Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-34081

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-01 Jun, 2022 | 14:31
Updated At-04 Aug, 2024 | 00:05
Rejected At-
Credits

OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:01 Jun, 2022 | 14:31
Updated At:04 Aug, 2024 | 00:05
Rejected At:
▼CVE Numbering Authority (CNA)

OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://advisory.checkmarx.net/advisory/CX-2021-4780
x_refsource_MISC
https://www.npmjs.com/package/gitsome
x_refsource_MISC
Hyperlink: https://advisory.checkmarx.net/advisory/CX-2021-4780
Resource:
x_refsource_MISC
Hyperlink: https://www.npmjs.com/package/gitsome
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://advisory.checkmarx.net/advisory/CX-2021-4780
x_refsource_MISC
x_transferred
https://www.npmjs.com/package/gitsome
x_refsource_MISC
x_transferred
Hyperlink: https://advisory.checkmarx.net/advisory/CX-2021-4780
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.npmjs.com/package/gitsome
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:02 Jun, 2022 | 14:15
Updated At:09 Jun, 2022 | 18:10

OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

gitsome_project
gitsome_project
>>gitsome>>Versions up to 0.2.3(inclusive)
cpe:2.3:a:gitsome_project:gitsome:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://advisory.checkmarx.net/advisory/CX-2021-4780cve@mitre.org
Exploit
Third Party Advisory
https://www.npmjs.com/package/gitsomecve@mitre.org
Product
Third Party Advisory
Hyperlink: https://advisory.checkmarx.net/advisory/CX-2021-4780
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.npmjs.com/package/gitsome
Source: cve@mitre.org
Resource:
Product
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

137Records found

CVE-2017-9274
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.8||HIGH
EPSS-0.47% / 63.78%
||
7 Day CHG~0.00%
Published-01 Mar, 2018 | 19:00
Updated-16 Sep, 2024 | 18:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
osc executes spec code during "osc commit"

A shell command injection in the obs-service-source_validator before 0.7 could be used to execute code as the packager when checking RPM SPEC files with specific macro constructs.

Action-Not Available
Vendor-openSUSESUSE
Product-obs-service-source_validatorobs-service-source_validator
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-6224
Matching Score-4
Assigner-Brocade Communications Systems, LLC
ShareView Details
Matching Score-4
Assigner-Brocade Communications Systems, LLC
CVSS Score-8.8||HIGH
EPSS-0.75% / 72.15%
||
7 Day CHG~0.00%
Published-13 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruckus Wireless Zone Director Controller firmware releases ZD9.x, ZD10.0.0.x, ZD10.0.1.x (less than 10.0.1.0.17 MR1 release) and Ruckus Wireless Unleashed AP Firmware releases 200.0.x, 200.1.x, 200.2.x, 200.3.x, 200.4.x. contain OS Command Injection vulnerabilities that could allow local authenticated users to execute arbitrary privileged commands on the underlying operating system by appending those commands in the Common Name field in the Certificate Generation Request.

Action-Not Available
Vendor-ruckuswirelessBrocade Communications Systems, Inc. (Broadcom Inc.)
Product-zonedirectorzonedirector_firmwareunleashedunleashed_firmwareZone Director Controller and Unleashed AP Firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-5414
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-8.1||HIGH
EPSS-0.51% / 65.57%
||
7 Day CHG~0.00%
Published-17 Mar, 2019 | 19:42
Updated-04 Aug, 2024 | 19:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

If an attacker can control the port, which in itself is a very sensitive value, they can inject arbitrary OS commands due to the usage of the exec function in a third-party module kill-port < 1.3.2.

Action-Not Available
Vendor-kill-port_projectn/a
Product-kill-portkill-port
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-5736
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-50.73% / 97.77%
||
7 Day CHG~0.00%
Published-11 Feb, 2019 | 00:00
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Action-Not Available
Vendor-d2iqlinuxcontainersn/aCanonical Ltd.openSUSENetApp, Inc.Docker, Inc.The Linux FoundationMicro Focus International LimitedRed Hat, Inc.Google LLCThe Apache Software FoundationHP Inc.Fedora Project
Product-enterprise_linux_serverubuntu_linuxopenshiftenterprise_linuxbackports_slerunclxcsolidfiremesoshci_management_nodeonespherefedoracontainer_development_kitkubernetes_enginedc\/osdockerservice_management_automationleapn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-2642
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-18.09% / 94.92%
||
7 Day CHG~0.00%
Published-18 Mar, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sophos Web Appliance before 3.7.8.2 allows (1) remote attackers to execute arbitrary commands via shell metacharacters in the client-ip parameter to the Block page, when using the user_workstation variable in a customized template, and remote authenticated users to execute arbitrary commands via shell metacharacters in the (2) url parameter to the Diagnostic Tools functionality or (3) entries parameter to the Local Site List functionality.

