Total
3852 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-11149 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 7 of 46). | |||||
CVE-2018-11148 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 6 of 46). | |||||
CVE-2018-11147 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 5 of 46). | |||||
CVE-2018-11146 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 4 of 46). | |||||
CVE-2018-11145 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46). | |||||
CVE-2018-11144 | 1 Quest | 1 Disk Backup | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 2 of 46). | |||||
CVE-2018-11143 | 1 Quest | 1 Disk Backup | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 1 of 46). | |||||
CVE-2018-11139 | 1 Quest | 1 Kace System Management Appliance | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method. | |||||
CVE-2018-11138 | 1 Quest | 1 Kace System Management Appliance | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system. | |||||
CVE-2018-11132 | 1 Quest | 1 Kace System Management Appliance | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root. | |||||
CVE-2018-11077 | 2 Dell, Vmware | 3 Emc Avamar, Emc Integrated Data Protection Appliance, Vsphere Data Protection | 2024-11-21 | 7.2 HIGH | 6.7 MEDIUM |
'getlogs' utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege. | |||||
CVE-2018-10987 | 1 Diqee | 2 Diqee360, Diqee360 Firmware | 2024-11-21 | 8.5 HIGH | 7.5 HIGH |
An issue was discovered on Dongguan Diqee Diqee360 devices. The affected vacuum cleaner suffers from an authenticated remote code execution vulnerability. An authenticated attacker can send a specially crafted UDP packet, and execute commands on the vacuum cleaner as root. The bug is in the function REQUEST_SET_WIFIPASSWD (UDP command 153). A crafted UDP packet runs "/mnt/skyeye/mode_switch.sh %s" with an attacker controlling the %s variable. In some cases, authentication can be achieved with the default password of 888888 for the admin account. | |||||
CVE-2018-10967 | 2 D-link, Dlink | 4 Dir-550a Firmware, Dir-604m Firmware, Dir-550a and 1 more | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can forge an HTTP request to inject operating system commands that can be executed on the device with higher privileges, aka remote code execution. | |||||
CVE-2018-10905 | 1 Redhat | 2 Cloudforms, Cloudforms Management Engine | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
CloudForms Management Engine (cfme) is vulnerable to an improper security setting in the dRuby component of CloudForms. An attacker with access to an unprivileged local shell could use this flaw to execute commands as a high privileged user. | |||||
CVE-2018-10900 | 2 Debian, Gnome | 2 Debian Linux, Network Manager Vpnc | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root. | |||||
CVE-2018-10823 | 1 Dlink | 8 Dwr-111, Dwr-111 Firmware, Dwr-116 and 5 more | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals. | |||||
CVE-2018-10730 | 1 Phoenixcontact | 58 Fl Switch 3004t-fx, Fl Switch 3004t-fx Firmware, Fl Switch 3004t-fx St and 55 more | 2024-11-21 | 9.0 HIGH | 9.1 CRITICAL |
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection. | |||||
CVE-2018-10702 | 1 Moxa | 2 Awk-3121, Awk-3121 Firmware | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters. | |||||
CVE-2018-10699 | 1 Moxa | 2 Awk-3121, Awk-3121 Firmware | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_privatePass" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack. | |||||
CVE-2018-10697 | 1 Moxa | 2 Awk-3121, Awk-3121 Firmware | 2024-11-21 | 9.3 HIGH | 8.8 HIGH |
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack. |