Total
3673 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10807 | 1 Blamer Project | 1 Blamer | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Blamer versions prior to 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of the arguments provided to blamer. | |||||
CVE-2019-10791 | 1 Promise-probe Project | 1 Promise-probe | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
promise-probe before 0.10.0 allows remote attackers to perform a command injection attack. The file, outputFile and options functions can be controlled by users without any sanitization. | |||||
CVE-2019-10776 | 1 Git-diff-apply Project | 1 Git-diff-apply | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2. | |||||
CVE-2018-6662 | 2 Apple, Mcafee | 2 Mac Os X, Management Of Native Encryption | 2023-11-07 | 7.2 HIGH | 7.8 HIGH |
Privilege Escalation vulnerability in McAfee Management of Native Encryption (MNE) before 4.1.4 allows local users to gain elevated privileges via a crafted user input. | |||||
CVE-2018-20106 | 1 Opensuse | 1 Yast2-printer | 2023-11-07 | 9.3 HIGH | 8.1 HIGH |
In yast2-printer up to and including version 4.0.2 the SMB printer settings don't escape characters in passwords properly. If a password with backticks or simliar characters is supplied this allows for executing code as root. This requires tricking root to enter such a password in yast. | |||||
CVE-2018-19907 | 1 Craftercms | 1 Crafter Cms | 2023-11-07 | 6.5 MEDIUM | 8.8 HIGH |
A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page. | |||||
CVE-2018-19639 | 1 Opensuse | 1 Supportutils | 2023-11-07 | 7.2 HIGH | 7.8 HIGH |
If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root. | |||||
CVE-2018-12465 | 1 Microfocus | 1 Secure Messaging Gateway | 2023-11-07 | 9.0 HIGH | 7.2 HIGH |
An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG) allows a remote attacker authenticated as a privileged user to execute arbitrary OS commands on the SMG server. This can be exploited in conjunction with CVE-2018-12464 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that used GWAVA product name (i.e. GWAVA 6.5). | |||||
CVE-2018-11805 | 2 Apache, Debian | 2 Spamassassin, Debian Linux | 2023-11-07 | 7.2 HIGH | 6.7 MEDIUM |
In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places. | |||||
CVE-2018-1000666 | 2 Gig, Openvcloud Project | 2 Jumpscale, Openvcloud | 2023-11-07 | 10.0 HIGH | 9.8 CRITICAL |
GIG Technology NV JumpScale Portal 7 version before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in method: notifySpaceModification; that can result in Improper validation of parameters results in command execution. This attack appear to be exploitable via Network connectivity, required minimal auth privileges (everyone can register an account). This vulnerability appears to have been fixed in After commit 15443122ed2b1cbfd7bdefc048bf106f075becdb. | |||||
CVE-2018-1000006 | 2 Atom, Microsoft | 4 Electron, Windows 10, Windows 7 and 1 more | 2023-11-07 | 9.3 HIGH | 8.8 HIGH |
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16. | |||||
CVE-2017-9274 | 1 Opensuse | 1 Obs-service-source Validator | 2023-11-07 | 9.3 HIGH | 7.8 HIGH |
A shell command injection in the obs-service-source_validator before 0.7 could be used to execute code as the packager when checking RPM SPEC files with specific macro constructs. | |||||
CVE-2017-5330 | 2 Fedoraproject, Kde | 2 Fedora, Ark | 2023-11-07 | 6.8 MEDIUM | 7.8 HIGH |
ark before 16.12.1 might allow remote attackers to execute arbitrary code via an executable in an archive, related to associated applications. | |||||
CVE-2017-3936 | 1 Mcafee | 1 Epolicy Orchestrator | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
OS Command Injection vulnerability in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, 5.3.1, 5.1.3, 5.1.2, 5.1.1, and 5.1.0 allows attackers to run arbitrary OS commands with limited privileges via not sanitizing the user input data before exporting it into a CSV format output. | |||||
CVE-2017-14867 | 2 Debian, Git-scm | 2 Debian Linux, Git | 2023-11-07 | 9.0 HIGH | 8.8 HIGH |
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support. | |||||
CVE-2017-12636 | 1 Apache | 1 Couchdb | 2023-11-07 | 9.0 HIGH | 7.2 HIGH |
CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet. | |||||
CVE-2017-1000487 | 2 Debian, Plexus-utils Project | 2 Debian Linux, Plexus-utils | 2023-11-07 | 7.5 HIGH | 9.8 CRITICAL |
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings. | |||||
CVE-2016-7844 | 1 Gigaccsecure | 1 Gigacc Office | 2023-11-07 | 6.0 MEDIUM | 5.5 MEDIUM |
GigaCC OFFICE ver.2.3 and earlier allows remote attackers to execute arbitrary OS commands via specially crafted mail template. | |||||
CVE-2015-4642 | 2 Microsoft, Php | 2 Windows, Php | 2023-11-07 | 10.0 HIGH | 9.8 CRITICAL |
The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | |||||
CVE-2014-9727 | 1 Avm | 1 Fritz\!box | 2023-11-07 | 10.0 HIGH | N/A |
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm. |