Vulnerabilities (CVE)

Filtered by CWE-78
Total 3673 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-17107 1 Centreon 1 Centreon Web 2021-07-21 6.5 MEDIUM 8.8 HIGH
minPlayCommand.php in Centreon Web before 2.8.27 allows authenticated attackers to execute arbitrary code via the command_hostaddress parameter. NOTE: some sources have listed CVE-2019-17017 for this, but that is incorrect.
CVE-2020-7752 1 Systeminformation 1 Systeminformation 2021-07-21 6.5 MEDIUM 8.8 HIGH
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
CVE-2019-9785 1 Gitnoteapp 1 Gitnote 2021-07-21 6.8 MEDIUM 7.8 HIGH
gitnote 3.1.0 allows remote attackers to execute arbitrary code via a crafted Markdown file, as demonstrated by a javascript:window.parent.top.require('child_process').execFile substring in the onerror attribute of an IMG element.
CVE-2020-18568 1 Dlink 4 Dsr-1000n, Dsr-1000n Firmware, Dsr-250 and 1 more 2021-07-21 7.5 HIGH 9.8 CRITICAL
The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution.
CVE-2020-35458 1 Clusterlabs 1 Hawk 2021-07-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.
CVE-2020-15489 1 Wavlink 2 Wl-wn530hg4, Wl-wn530hg4 Firmware 2021-07-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.
CVE-2020-7698 1 Gerapy 1 Gerapy 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
CVE-2020-25494 1 Xinuos 1 Openserver 2021-07-21 7.5 HIGH 9.8 CRITICAL
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
CVE-2020-28426 1 Kill-process-on-port Project 1 Kill-process-on-port 2021-07-21 7.5 HIGH 7.3 HIGH
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
CVE-2020-28490 1 Async-git Project 1 Async-git 2021-07-21 7.5 HIGH 9.8 CRITICAL
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
CVE-2019-25022 1 Scytl 1 Secure Vote 2021-07-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation.
CVE-2020-11766 2 Avantfax, Ifax 2 Avantfax, Hylafax 2021-07-21 6.5 MEDIUM 8.8 HIGH
sendfax.php in iFAX AvantFAX before 3.3.6 and HylaFAX Enterprise Web Interface before 0.2.5 allows authenticated Command Injection.
CVE-2020-4006 3 Linux, Microsoft, Vmware 7 Linux Kernel, Windows, Cloud Foundation and 4 more 2021-07-21 9.0 HIGH 9.1 CRITICAL
VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability.
CVE-2020-36199 1 Kaspersky 1 Tinycheck 2021-07-21 7.5 HIGH 9.8 CRITICAL
TinyCheck before commits 9fd360d and ea53de8 was vulnerable to command injection due to insufficient checks of input parameters in several places.
CVE-2020-7634 1 Heroku-addonpool Project 1 Heroku-addonpool 2021-07-21 7.5 HIGH 9.8 CRITICAL
heroku-addonpool through 0.1.15 is vulnerable to Command Injection.
CVE-2020-11699 1 Titanhq 1 Spamtitan 2021-07-21 9.0 HIGH 8.8 HIGH
An issue was discovered in Titan SpamTitan 7.07. Improper validation of the parameter fname on the page certs-x.php would allow an attacker to execute remote code on the target server. The user has to be authenticated before interacting with this page.
CVE-2019-3702 1 Lifesize 6 Icon 300, Icon 300 Firmware, Icon 500 and 3 more 2021-07-21 6.5 MEDIUM 8.8 HIGH
A Remote Code Execution issue in the DNS Query Web UI in Lifesize Icon LS_RM3_3.7.0 (2421) allows remote authenticated attackers to execute arbitrary commands via a crafted DNS Query address field in a JSON API request.
CVE-2020-35789 1 Netgear 2 Nms300, Nms300 Firmware 2021-07-21 6.5 MEDIUM 8.8 HIGH
NETGEAR NMS300 devices before 1.6.0.27 are affected by command injection by an authenticated user.
CVE-2020-7784 1 Ts-process-promises Project 1 Ts-process-promises 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js. The vulnerability is demonstrated with the following PoC:
CVE-2020-7613 1 Clamscan Project 1 Clamscan 2021-07-21 6.8 MEDIUM 8.1 HIGH
clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.