Action-Not Available
Vendor-n/aSophos Ltd.
Product-web_appliance_firmwareweb_appliancen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-1933
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-1.50% / 80.40%
||
7 Day CHG~0.00%
Published-25 Apr, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.

Action-Not Available
Vendor-documentcloudn/aRuby
Product-karteek-docsplitrubyn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-15049
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-28.86% / 96.38%
||
7 Day CHG~0.00%
Published-19 Dec, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.

Action-Not Available
Vendor-n/aZoom Communications, Inc.
Product-zoomn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-39826
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-8.6||HIGH
EPSS-3.84% / 87.71%
||
7 Day CHG~0.00%
Published-27 Sep, 2021 | 15:42
Updated-17 Sep, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Adobe Digital Editions Command Execution Vulnerability

Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary command execution vulnerability. An authenticated attacker could leverage this vulnerability to execute arbitrary commands. User interaction is required to abuse this vulnerability in that a user must open a maliciously crafted .epub file.

Action-Not Available
Vendor-Adobe Inc.Apple Inc.
Product-digital_editionsmacosDigital Editions
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-2090
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-1.54% / 80.62%
||
7 Day CHG~0.00%
Published-27 May, 2014 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-uplawskin/a
Product-creme_fraichen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-1947
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.3||HIGH
EPSS-1.29% / 78.85%
||
7 Day CHG~0.00%
Published-25 Apr, 2013 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.

Action-Not Available
Vendor-kelly_d._reddingn/aRuby
Product-kelredd-pruviewrubyn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2013-0928
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.3||HIGH
EPSS-78.67% / 99.00%
||
7 Day CHG~0.00%
Published-21 Jan, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP "run command" operation.

Action-Not Available
Vendor-n/aELAN Microelectronics Corporation
Product-alphastorn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2012-4981
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-5.74% / 90.10%
||
7 Day CHG~0.00%
Published-23 Jan, 2020 | 14:25
Updated-06 Aug, 2024 | 20:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Toshiba ConfigFree 8.0.38 has a CF7 File Remote Command Execution Vulnerability

Action-Not Available
Vendor-toshiban/a
Product-configfreen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-17405
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-88.39% / 99.47%
||
7 Day CHG~0.00%
Published-15 Dec, 2017 | 09:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRubyRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationrubyenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14705
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-4.64% / 88.87%
||
7 Day CHG~0.00%
Published-22 Sep, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DenyAll WAF before 6.4.1 allows unauthenticated remote command execution via TCP port 3001 because shell metacharacters can be inserted into the type parameter to the tailDateFile function in /webservices/stream/tail.php. An iToken authentication parameter is required but can be obtained by exploiting CVE-2017-14706. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments.

Action-Not Available
Vendor-denyalln/a
Product-web_application_firewalli-suiten/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-36260
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.8||CRITICAL
EPSS-94.44% / 99.98%
||
7 Day CHG~0.00%
Published-22 Sep, 2021 | 12:07
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-01-24||Apply updates per vendor instructions.

