Vulnerabilities (CVE)

Filtered by CWE-78
Total 3673 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34540 1 Dw 2 Megapix, Megapix Firmware 2023-08-08 N/A 8.8 HIGH
Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 was discovered to contain a command injection vulnerability in the component /admin/vca/license/license_tok.cgi. This vulnerability is exploitable via a crafted POST request.
CVE-2022-25076 1 Totolink 2 A800r, A800r Firmware 2023-08-08 7.5 HIGH 9.8 CRITICAL
TOTOLink A800R V4.1.2cu.5137_B20200730 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.
CVE-2022-28580 1 Totolink 2 A7100ru, A7100ru Firmware 2023-08-08 10.0 HIGH 9.8 CRITICAL
It is found that there is a command injection vulnerability in the setL2tpServerCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
CVE-2022-48124 1 Totolink 2 A7100ru, A7100ru Firmware 2023-08-08 N/A 9.8 CRITICAL
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the FileName parameter in the setting/setOpenVpnCertGenerationCfg function.
CVE-2023-35861 1 Supermicro 330 H12dgo-6, H12dgo-6 Firmware, H12dgq-nt6 and 327 more 2023-08-07 N/A 9.8 CRITICAL
A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC.
CVE-2023-37292 1 Hgiga 1 Isherlock 2023-08-04 N/A 9.8 CRITICAL
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in HGiga iSherlock 4.5 (iSherlock-user modules), HGiga iSherlock 5.5 (iSherlock-user modules) allows OS Command Injection.This issue affects iSherlock 4.5: before iSherlock-user-4.5-174; iSherlock 5.5: before iSherlock-user-5.5-174.
CVE-2023-35019 1 Ibm 1 Security Verify Governance 2023-08-04 N/A 8.8 HIGH
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873.
CVE-2023-4033 1 Lfprojects 1 Mlflow 2023-08-04 N/A 7.8 HIGH
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0.
CVE-2023-37213 1 Synel 2 Synergy\/a, Synergy\/a Firmware 2023-08-03 N/A 9.8 CRITICAL
Synel SYnergy Fingerprint Terminals - CWE-78: 'OS Command Injection'
CVE-2023-3975 1 Diagrams 1 Drawio 2023-08-03 N/A 9.8 CRITICAL
OS Command Injection in GitHub repository jgraph/drawio prior to 21.5.0.
CVE-2023-3974 1 Diagrams 1 Drawio 2023-08-03 N/A 9.8 CRITICAL
OS Command Injection in GitHub repository jgraph/drawio prior to 21.4.0.
CVE-2022-28171 1 Hikvision 22 Ds-a71024, Ds-a71024 Firmware, Ds-a71048 and 19 more 2023-08-02 7.5 HIGH 9.8 CRITICAL
The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.
CVE-2022-33891 1 Apache 1 Spark 2023-08-02 N/A 8.8 HIGH
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
CVE-2023-22653 1 Milesight 2 Ur32l, Ur32l Firmware 2023-08-02 N/A 8.8 HIGH
An OS command injection vulnerability exists in the vtysh_ubus tcpdump_start_cb functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to command execution. An authenticated attacker can send an HTTP request to trigger this vulnerability.
CVE-2023-38056 1 Otrs 1 Otrs 2023-08-01 N/A 7.2 HIGH
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
CVE-2023-38673 1 Paddlepaddle 1 Paddlepaddle 2023-07-31 N/A 9.8 CRITICAL
PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system.
CVE-2022-24193 1 Icewhale 1 Casaos 2023-07-31 7.5 HIGH 9.8 CRITICAL
CasaOS before v0.2.7 was discovered to contain a command injection vulnerability.
CVE-2023-36670 1 Kratosdefense 2 Ngc Indoor Unit, Ngc Indoor Unit Firmware 2023-07-28 N/A 9.8 CRITICAL
A remotely exploitable command injection vulnerability was found on the Kratos NGC-IDU 9.1.0.4. An attacker can execute arbitrary Linux commands as root by sending crafted TCP requests to the device.
CVE-2023-37477 1 Fit2cloud 1 1panel 2023-07-27 N/A 8.8 HIGH
1Panel is an open source Linux server operation and maintenance management panel. An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. This issue has been addressed in commit `e17b80cff49` which is included in release version `1.4.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2020-7357 1 Cayintech 11 Cms, Cms-20, Cms-20 Firmware and 8 more 2023-07-27 9.0 HIGH 9.9 CRITICAL
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.