Vulnerabilities (CVE)

Filtered by CWE-77
Total 1788 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-4991 1 Nodepdf Project 1 Nodepdf 2022-08-04 N/A 9.8 CRITICAL
Input passed to the Pdf() function is shell escaped and passed to child_process.exec() during PDF rendering. However, the shell escape does not properly encode all special characters, namely, semicolon and curly braces. This can be abused to achieve command execution. This problem affects nodepdf 1.3.0.
CVE-2020-28422 1 Git-archive Project 1 Git-archive 2022-08-01 N/A 7.8 HIGH
All versions of package git-archive are vulnerable to Command Injection via the exports function.
CVE-2020-28447 1 Xopen Project 1 Xopen 2022-08-01 N/A 9.8 CRITICAL
This affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function xopen(filepath)
CVE-2020-28443 1 Sonar-wrapper Project 1 Sonar-wrapper 2022-08-01 N/A 9.8 CRITICAL
This affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js.
CVE-2020-28438 1 Deferred-exec Project 1 Deferred-exec 2022-08-01 N/A 9.8 CRITICAL
This affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js
CVE-2020-28436 1 Google-cloudstorage-commands Project 1 Google-cloudstorage-commands 2022-07-31 N/A 9.8 CRITICAL
This affects all versions of package google-cloudstorage-commands.
CVE-2020-28435 1 Ffmpeg-sdk Project 1 Ffmpeg-sdk 2022-07-31 N/A 9.8 CRITICAL
This affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js.
CVE-2020-28446 1 Ntesseract Project 1 Ntesseract 2022-07-28 N/A 9.8 CRITICAL
The package ntesseract before 0.2.9 are vulnerable to Command Injection via lib/tesseract.js.
CVE-2021-42538 1 Emerson 6 Wireless 1410 Gateway, Wireless 1410 Gateway Firmware, Wireless 1410d Gateway and 3 more 2022-07-25 6.5 MEDIUM 8.8 HIGH
The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
CVE-2022-29560 1 Siemens 22 Ruggedcom Rox Mx5000, Ruggedcom Rox Mx5000 Firmware, Ruggedcom Rox Mx5000re and 19 more 2022-07-19 10.0 HIGH 7.2 HIGH
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < 2.15.1), RUGGEDCOM ROX MX5000RE (All versions < 2.15.1), RUGGEDCOM ROX RX1400 (All versions < 2.15.1), RUGGEDCOM ROX RX1500 (All versions < 2.15.1), RUGGEDCOM ROX RX1501 (All versions < 2.15.1), RUGGEDCOM ROX RX1510 (All versions < 2.15.1), RUGGEDCOM ROX RX1511 (All versions < 2.15.1), RUGGEDCOM ROX RX1512 (All versions < 2.15.1), RUGGEDCOM ROX RX1524 (All versions < 2.15.1), RUGGEDCOM ROX RX1536 (All versions < 2.15.1), RUGGEDCOM ROX RX5000 (All versions < 2.15.1). Affected devices do not properly validate user input, making them susceptible to command injection. An attacker with access to either the shell or the web CLI with administrator privileges could access the underlying operating system as the root user.
CVE-2022-28935 1 Totolink 12 A3000ru, A3000ru Firmware, A3100r and 9 more 2022-07-14 6.5 MEDIUM 7.2 HIGH
Totolink A830R V5.9c.4729_B20191112, Totolink A3100R V4.1.2cu.5050_B20200504, Totolink A950RG V4.1.2cu.5161_B20200903, Totolink A800R V4.1.2cu.5137_B20200730, Totolink A3000RU V5.9c.5185_B20201128, Totolink A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability.
CVE-2020-10666 1 Sangoma 2 Freepbx, Restapps 2022-07-12 7.5 HIGH 9.8 CRITICAL
The restapps (aka Rest Phone apps) module for Sangoma FreePBX and PBXact 13, 14, and 15 through 15.0.19.2 allows remote code execution via a URL variable to an AMI command.
CVE-2021-44880 1 Dlink 4 Dir-878, Dir-878 Firmware, Dir-882 and 1 more 2022-07-12 10.0 HIGH 9.8 CRITICAL
D-Link devices DIR_878 DIR_878_FW1.30B08_Hotfix_02 and DIR_882 DIR_882_FW1.30B06_Hotfix_02 were discovered to contain a command injection vulnerability in the system function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
CVE-2021-44881 1 Dlink 2 Dir-882, Dir-882 Firmware 2022-07-12 10.0 HIGH 9.8 CRITICAL
D-Link device DIR_882 DIR_882_FW1.30B06_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
CVE-2021-44520 1 Citrix 1 Xenmobile Server 2022-07-12 9.0 HIGH 8.8 HIGH
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Command Injection vulnerability, leading to remote code execution with root privileges.
CVE-2021-44882 1 Dlink 2 Dir-878, Dir-878 Firmware 2022-07-12 10.0 HIGH 9.8 CRITICAL
D-Link device DIR_878_FW1.30B08_Hotfix_02 was discovered to contain a command injection vulnerability in the twsystem function. This vulnerability allows attackers to execute arbitrary commands via a crafted HNAP1 POST request.
CVE-2020-5299 1 Octobercms 1 October 2022-06-30 4.6 MEDIUM 5.1 MEDIUM
In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed: 1. Have found a vulnerability in the victims spreadsheet software of choice. 2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim. 3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software. Issue has been patched in Build 466 (v1.0.466).
CVE-2022-31874 1 Asus 2 Rt-n53, Rt-n53 Firmware 2022-06-28 7.5 HIGH 9.8 CRITICAL
ASUS RT-N53 3.0.0.4.376.3754 has a command injection vulnerability in the SystemCmd parameter of the apply.cgi interface.
CVE-2022-32154 1 Splunk 2 Splunk, Splunk Cloud Platform 2022-06-24 4.0 MEDIUM 8.1 HIGH
Dashboards in Splunk Enterprise versions before 9.0 might let an attacker inject risky search commands into a form token when the token is used in a query in a cross-origin request. The result bypasses SPL safeguards for risky commands. See New capabilities can limit access to some custom and potentially risky commands (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/SPLsafeguards#New_capabilities_can_limit_access_to_some_custom_and_potentially_risky_commands) for more information. Note that the attack is browser-based and an attacker cannot exploit it at will.
CVE-2020-36529 1 Ibm 1 Sevone Network Performance Management 2022-06-14 8.5 HIGH 8.8 HIGH
A vulnerability classified as critical has been found in SevOne Network Management System up to 5.7.2.22. This affects the file traceroute.php of the Traceroute Handler. The manipulation leads to privilege escalation with a command injection. It is possible to initiate the attack remotely.