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

Action-Not Available
Vendor-n/aHIKVISION
Product-ds-2cd2386g2-i\(u\)ds-7108ni-q1\/mds-2cd3386g2-is\(u\)ds-2df8a442ixs-ael\(t5\)ds-2cd2383g2-i\(u\)ds-2df8242ix-aely\(t3\)ds-2td6267-100c4l\/wy_firmwareds-2cd2121g0-i\(w\)\(s\)_firmwareds-2cd2643g2-izs_firmwareds-2cd3347g2-ls\(u\)ds-2cd2121g1-i\(w\)ds-7604ni-k1\/4p\/4gds-2df8442ixs-aelwy\(t5\)_firmwareds-2df8442ixs-aelw\(t2\)_firmwareds-7104ni-q1\/4pds-7616ni-k1_firmwareds-2df8442ixs-aely\(t5\)_firmwareds-2td1217b-6\/pa_firmwareds-2cd2666g2-izs_firmwareds-2cd3026g2-iu\/sl_firmwareds-2cd3643g2-izs_firmwareds-7608ni-k1\/4gds-2df6a436x-aely\(t5\)ds-2cd3156g2-isds-2df6a836x-ael\(t5\)_firmwareds-2cd3063g2-iuptz-n5225i-a_firmwareds-2df8225ix-ael\(t5\)ds-2cd3023g2-iu_firmwareds-2cd2066g2-iu\/sl_firmwareds-7108ni-q1\/8p_firmwareds-7108ni-q1ds-2td1117-2\/pa_firmwareds-2cd3023g2-iuds-2cd2583g2-i\(s\)_firmwareds-2cd2543g2-i\(ws\)ds-2cd2186g2-isuds-2cd2586g2-i\(s\)ds-2cd2086g2-i\(u\)_firmwareds-2cd2643g2-izsds-2cd3343g2-iu_firmwareds-7608ni-k1_firmwareds-2cd3723g2-izs_firmwareds-7108ni-q1_firmwareds-2td4166t-9_firmwareds-2cd2321g0-i\/nfds-2cd2686g2-izsu\/sl_firmwareds-2cd2066g2-i\(u\)_firmwareds-2cd2366g2-i\(u\)_firmwareds-2td6267-50h4l\/w_firmwareds-2df8a442ixs-ael\(t5\)_firmwareds-7608ni-k1\/8p\/4gds-7604ni-q1\/4p_firmwareds-2cd2121g0-i\(w\)\(s\)ptz-n2204i-de3_firmwareds-2df7232ix-aelw\(t3\)_firmwareds-2cd2523g2-i\(s\)_firmwareds-2df8242ix-aelw\(t3\)ds-2df8442ixs-aelwy\(t5\)ds-2cd2163g2-iu_firmwareds-2td8166-180ze2f\/v2_firmwareds-2cd2366g2-isu\/sl_firmwareds-2cd2683g2-izsds-7608ni-q1_firmwareids-2sk718mxs-d_firmwareds-2xe6422fwd-izhrsds-2cd3143g2-i\(s\)uds-2cd3356g2-isds-2cd3547g2-ls_firmwareds-2cd2326g2-isu\/sl_firmwareds-2td6267-75c4l\/w_firmwareds-2df8242i5x-aelw\(t3\)ds-7616ni-q2\/16pds-2cd2083g2-i\(u\)ds-2cd3523g2-is_firmwareds-2td8167-230zg2f\/wds-2td4167-50\/w_firmwareds-2cd2046g2-iu\/sl_firmwareds-2cd2527g2-lsds-2cd2327g2-l\(u\)ds-2cd3326g2-isu\/slds-2cd2686g2-izs_firmwareds-2cd2183g2-i\(s\)_firmwareds-2df7225ix-ael\(t3\)_firmwareds-2td1217b-3\/pads-2td1217b-6\/pads-2cd3756g2-izs_firmwareds-2cd3686g2-izs_firmwareds-2cd3156g2-is_firmwareids-2vs435-f840-ey\(t3\)ds-2df6a836x-ael\(t5\)ds-2td8166-180ze2f\/v2ids-2vs435-f840-eyds-2cd2646g2-izsu\/sl_firmwareds-2cd2623g2-izs_firmwareds-2cd2143g2-i\(s\)_firmwareds-2cd2183g2-i\(u\)_firmwareds-2cd2363g2-i\(u\)ds-2cd3343g2-iuds-2df8425ix-aelw\(t5\)_firmwareds-2cd3526g2-isds-2cd3026g2-isds-2df8425ix-ael\(t5\)ds-2cd3156g2-is\(u\)_firmwareds-2df8442ixs-aely\(t5\)ds-2cd2766g2-izs_firmwareds-2dy92500x-a\(t5\)_firmwareds-2cd3623g2-izs_firmwareds-2df8242ix-ael\(t5\)ds-2td6236t-50h2lds-2dy9236x-a\(t3\)_firmwareds-2cd2121g1-idwds-2cd2526g2-i\(s\)ds-2cd2166g2-i\(su\)ds-2cd2623g2-izsds-2cd2721g0-i\(z\)\(s\)_firmwareds-7108ni-q1\/8p\/mids-2pt9a144mxs-d\/t2ds-2cd3043g2-iu_firmwareds-2xe6452f-izh\(r\)sds-2td6267-75c4l\/wds-7616ni-q1ds-2dy92500x-a\(t5\)ds-2xe6422fwd-izhrs_firmwareds-2cd2583g2-i\(s\)ds-2cd3126g2-is\(u\)_firmwareids-2sk8144ixs-d\/jds-2td