Vulnerabilities (CVE)

Filtered by CWE-78
Total 3666 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-27691 1 Tendacn 6 G0, G0 Firmware, G1 and 3 more 2024-02-28 10.0 HIGH 9.8 CRITICAL
Command Injection in Tenda G0 routers with firmware versions v15.11.0.6(9039)_CN and v15.11.0.5(5876)_CN , and Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted action/setDebugCfg request. This occurs because the "formSetDebugCfg" function executes glibc's system function with untrusted input.
CVE-2020-19907 1 Mitre 1 Caldera 2024-02-28 6.5 MEDIUM 8.8 HIGH
A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any command or service.
CVE-2021-3459 1 Motorola 2 Mm1000, Mm1000 Firmware 2024-02-28 7.2 HIGH 6.8 MEDIUM
A privilege escalation vulnerability was reported in the MM1000 device configuration web server, which could allow privileged shell access and/or arbitrary privileged commands to be executed on the adapter.
CVE-2021-33525 1 Eyesofnetwork 1 Eyesofnetwork 2024-02-28 9.0 HIGH 8.8 HIGH
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
CVE-2021-21805 1 Advantech 1 R-seenet 2024-02-28 10.0 HIGH 9.8 CRITICAL
An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
CVE-2021-29465 1 Discord 1 Discord-recon 2024-02-28 7.5 HIGH 9.8 CRITICAL
Discord-Recon is a bot for the Discord chat service. Versions of Discord-Recon 0.0.3 and prior contain a vulnerability in which a remote attacker is able to overwrite any file on the system with the command results. This can result in remote code execution when the user overwrite important files on the system. As a workaround, bot maintainers can edit their `setting.py` file then add `<` and `>` into the `RCE` variable inside of it to fix the issue without an update. The vulnerability is patched in version 0.0.4.
CVE-2021-27113 1 Dlink 2 Dir-816, Dir-816 Firmware 2024-02-28 10.0 HIGH 9.8 CRITICAL
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
CVE-2021-31915 1 Jetbrains 1 Teamcity 2024-02-28 7.5 HIGH 9.8 CRITICAL
In JetBrains TeamCity before 2020.2.4, OS command injection leading to remote code execution was possible.
CVE-2021-24023 1 Fortinet 2 Fortiai 3500f, Fortiai Firmware 2024-02-28 9.0 HIGH 8.8 HIGH
An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.
CVE-2021-32826 1 Proxyee-down Project 1 Proxyee-down 2024-02-28 9.3 HIGH 8.1 HIGH
Proxyee-Down is open source proxy software. An attacker being able to provide an extension script (eg: through a MiTM attack or by hosting a malicious extension) may be able to run arbitrary commands on the system running Proxyee-Down. For more details including a PoC see the referenced GHSL-2021-053. As of the writing of this CVE there is currently no patched version.
CVE-2021-32090 1 Localstack 1 Localstack 2024-02-28 10.0 HIGH 9.8 CRITICAL
The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter.
CVE-2020-10583 1 Invigo 1 Automatic Device Management 2024-02-28 9.0 HIGH 8.8 HIGH
The /admin/admapi.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote authenticated attackers to execute arbitrary OS commands on the server as the user running the application.
CVE-2021-31799 3 Debian, Oracle, Ruby-lang 4 Debian Linux, Jd Edwards Enterpriseone Tools, Rdoc and 1 more 2024-02-28 4.4 MEDIUM 7.0 HIGH
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
CVE-2021-31607 2 Fedoraproject, Saltstack 2 Fedora, Salt 2024-02-28 4.6 MEDIUM 7.8 HIGH
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
CVE-2021-1538 1 Cisco 1 Common Services Platform Collector 2024-02-28 9.0 HIGH 7.2 HIGH
A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to execute arbitrary code. This vulnerability is due to insufficient sanitization of configuration entries. An attacker could exploit this vulnerability by logging in as a super admin and entering crafted input to configuration options on the CSPC configuration dashboard. A successful exploit could allow the attacker to execute remote code as root.
CVE-2021-34611 1 Arubanetworks 1 Clearpass Policy Manager 2024-02-28 9.0 HIGH 7.2 HIGH
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
CVE-2021-23381 1 Killing Project 1 Killing 2024-02-28 7.5 HIGH 9.8 CRITICAL
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-3515 1 2ndquadrant 1 Pglogical 2024-02-28 7.2 HIGH 6.7 MEDIUM
A shell injection flaw was found in pglogical in versions before 2.3.4 and before 3.6.26. An attacker with CREATEDB privileges on a PostgreSQL server can craft a database name that allows execution of shell commands as the postgresql user when calling pglogical.create_subscription().
CVE-2021-30166 1 Meritlilin 82 P2g1022, P2g1022 Firmware, P2g1022x and 79 more 2024-02-28 9.0 HIGH 7.2 HIGH
The NTP Server configuration function of the IP camera device is not verified with special parameters. Remote attackers can perform a command Injection attack and execute arbitrary commands after logging in with the privileged permission.
CVE-2021-21433 1 Demon1a 1 Discord-recon 2024-02-28 6.5 MEDIUM 8.8 HIGH
Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2.