Vulnerabilities (CVE)

Filtered by CWE-78
Total 3837 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-27861 1 Netgear 71 Cbk40, Cbk40 Firmware, Cbk43 and 68 more 2021-03-23 8.3 HIGH 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
CVE-2021-28132 1 Lucysecurity 1 Security Awareness 2021-03-22 7.5 HIGH 9.8 CRITICAL
LUCY Security Awareness Software through 4.7.x allows unauthenticated remote code execution because the Migration Tool (in the Support section) allows upload of .php files within a system.tar.gz file. The .php file becomes accessible with a public/system/static URI.
CVE-2021-20017 1 Sonicwall 2 Sma100, Sma100 Firmware 2021-03-19 9.0 HIGH 8.8 HIGH
A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.
CVE-2021-27256 1 Netgear 86 Br200, Br200 Firmware, Br500 and 83 more 2021-03-16 8.3 HIGH 8.8 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_save.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12355.
CVE-2021-24033 1 Facebook 1 React-dev-utils 2021-03-16 6.8 MEDIUM 5.6 MEDIUM
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
CVE-2021-21503 1 Dell 1 Emc Powerscale Onefs 2021-03-12 4.6 MEDIUM 7.8 HIGH
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.
CVE-2021-3291 1 Zen-cart 1 Zen Cart 2021-03-09 9.0 HIGH 7.2 HIGH
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
CVE-2021-26476 1 Eprints 1 Eprints 2021-03-04 7.5 HIGH 9.8 CRITICAL
EPrints 3.4.2 allows remote attackers to execute OS commands via crafted LaTeX input to a cgi/cal?year= URI.
CVE-2021-26704 1 Eprints 1 Eprints 2021-03-04 6.5 MEDIUM 8.8 HIGH
EPrints 3.4.2 allows remote attackers to execute arbitrary commands via crafted input to the verb parameter in a cgi/toolbox/toolbox URI.
CVE-2021-3342 1 Eprints 1 Eprints 2021-03-04 6.8 MEDIUM 9.8 CRITICAL
EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI.
CVE-2021-20658 1 Contec 2 Sv-cpt-mc310, Sv-cpt-mc310 Firmware 2021-03-01 10.0 HIGH 9.8 CRITICAL
SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an attacker to execute arbitrary OS commands with the web server privilege via unspecified vectors.
CVE-2021-26747 1 Netis-systems 4 Wf2411, Wf2411 Firmware, Wf2780 and 1 more 2021-02-24 10.0 HIGH 9.8 CRITICAL
Netis WF2780 2.3.40404 and WF2411 1.1.29629 devices allow Shell Metacharacter Injection into the ping command, leading to remote code execution.
CVE-2019-14923 1 Eyesofnetwork 1 Eyesofnetwork 2021-02-23 6.5 MEDIUM 8.8 HIGH
EyesOfNetwork 5.1 allows Remote Command Execution via shell metacharacters in the module/tool_all/ host field.
CVE-2020-27887 1 Eyesofnetwork 1 Eyesofnetwork 2021-02-23 9.0 HIGH 8.8 HIGH
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
CVE-2017-14119 1 Eyesofnetwork 1 Eyesofnetwork 2021-02-23 6.5 MEDIUM 8.8 HIGH
In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\snmpwalk.php does not properly restrict popen calls, which allows remote attackers to execute arbitrary commands via shell metacharacters in a parameter.
CVE-2017-14118 1 Eyesofnetwork 1 Eyesofnetwork 2021-02-23 6.5 MEDIUM 8.8 HIGH
In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all\tools\interface.php does not properly restrict exec calls, which allows remote attackers to execute arbitrary commands via shell metacharacters in the host_list parameter to module/tool_all/select_tool.php.
CVE-2017-14405 1 Eyesofnetwork 1 Eyesofnetwork 2021-02-23 6.5 MEDIUM 7.2 HIGH
The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows remote command execution via shell metacharacters in a hosts_cacti array parameter to module/admin_device/index.php.
CVE-2021-20655 1 Soliton 1 Filezen 2021-02-22 9.0 HIGH 7.2 HIGH
FileZen (V3.0.0 to V4.2.7 and V5.0.0 to V5.0.2) allows a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.
CVE-2020-35729 1 Klogserver 1 Klog Server 2021-02-18 10.0 HIGH 9.8 CRITICAL
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
CVE-2021-20648 1 Elecom 2 Wrc-300febk-s, Wrc-300febk-s Firmware 2021-02-15 7.7 HIGH 6.8 MEDIUM
ELECOM WRC-300FEBK-S allows an attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.