1117-6\/pads-2cd2563g2-i\(s\)ds-2cd2547g2-ls_firmwareds-7616ni-q2\/16p_firmwareds-2cd2723g2-izsds-2cd2127g2-\(-su\)_firmwareds-2cd2123g2-iuds-2cd3047g2-lsds-7604ni-k1_firmwareds-2cd3686g2-izsds-2df6a436x-ael\(t5\)ds-2cd2666g2-izsds-7604ni-k1ds-2cd3743g2-izs_firmwareds-2cd3186g2-is\(u\)_firmwareds-7616ni-q2ds-2df8250i8x-ael\(t3\)ds-2dy9236i8x-a\(t3\)_firmwareds-2td1117-6\/pa_firmwareds-7104ni-q1\/4p_firmwareds-2cd2183g2-i\(s\)ds-2cd2666g2-izsu\/sl_firmwareds-2df6a225x-ael\)t3\)_firmwareds-2cd2127g2-\(-su\)ds-2df6a825x-ael_firmwareds-2td8166-150zh2f\/v2ds-2td4137-25\/w_firmwareds-2td4137-50\/w_firmwareds-2cd2723g2-izs_firmwareds-2cd2027g2-lu\/sl_firmwareds-7108ni-q1\/m_firmwareds-2cd2086g2-iu\/sl_firmwareds-2cd2666g2-izsu\/slds-2cd3386g2-isds-2td8167-230zg2f\/w_firmwareds-7608ni-k1\/8p\/4g_firmwareds-2cd2421g0-i\(d\)wds-2df7225ix-aelw\(t3\)ptz-n4215-de3_firmwareds-2df8225ix-ael\(t3\)ds-2xe6482f-izhrsds-2cd2421g0-i\(d\)\(w\)ds-2td4167-50\/wds-2cd3726g2-izs_firmwareds-2cd2087g2-l\(u\)_firmwareds-2dyh2a0ixs-d\(t2\)ptz-n2204i-de3ds-2cd3356g2-is\(u\)_firmwareds-2cd2343g2-i\(u\)_firmwareds-2td4136t-9ds-2cd3786g2-izsds-2df8242i5x-ael\(t3\)ds-2cd2721g0-i\(z\)\(s\)ds-2df8250i8x-ael\(t3\)_firmwareds-2df5225x-ae3\(t3\)ds-2cd3123g2-i\(s\)u_firmwareds-2td6237-50h4l\/w_firmwareds-2cd3563g2-is_firmwareds-2td6266t-25h2l_firmwareds-2df6a436x-ael\(t3\)ds-2cd2743g2-izs_firmwareds-2cd2021g1-i\(w\)_firmwareds-2cd2063g2-i\(u\)ds-2cd3026g2-is_firmwareds-2df6a436x-ael\(t5\)_firmwareds-2cd3323g2-iuds-2cd2347g2-l\(u\)_firmwareds-2cd3586g2-isds-2df8a442ixs-af\/sp\(t5\)_firmwareds-2cd2566g2-i\(s\)ds-2df8442ixs-aelw\(t2\)ds-2cd2546g2-i\(s\)_firmwareds-2cd2363g2-i\(u\)_firmwareds-2cd2186g2-i\(su\)_firmwareds-2cd2446g2-i_firmwareds-7608ni-q2\/8p_firmwareds-2cd2421g0-i\(d\)w_firmwareptz-n4215-de3ds-2cd3326g2-isu\/sl_firmwareds-2dyh2a0ixs-d\(t2\)_firmwareds-7608ni-q1\/8p_firmwareptz-n4215i-de_firmwareds-2df5225x-ael\(t3\)_firmwareds-7604ni-k1\/4p\/4g_firmwareds-7608ni-q1\/8pds-7608ni-k1ds-2cd2366g2-isu\/slds-2td4166t-9ds-2df8242i5x-aelw\(t5\)_firmwareds-2df8225ih-aelds-2cd2121g1-idw_firmwareptz-n5225i-ads-2df8a442ixs-ael\(t2\)_firmwareds-2dy9236i8x-ads-2td6266t-25h2lds-2cd3626g2-izs_firmwareds-7104ni-q1_firmwareds-2cd2526g2-i\(s\)_firmwareds-2cd2586g2-i\(s\)_firmwareds-2cd2183g2-iu_firmwareds-2cd3756g2-izsds-2cd3663g2-izs_firmwareids-2vs435-f840-ey\(t3\)_firmwareds-2cd3123g2-i\(s\)uds-2df8236i5x-aelwds-2td4137-25\/wds-2cd3663g2-izsds-2cd3626g2-izsds-2df8225ih-ael\(w\)ds-2td8166-75c2f\/v2ds-7616ni-k1ds-2df8a442nxs-ael\(t5\)ds-2cd2621g0-i\(z\)\(s\)ds-2dy9240ix-a\(t5\)ds-2cd3763g2-izsds-2xe6442f-izhrs\(b\)_firmwareds-2cd2686g2-izsds-2df8a842ixs-ael\(t5\)ds-2td6237-75c4l\/w_firmwareds-7604ni-q1_firmwareds-2cd2186g2-isu_firmwareds-2cd3086g2-isds-2cd2386g2-isu\/slds-2df8442ixs-aelw\(t5\)ds-2cd3056g2-is_firmwareds-2cd2686g2-izsu\/slds-2td1217b-3\/pa_firmwareds-2df8225ix-aelw\(t3\)ds-2cd2123g2-iu_firmwareds-2df8242ix-ael\(t5\)_firmwareds-2cd2386g2-i\(u\)_firmwareds-2cd3386g2-is_firmwareds-2cd3743g2-izsds-2cd3556g2-