A command injection vulnerability in Jitsi before commit 8aa7be58522f4264078d54752aae5483bfd854b2 allows remote execution by launching browsers on Windows
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2022-43550 | 9 Feb 202320:15 | – | osv |
![]() | 8x8 Bounty: Jitsi Desktop Client RCE By Interacting with Malicious URL Schemes on Windows | 6 Sep 202216:26 | – | hackerone |
![]() | Command injection | 9 Feb 202320:15 | – | prion |
![]() | CVE-2022-43550 | 9 Feb 202300:00 | – | vulnrichment |
![]() | CVE-2022-43550 | 9 Feb 202320:15 | – | nvd |
![]() | CVE-2022-43550 | 9 Feb 202320:15 | – | cve |
[
{
"vendor": "n/a",
"product": "https://github.com/jitsi",
"versions": [
{
"version": "Commit: 8aa7be58522f4264078d54752aae5483bfd854b2",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo