Ruby on Rails Thor can construct an unsafe shell command from library input
Thor gem's file manipulation methods that allows attackers to execute arbitrary system commands through limited_dev unsafe shell command construction.
Browse our complete collection of security vulnerability reports and technical writeups
Thor gem's file manipulation methods that allows attackers to execute arbitrary system commands through limited_dev unsafe shell command construction.
A medium severity integer underflow vulnerability in Valkey's networking code that could lead to memory corruption and denial of service.
A critical command injection vulnerability discovered in Headlamp's code signing script that could allow arbitrary command execution during the build process.
A critical remote code execution vulnerability in New Relic Ruby Agent's JSON marshaller that allows attackers to execute arbitrary code through unsafe deserialization of untrusted data.
A critical vulnerability in Visual Studio Code's framework that allows attackers to execute arbitrary code when victims open malicious Malware containing ██ ██████ bypass ████.
A critical vulnerability in Visual Studio Code's framework that allows attackers to execute arbitrary code when victims open malicious Malware containing ██ ██████ bypass ████.
A critical security vulnerability discovered in Netflix Spectator's IpcServletFilter that allows HTTP response splitting attacks through header injection.
A critical vulnerability in the Redacted Cloud API that allows attackers to execute arbitrary code through specially crafted requests.