is_firmwareds-2cd3163g2-i\(s\)uds-2cd2347g2-lsu\/slds-2cd2163g2-iuptz-n4225i-de_firmwareds-2df7232ix-ael\(t3\)_firmwareds-2td6236t-50h2l_firmwareptz-n4215i-deds-2cd3163g2-i\(s\)u_firmwareds-2xe6482f-izhrs_firmwareids-2sk8144ixs-d\/j_firmwareds-2cd3623g2-izsds-2cd2043g2-i\(u\)_firmwareds-2cd2183g2-iuds-2df6a825x-aelds-2cd2366g2-i\(u\)ds-2cd3063g2-iu_firmwareds-2cd2186g2-i\(su\)ds-7608ni-k1\/8pds-2cd2347g2-l\(u\)ptz-n2404i-de3ds-2cd2327g2-l\(u\)_firmwareds-2df8a842ixs-ael\(t5\)_firmwareds-2cd2047g2-l\(u\)_firmwareds-2cd3086g2-is_firmwareds-2cd3056g2-iu\/slds-2cd2626g2-izsu\/slds-2cd2386g2-isu\/sl_firmwareds-2cd3056g2-iu\/sl_firmwareds-2cd3156g2-is\(u\)ds-2cd2547g2-lsds-2xe6452f-izh\(r\)s_firmwareds-2df8225ih-ael\(w\)_firmwareds-2td4167-25\/wds-2cd2027g2-l\(u\)ds-2cd2786g2-izsds-2df8442ixs-ael\(t5\)ds-2cd2163g2-i\(s\)_firmwareds-2cd2323g2-i\(u\)_firmwareds-2cd2663g2-izs_firmwareds-2cd2147g2-l\(su\)ds-2cd2783g2-izsds-760ni-k1\/4pds-2dy9236ix-a\(t3\)ds-2df6a436x-aely\(t5\)_firmwareds-2dy9236ix-a\(t3\)_firmwareds-2cd2066g2-iu\/slds-2cd2147g2-l\(su\)_firmwareds-2cd2086g2-iu\/slds-2df8436i5x-aelw\(t3\)_firmwareds-2cd2766g2-izsds-2df8425ix-aelw\(t5\)ds-2xe6242f-is\/316l\(b\)_firmwareds-2cd2143g2-i\(s\)ds-7104ni-q1\/mds-2cd2023g2-i\(u\)_firmwareds-2cd2566g2-i\(s\)_firmwareds-2df8a442ixs-aely\(t5\)_firmwareds-7104ni-q1\/m_firmwareds-2cd2087g2-l\(u\)ds-7608ni-q2\/8pds-2df6a425x-ael\(t3\)ds-2cd2343g2-i\(u\)ds-7608ni-q1ds-2cd2426g2-ids-2cd2323g2-i\(u\)ds-2dy9236x-a\(t3\)ds-2cd2646g2-izsu\/slds-2td8166-150zh2f\/v2_firmwareds-2td1117-3\/pads-2df8236i5x-aelw_firmwareds-2df8425ix-ael\(t5\)_firmwareds-2cd2346g2-isu\/sl_firmwareds-2cd2547g2-lzsds-2cd2683g2-izs_firmwareds-2td6237-50h4l\/wds-2td6267-50h4l\/wds-2df7225ix-ael\(t3\)ds-2df8225ix-ael\(t5\)_firmwareds-2cd2121g1ds-2df6a236x-ael\(t3\)_firmwareds-2td6266t-50h2lds-2df8225ix-aelw\(t3\)_firmwareds-2cd2326g2-isu\/slds-2td8166-100c2f\/v2_firmwareds-2cd3347g2-ls\(u\)_firmwareds-2cd2547g2-lzs_firmwareds-2cd2021g1-i\(w\)ds-2cd3356g2-is_firmwareds-2cd3356g2-isu\/sl_firmwareds-2dy9236i8x-a_firmwareds-7608ni-q2_firmwareds-2td8167-150zc4f\/w_firmwareds-2df8442ixs-ael\(t5\)_firmwareds-2cd2183g2-i\(u\)ds-2td8167-190ze2f\/wyds-7108ni-q1\/8pds-2td1117-3\/pa_firmwareds-2cd3543g2-isds-2cd3563g2-isds-2cd3056g2iu\/sl_firmwareds-2df8425ix-aelw\(t3\)ids-2sk718mxs-dds-2cd2663g2-izsds-2df7232ix-ael\(t3\)ds-2cd2026g2-iu\/slds-2cd3126g2-isds-2td8167-230zg2f\/wy_firmwareds-2cd2121g1-i\(w\)_firmwareds-2cd2526g2-is_firmwareds-2td6267-100c4l\/w_firmwareds-2cd2046g2-iu\/slds-2cd2621g0-i\(z\)\(s\)_firmwareds-2cd2523g2-i\(u\)_firmwareds-2xe6242f-is\/316l\(b\)ds-2cd3656g2-izs_firmwareds-2cd2526g2-isds-2td8167-150zc4f\/wds-2df8225ih-ael_firmwareds-2cd2387g2-l\(u\)_firmwareds-2cd2047g2-l\(u\)ds-2cd3363g2-iu_firmwareds-2td6267-100c4l\/wyds-2cd2786g2-izs_firmwareds-2cd2383g2-i\(u\)_firmwareds-2cd2166g2-i\(su\)_firmwareds-2dy9250izs-a\(t5\)ds-2df5225x-ae3\(t3\)_firmwareds-2df6a236x-ael\(t3\)ds-7104ni-q1\/4p\/m_firmwareds-2cd3543g2-is_firmwareds-2df8425ix-aelw\(t3\)_firmwareds