnerability via the scriptRunner.cgi component.
46 CVE-2022-44037 Exec Code 2022-11-29 2022-11-29
0.0
None ??? ??? ??? ??? ??? ???
An access control issue in APsystems ENERGY COMMUNICATION UNIT (ECU-C) Power Control Software V4.1NA, V3.11.4, W2.1NA, V4.1SAA, C1.2.2 allows attackers to access sensitive data and execute specific commands and functions with full admin rights without authenticating allows him to perform multiple attacks, such as attacking wireless network in the product's range.
47 CVE-2022-44019 20 Exec Code 2022-10-30 2022-11-01
0.0
None ??? ??? ??? ??? ??? ???
In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.
48 CVE-2022-44006 22 Exec Code Dir. Trav. 2022-11-16 2022-11-20
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation or sanitization of upload filenames, an externally reachable, unauthenticated update function permits writing files outside the intended target location. Achieving remote code execution is possible, e.g., by uploading an executable file.
49 CVE-2022-44000 306 Exec Code 2022-11-16 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in BACKCLICK Professional 5.9.63. Due to an exposed internal communications interface, it is possible to execute arbitrary system commands on the server.
50 CVE-2022-43999 306 Exec Code 2022-11-16 2022-11-21
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in BACKCLICK Professional 5.9.63. Due to exposed CORBA management services, arbitrary system commands can be executed on the server.
Total number of vulnerabilities : 3766   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.