Total
3853 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-10799 | 1 Compile-sass Project | 1 Compile-sass | 2024-11-21 | 8.5 HIGH | 8.2 HIGH |
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization. | |||||
CVE-2019-10796 | 1 Rpi Project | 1 Rpi | 2024-11-21 | 6.8 MEDIUM | 9.8 CRITICAL |
rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization. | |||||
CVE-2019-10791 | 1 Promise-probe Project | 1 Promise-probe | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
promise-probe before 0.10.0 allows remote attackers to perform a command injection attack. The file, outputFile and options functions can be controlled by users without any sanitization. | |||||
CVE-2019-10789 | 1 Curling Project | 1 Curling | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization. | |||||
CVE-2019-10788 | 1 Dnt | 1 Im-metadata | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. | |||||
CVE-2019-10787 | 1 Dnt | 1 Im-resize | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization. | |||||
CVE-2019-10786 | 1 Network-manager Project | 1 Network-manager | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument. | |||||
CVE-2019-10783 | 1 Isof Project | 1 Isof | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input. | |||||
CVE-2019-10780 | 1 Bibtex-ruby Project | 1 Bibtex-ruby | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open. | |||||
CVE-2019-10778 | 1 Devcert-sanscache Project | 1 Devcert-sanscache | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization. | |||||
CVE-2019-10777 | 1 Amazon | 1 Aws Lambda | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName". | |||||
CVE-2019-10776 | 1 Git-diff-apply Project | 1 Git-diff-apply | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2. | |||||
CVE-2019-10774 | 1 Php-shellcommand Project | 1 Php-shellcommand | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
php-shellcommand versions before 1.6.1 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution. | |||||
CVE-2019-10669 | 1 Librenms | 1 Librenms | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru(). | |||||
CVE-2019-10662 | 1 Grandstream | 2 Ucm6204, Ucm6204 Firmware | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the backupUCMConfig file-backup parameter to the /cgi? URI. | |||||
CVE-2019-10660 | 1 Grandstream | 2 Gxv3611ir Hd, Gxv3611ir Hd Firmware | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the /goform/systemlog?cmd=set logserver field. | |||||
CVE-2019-10659 | 1 Grandstream | 4 Gxv3370, Gxv3370 Firmware, Wp820 and 1 more | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in a /manager?action=getlogcat priority field. | |||||
CVE-2019-10658 | 1 Grandstream | 2 Gwn7610, Gwn7610 Firmware | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/controller.icc.update_nds_webroot_from_tmp update_nds_webroot_from_tmp API call. | |||||
CVE-2019-10657 | 1 Grandstream | 4 Gwn7000, Gwn7000 Firmware, Gwn7610 and 1 more | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request. | |||||
CVE-2019-10656 | 1 Grandstream | 2 Gwn7000, Gwn7000 Firmware | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/uci.apply update_nds_webroot_from_tmp API call. |