-2cd3026g2-iu\/slds-2td8166-75c2f\/v2_firmwareds-2cd2543g2-i\(ws\)_firmwareds-2cd3043g2-iuds-2cd2163g2-i\(s\)ds-2cd2421g0-i\(d\)\(w\)_firmwareds-7604ni-q1\/4pds-2td6237-75c4l\/wptz-n4225i-deds-2cd2523g2-i\(u\)ds-2cd2446g2-ids-2cd2387g2-l\(u\)ds-2cd3323g2-iu_firmwareds-7608ni-k1\/8p_firmwareds-2cd2523g2-i\(s\)ds-7104ni-q1ds-2cd3586g2-is_firmwareds-2df7232ix-aelw\(t3\)ds-2cd3047g2-ls_firmwareds-7608ni-k1\/4g_firmwareds-2cd3056g2iu\/slds-2td8167-190ze2f\/wy_firmwareds-2td4137-50\/wds-2td6267-100c4l\/wds-2df5232x-ae3\)t3\)ds-2cd2066g2-i\(u\)ds-2df8436i5x-aelw\(t3\)ds-2df8242i5x-aelw\(t5\)ds-2cd2043g2-i\(u\)ds-2cd2783g2-izs_firmwareds-2cd2123g2-i\(s\)ds-7616ni-q2_firmwareds-2df8a442ixs-ael\(t2\)ds-7104ni-q1\/4p\/mds-2df8242i5x-ael\(t3\)_firmwareds-2cd3126g2-is_firmwareds-2df8242i5x-aelw\(t3\)_firmwareds-2cd3643g2-izsds-2dy9236i8x-a\(t3\)ds-2cd2563g2-i\(s\)_firmwareds-2td4167-25\/w_firmwareds-2cd3547g2-lsds-2cd3363g2-iuds-2td8167-190ze2f\/w_firmwareds-760ni-k1\/4p_firmwareds-2cd3056g2-isds-2df7225ix-aelw\(t3\)_firmwareds-2df5232x-ael\(t3\)ds-2df6a436x-ael\(t3\)_firmwareds-2cd3143g2-i\(s\)u_firmwareds-2cd2023g2-i\(u\)ds-2cd3356g2-is\(u\)ds-2td4136t-9_firmwareids-2vs435-f840-ey_firmwareds-2cd2626g2-izsu\/sl_firmwareds-2dy9250izs-a\(t5\)_firmwareds-2cd3723g2-izsds-2cd2347g2-lsu\/sl_firmwareds-2cd3356g2-isu\/slds-2df8242ix-aelw\(t3\)_firmwareds-2cd2027g2-l\(u\)_firmwareds-2df8425ix-ael\(t3\)ds-2df8a442ixs-af\/sp\(t5\)ds-2cd2321g0-i\/nf_firmwareds-2td6267-75c4l\/wy_firmwareds-2df8225ix-ael\(t3\)_firmwareds-2df5232x-ael\(t3\)_firmwareds-2df8225ix-aelw\(t5\)_firmwareds-2df6a225x-ael\)t3\)ds-2td6266t-50h2l_firmwareds-2cd2121g1_firmwareds-2cd2083g2-i\(u\)_firmwareds-2td8166-100c2f\/v2ds-2dy9240ix-a\(t5\)_firmwareds-7616ni-q1_firmwareds-2cd3656g2-izsds-7108ni-q1\/8p\/m_firmwareds-2cd3726g2-izsds-2cd2027g2-lu\/slds-2cd2086g2-i\(u\)ds-2cd2546g2-i\(s\)ds-2cd2143g2-iuds-2cd3186g2-is\(u\)ds-2cd2763g2-izs_firmwareds-2td6267-75c4l\/wyds-2df8242ix-aely\(t3\)_firmwareds-2cd2026g2-iu\/sl_firmwareds-2cd2743g2-izsds-2td8167-230zg2f\/wyds-2cd3556g2-isds-2td1117-2\/paptz-n2404i-de3_firmwareds-2df5225x-ael\(t3\)ds-7604ni-q1ds-2td8166-150ze2f\/v2_firmwareds-7608ni-q2ds-2cd2426g2-i_firmwareds-2cd2346g2-isu\/slds-2cd3126g2-is\(u\)ds-2cd2527g2-ls_firmwareds-2cd3386g2-is\(u\)_firmwareds-2cd2763g2-izsds-2cd2063g2-i\(u\)_firmwareds-2cd3523g2-isds-2cd3526g2-is_firmwareds-2td8167-190ze2f\/wds-2df8a442ixs-aely\(t5\)ds-2cd2123g2-i\(s\)_firmwareds-2xe6442f-izhrs\(b\)ds-2df8225ix-aelw\(t5\)ds-2df8442ixs-aelw\(t5\)_firmwareds-2td8166-150ze2f\/v2ds-2cd3786g2-izs_firmwareds-2df8425ix-ael\(t3\)_firmwareds-2df8a442nxs-ael\(t5\)_firmwareds-2df5232x-ae3\)t3\)_firmwareds-2df6a425x-ael\(t3\)_firmwareds-2cd3763g2-izs_firmwareids-2pt9a144mxs-d\/t2_firmwareds-2cd2143g2-iu_firmwaren/aSecurity cameras web server
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2005-2368
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.52% / 80.49%
||
7 Day CHG~0.00%
Published-26 Jul, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

