Vulnerabilities (CVE)

Filtered by CWE-78
Total 3673 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-26878 1 Commscope 2 Ruckus Iot Module, Ruckus Vriot 2021-07-21 9.0 HIGH 8.8 HIGH
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
CVE-2020-26582 1 Dlink 2 Dap-1360u, Dap-1360u Firmware 2021-07-21 9.0 HIGH 8.8 HIGH
D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).
CVE-2020-7633 1 Apiconnect-cli-plugins Project 1 Apiconnect-cli-plugins 2021-07-21 7.5 HIGH 9.8 CRITICAL
apiconnect-cli-plugins through 6.0.1 is vulnerable to Command Injection.It allows execution of arbitrary commands via the pluginUri argument.
CVE-2020-14162 1 Pi-hole 1 Pi-hole 2021-07-21 7.2 HIGH 7.8 HIGH
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
CVE-2019-14479 1 Adremsoft 1 Netcrunch 2021-07-21 9.0 HIGH 8.8 HIGH
AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.
CVE-2020-7206 1 Hp 1 Nagios-plugins-hpilo 2021-07-21 7.5 HIGH 9.8 CRITICAL
HP nagios plugin for iLO (nagios-plugins-hpilo v1.50 and earlier) has a php code injection vulnerability.
CVE-2020-24849 1 Fruitywifi Project 1 Fruitywifi 2021-07-21 6.5 MEDIUM 8.8 HIGH
A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.
CVE-2020-25757 1 Dlink 20 Dsr-1000, Dsr-1000 Firmware, Dsr-1000ac and 17 more 2021-07-21 8.3 HIGH 8.8 HIGH
A lack of input validation and access controls in Lua CGIs on D-Link DSR VPN routers may result in arbitrary input being passed to system command APIs, resulting in arbitrary command execution with root privileges. This affects DSR-150, DSR-250, DSR-500, and DSR-1000AC with firmware 3.14 and 3.17.
CVE-2020-5505 1 Vaaip 1 Freelancy 2021-07-21 7.5 HIGH 9.8 CRITICAL
Freelancy v1.0.0 allows remote command execution via the "file":"data:application/x-php;base64 substring (in conjunction with "type":"application/x-php"} to the /api/files/ URI.
CVE-2019-1020004 1 Tridactyl Project 1 Tridactyl 2021-07-21 5.0 MEDIUM 7.5 HIGH
Tridactyl before 1.16.0 allows fake key events.
CVE-2020-7785 1 Node-ps Project 1 Node-ps 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
CVE-2020-8429 1 Kinetica 1 Kinetica 2021-07-21 9.0 HIGH 8.8 HIGH
The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. The logFile parameter in the getLogs function was used as a variable in a command to read log files; however, due to poor input sanitisation, it was possible to bypass a replacement and break out of the command.
CVE-2020-27575 1 Maxum 1 Rumpus 2021-07-21 6.5 MEDIUM 8.8 HIGH
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
CVE-2020-7614 1 Npm-programmatic Project 1 Npm-programmatic 2021-07-21 7.5 HIGH 9.8 CRITICAL
npm-programmatic through 0.0.12 is vulnerable to Command Injection.The packages and option properties are concatenated together without any validation and are used by the 'exec' function directly.
CVE-2020-28429 1 Geojson2kml Project 1 Geojson2kml 2021-07-21 7.5 HIGH 9.8 CRITICAL
All versions of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
CVE-2019-16730 2 Petwant, Skymee 4 Pf-103, Pf-103 Firmware, Petalk Ai and 1 more 2021-07-21 10.0 HIGH 9.8 CRITICAL
processCommandUpgrade() in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to execute arbitrary system commands as the root user.
CVE-2020-12078 1 Opmantek 1 Open-audit 2021-07-21 9.0 HIGH 8.8 HIGH
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
CVE-2020-7607 1 Gulp-styledocco Project 1 Gulp-styledocco 2021-07-21 7.5 HIGH 9.8 CRITICAL
gulp-styledocco through 0.0.3 allows execution of arbitrary commands. The argument 'options' of the exports function in 'index.js' can be controlled by users without any sanitization.
CVE-2019-4715 1 Ibm 1 Spectrum Scale 2021-07-21 9.0 HIGH 8.8 HIGH
IBM Spectrum Scale 4.2 and 5.0 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 172093.
CVE-2020-7730 1 Bestzip Project 1 Bestzip 2021-07-21 7.5 HIGH 9.8 CRITICAL
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.