Vulnerabilities (CVE)

Filtered by CWE-78
Total 3673 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-28439 1 Corenlp-js-prefab Project 1 Corenlp-js-prefab 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' Vulnerability can be exploited with the following PoC:
CVE-2020-12393 2 Microsoft, Mozilla 4 Windows, Firefox, Firefox Esr and 1 more 2021-07-21 4.6 MEDIUM 7.8 HIGH
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
CVE-2020-8797 1 Juplink 2 Rx4-1500, Rx4-1500 Firmware 2021-07-21 6.9 MEDIUM 6.7 MEDIUM
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
CVE-2020-29664 1 Dji 2 Mavic 2, Mavic 2 Firmware 2021-07-21 7.2 HIGH 7.8 HIGH
A command injection issue in dji_sys in DJI Mavic 2 Remote Controller before firmware version 01.00.0510 allows for code execution via a malicious firmware upgrade packet.
CVE-2019-15311 1 Linkplay 1 Linkplay 2021-07-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Zolo Halo devices via the Linkplay firmware. There is Zolo Halo LAN remote code execution. The Zolo Halo Bluetooth speaker had a GoAhead web server listening on the port 80. The /httpapi.asp endpoint of the GoAhead web server was also vulnerable to multiple command execution vulnerabilities.
CVE-2020-28440 1 Corenlp-js-interface Project 1 Corenlp-js-interface 2021-07-21 7.5 HIGH 9.8 CRITICAL
All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function.
CVE-2020-13802 1 Erlang 1 Rebar3 2021-07-21 10.0 HIGH 9.8 CRITICAL
Rebar3 versions 3.0.0-beta.3 to 3.13.2 are vulnerable to OS command injection via URL parameter of dependency specification.
CVE-2020-7781 1 Connection-tester Project 1 Connection-tester 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects the package connection-tester before 0.2.1. The injection point is located in line 15 in index.js. The following PoC demonstrates the vulnerability:
CVE-2020-35714 1 Linksys 2 Re6500, Re6500 Firmware 2021-07-21 6.5 MEDIUM 8.8 HIGH
Belkin LINKSYS RE6500 devices before 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.
CVE-2020-24354 1 Zyxel 2 Vmg5313-b30b, Vmg5313-b30b Firmware 2021-07-21 6.5 MEDIUM 8.8 HIGH
Zyxel VMG5313-B30B router on firmware 5.13(ABCJ.6)b3_1127, and possibly older versions of firmware are affected by shell injection.
CVE-2020-7601 1 Gulp-scss-lint Project 1 Gulp-scss-lint 2021-07-21 7.5 HIGH 9.8 CRITICAL
gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the "exec" function located in "src/command.js" via the provided options.
CVE-2020-7602 1 Node-prompt-here Project 1 Node-prompt-here 2021-07-21 7.5 HIGH 9.8 CRITICAL
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The "runCommand()" is called by "getDevices()" function in file "linux/manager.js", which is required by the "index. process.env.NM_CLI" in the file "linux/manager.js". This function is used to construct the argument of function "execSync()", which can be controlled by users without any sanitization.
CVE-2020-24899 1 Nagios 1 Nagios Xi 2021-07-21 6.5 MEDIUM 8.8 HIGH
Nagios XI 5.7.2 is affected by a remote code execution (RCE) vulnerability. An authenticated user can inject additional commands into normal webapp query.
CVE-2020-29311 1 Ubilling 1 Ubilling 2021-07-21 10.0 HIGH 9.8 CRITICAL
Ubilling v1.0.9 allows Remote Command Execution as Root user by executing a malicious command that is injected inside the config file and being triggered by another part of the software.
CVE-2020-14950 1 Aapanel 1 Aapanel 2021-07-21 6.5 MEDIUM 8.8 HIGH
aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via shell metacharacters in a modified /system?action=ServiceAdmin request (start, stop, or restart) to the setting menu of Sotfware Store.
CVE-2020-10235 1 Froxlor 1 Froxlor 2021-07-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Froxlor before 0.10.14. Remote attackers with access to the installation routine could have executed arbitrary code via the database configuration options that were passed unescaped to exec, because of _backupExistingDatabase in install/lib/class.FroxlorInstall.php.
CVE-2020-6948 1 Hashbrowncms 1 Hashbrown Cms 2021-07-21 7.5 HIGH 9.8 CRITICAL
A remote code execution issue was discovered in HashBrown CMS through 1.3.3. Server/Entity/Deployer/GitDeployer.js has a Service.AppService.exec call that mishandles the URL, repository, username, and password.
CVE-2020-15477 1 Raspberrytorte 1 Raspberrytortoise 2021-07-21 10.0 HIGH 9.8 CRITICAL
The WebControl in RaspberryTortoise through 2012-10-28 is vulnerable to remote code execution via shell metacharacters in a URI. The file nodejs/raspberryTortoise.js has no validation on the parameter incomingString before passing it to the child_process.exec function.
CVE-2020-7782 1 Spritesheet-js Project 1 Spritesheet-js 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
CVE-2020-25499 1 Totolink 26 A3002r, A3002r Firmware, A3002ru-v1 and 23 more 2021-07-21 9.0 HIGH 8.8 HIGH
TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.