Action-Not Available
Vendor-vim_development_groupn/a
Product-vimn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3621
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.28% / 50.66%
||
7 Day CHG~0.00%
Published-23 Dec, 2021 | 00:00
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora Project
Product-virtualizationenterprise_linux_server_ausenterprise_linuxvirtualization_hostsssdfedoraenterprise_linux_eusenterprise_linux_server_tussssd
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34078
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.54% / 80.60%
||
7 Day CHG~0.00%
Published-01 Jun, 2022 | 14:31
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file.

Action-Not Available
Vendor-adpn/a
Product-lifion-verifiy-dependenciesn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-46117
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.6||CRITICAL
EPSS-2.95% / 85.91%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 18:21
Updated-12 Sep, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Inadequate validation of retrieved subdomains may lead to a Remote Code Execution in reconFTW

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities. A vulnerability has been identified in reconftw where inadequate validation of retrieved subdomains may lead to a Remote Code Execution (RCE) attack. An attacker can exploit this vulnerability by crafting a malicious CSP entry on it's own domain. Successful exploitation can lead to the execution of arbitrary code within the context of the application, potentially compromising the system. This issue has been addressed in version 2.7.1.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-six2dezsix2dez
Product-reconftwreconftw
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-35062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.31% / 53.62%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 19:02
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Shell Metacharacter Injection vulnerability in result.php in DRK Odenwaldkreis Testerfassung March-2021 allow an attacker with a valid token of a COVID-19 test result to execute shell commands with the permissions of the web server.

Action-Not Available
Vendor-testzentrum-odwn/a
Product-testerfassungn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-3989
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.40% / 79.66%
||
7 Day CHG~0.00%
Published-11 Dec, 2019 | 22:38
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Blink XT2 Sync Module firmware prior to 2.13.11 allows remote attackers to execute arbitrary commands on the device due to improperly sanitized input when retrieving internal network configuration data.

Action-Not Available
Vendor-amazonn/a
Product-blink_xt2_sync_module_firmwareblink_xt2_sync_moduleAmazon's Blink XT2 Sync Module
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32772
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.87% / 74.32%
||
7 Day CHG~0.00%
Published-03 Aug, 2021 | 14:15
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in helper_entries

Poddycast is a podcast app made with Electron. Prior to version 0.8.1, an attacker can create a podcast or episode with malicious characters and execute commands on the client machine. The application does not clean the HTML characters of the podcast information obtained from the Feed, which allows the injection of HTML and JS code (cross-site scripting). Being an application made in electron, cross-site scripting can be scaled to remote code execution, making it possible to execute commands on the machine where the application is running. The vulnerability is patched in Poddycast version 0.8.1.

Action-Not Available
Vendor-MrChuckomoElectron (OpenJS Foundation)
Product-poddycastpoddycast
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-32826
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.24% / 47.48%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 21:00
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote code execution in Proxyee-Down

Proxyee-Down is open source proxy software. An attacker being able to provide an extension script (eg: through a MiTM attack or by hosting a malicious extension) may be able to run arbitrary commands on the system running Proxyee-Down. For more details including a PoC see the referenced GHSL-2021-053. As of the writing of this CVE there is currently no patched version.

Action-Not Available
Vendor-proxyee-down_projectproxyee-down-org
Product-proxyee-downproxyee-down
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3060
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-8.1||HIGH
EPSS-42.41% / 97.36%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 17:10
Updated-16 Sep, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PAN-OS: OS Command Injection in Simple Certificate Enrollment Protocol (SCEP)

An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.

