{"uuid": "de0eeaab-e1c8-4b08-a57b-34acb312bb4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-25022", "type": "seen", "source": "https://t.me/cibsecurity/24273", "content": "\u203c CVE-2019-25022 \u203c\n\nAn issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-27T07:39:57.000000Z"}