Total
3837 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-11510 | 1 Asustor | 1 Adm | 2019-10-03 | 5.0 MEDIUM | 9.8 CRITICAL |
The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote code execution vulnerability in the portal/apis/aggrecate_js.cgi file by embedding OS commands in the 'script' parameter. | |||||
CVE-2017-11395 | 1 Trendmicro | 1 Smart Protection Server | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Command injection vulnerability in Trend Micro Smart Protection Server (Standalone) 3.1 and 3.2 server administration UI allows attackers with authenticated access to execute arbitrary code on vulnerable installations. | |||||
CVE-2018-0708 | 1 Qnap | 1 Q\'center | 2019-10-03 | 9.0 HIGH | 8.8 HIGH |
Command injection vulnerability in networking of QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to run arbitrary commands. | |||||
CVE-2018-15710 | 1 Nagios | 1 Nagios Xi | 2019-10-03 | 7.2 HIGH | 7.8 HIGH |
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php. | |||||
CVE-2018-16232 | 1 Ipfire | 1 Ipfire | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
An authenticated command injection vulnerability exists in IPFire Firewall before 2.21 Core Update 124 in backup.cgi. This allows an authenticated user with privileges for the affected page to execute arbitrary commands. | |||||
CVE-2018-1143 | 1 Belkin | 2 N750, N750 Firmware | 2019-10-03 | 10.0 HIGH | 9.8 CRITICAL |
A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to twonky_command.cgi. | |||||
CVE-2018-11181 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 39 of 46). | |||||
CVE-2017-7413 | 1 Horde | 1 Groupware | 2019-10-03 | 9.0 HIGH | 8.8 HIGH |
In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition through 5.2.17, OS Command Injection can occur if the attacker is an authenticated Horde Webmail user, has PGP features enabled in their preferences, and attempts to encrypt an email addressed to a maliciously crafted email address. | |||||
CVE-2018-11165 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 23 of 46). | |||||
CVE-2018-17867 | 1 Dasannetworks | 2 H660gw, H660gw Firmware | 2019-10-03 | 9.0 HIGH | 7.2 HIGH |
The Port Forwarding functionality on DASAN H660GW devices allows remote attackers to execute arbitrary code via shell metacharacters in the cgi-bin/adv_nat_virsvr.asp Addr parameter (aka the Local IP Address field). | |||||
CVE-2018-11151 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 7.2 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 9 of 46). | |||||
CVE-2017-11588 | 1 Cisco | 2 Residential Gateway, Residential Gateway Firmware | 2019-10-03 | 7.5 HIGH | 9.8 CRITICAL |
On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd. | |||||
CVE-2018-11152 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 10 of 46). | |||||
CVE-2018-11145 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46). | |||||
CVE-2017-9483 | 1 Cisco | 2 Dpc3939, Dpc3939 Firmware | 2019-10-03 | 10.0 HIGH | 9.8 CRITICAL |
The Comcast firmware on Cisco DPC3939 (firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST) devices allows Network Processor (NP) Linux users to obtain root access to the Application Processor (AP) Linux system via shell metacharacters in commands. | |||||
CVE-2018-11182 | 1 Quest | 1 Disk Backup | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 40 of 46). | |||||
CVE-2017-8051 | 1 Tenable | 1 Appliance | 2019-10-03 | 10.0 HIGH | 9.8 CRITICAL |
Tenable Appliance 3.5 - 4.4.0, and possibly prior versions, contains a flaw in the simpleupload.py script in the Web UI. Through the manipulation of the tns_appliance_session_user parameter, a remote attacker can inject arbitrary commands. | |||||
CVE-2018-1235 | 1 Emc | 2 Recoverpoint, Recoverpoint For Virtual Machines | 2019-10-03 | 10.0 HIGH | 9.8 CRITICAL |
Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege. | |||||
CVE-2018-8866 | 1 Vecna | 2 Vgo, Vgo Firmware | 2019-10-03 | 8.3 HIGH | 8.8 HIGH |
In Vecna VGo Robot versions prior to 3.0.3.52164, an attacker on an adjacent network could perform command injection. | |||||
CVE-2017-13713 | 1 Twsz | 2 Wifi Repeater, Wifi Repeater Firmware | 2019-10-03 | 6.5 MEDIUM | 8.8 HIGH |
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg. |