Action-Not Available
Vendor-Palo Alto Networks, Inc.
Product-prisma_accesspan-osPAN-OSPrisma Access
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-33368
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.48% / 63.91%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 00:00
Updated-10 Jul, 2025 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the build method in DonwloadPromptScreen

Action-Not Available
Vendor-plasmoappn/aplasmoapp
Product-rpsharen/arpshare
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-25626
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-1.38% / 79.50%
||
7 Day CHG~0.00%
Published-19 Feb, 2024 | 19:31
Updated-03 Feb, 2025 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Yocto Project Security Advisory - BitBake/Toaster

Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server's shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2.

Action-Not Available
Vendor-yoctoprojectyocto_projectThe Linux Foundation
Product-yoctopokyyoctoproject
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2011-2195
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.42% / 86.98%
||
7 Day CHG~0.00%
Published-26 Oct, 2021 | 12:10
Updated-06 Aug, 2024 | 22:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in WebSVN 2.3.2. Without prior authentication, if the 'allowDownload' option is enabled in config.php, an attacker can invoke the dl.php script and pass a well formed 'path' argument to execute arbitrary commands against the underlying operating system.

Action-Not Available
Vendor-websvnn/a
Product-websvnwebsvn
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2011-10007
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
ShareView Details
Matching Score-4
Assigner-9b29abf9-4ab0-4765-b253-1875cd9b441e
CVSS Score-8.8||HIGH
EPSS-0.06% / 17.79%
||
7 Day CHG~0.00%
Published-05 Jun, 2025 | 11:57
Updated-11 Jun, 2025 | 12:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted file name

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \     -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)

Action-Not Available
Vendor-RCLAMP
Product-File::Find::Rule
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2010-1885
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-9.3||HIGH
EPSS-91.47% / 99.66%
||
7 Day CHG~0.00%
Published-14 Jun, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MPC::HexToNum function in helpctr.exe in Microsoft Windows Help and Support Center in Windows XP and Windows Server 2003 does not properly handle malformed escape sequences, which allows remote attackers to bypass the trusted documents whitelist (fromHCP option) and execute arbitrary commands via a crafted hcp:// URL, aka "Help Center URL Validation Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2003windows_xpwindows_2003_servern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2010-1423
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-68.95% / 98.57%
||
7 Day CHG~0.00%
Published-15 Apr, 2010 | 21:12
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows remote attackers to execute arbitrary code via the (1) -J or (2) -XXaltjvm argument to javaws.exe, which is processed by the launch method. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aOracle Corporation
Product-jdkjren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2010-1132
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-20.32% / 95.31%
||
7 Day CHG~0.00%
Published-26 Mar, 2010 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message.

Action-Not Available
Vendor-georg_greven/a
Product-spamassassin_milter_pluginn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-12581
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.17% / 77.78%
||
7 Day CHG~0.00%
Published-06 Aug, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GitHub Electron before 1.6.8 allows remote command execution because of a nodeIntegration bypass vulnerability. This also affects all applications that bundle Electron code equivalent to 1.6.8 or earlier. Bypassing the Same Origin Policy (SOP) is a precondition; however, recent Electron versions do not have strict SOP enforcement. Combining an SOP bypass with a privileged URL internally used by Electron, it was possible to execute native Node.js primitives in order to run OS commands on the user's host. Specifically, a chrome-devtools://devtools/bundled/inspector.html window could be used to eval a Node.js child_process.execFile API call.

Action-Not Available
Vendor-n/aElectron Userland
Product-electronn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-23732
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-9||CRITICAL
EPSS-0.84% / 73.84%
||
7 Day CHG~0.00%
Published-22 Nov, 2021 | 17:00
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Code Execution

This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.

Action-Not Available
Vendor-quobjectn/a
Product-docker-cli-jsdocker-cli-js
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2009-1792
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-1.61% / 81.03%
||
7 Day CHG~0.00%
Published-29 May, 2009 | 18:00
Updated-07 Aug, 2024 | 05:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The system.openURL function in StoneTrip Ston3D StandalonePlayer (aka S3DPlayer StandAlone) 1.6.2.4 and 1.7.0.1 and WebPlayer (aka S3DPlayer Web) 1.6.0.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the first argument (the sURL argument).

Action-Not Available
Vendor-stonetripn/aLinux Kernel Organization, IncApple Inc.Microsoft Corporation
Product-s3dplayer_weblinux_kernels3dplayer_standalonewindowsmacosn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-8813
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-94.14% / 99.90%
||
7 Day CHG~0.00%
Published-22 Feb, 2020 | 00:00
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

Action-Not Available
Vendor-opmantekn/aDebian GNU/LinuxFedora ProjectopenSUSEThe Cacti Group, Inc.
Product-debian_linuxcactifedorasuse_linux_enterprise_serveropen-auditsuse_package_hubn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-7825
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.51% / 65.42%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 15:13
Updated-17 Sep, 2024 | 01:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform.

Action-Not Available
Vendor-tobesoftTOBESOFT
Product-miplatformMiPlatform 320, 320U, 330, 330U
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2009-2011
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.3||HIGH
EPSS-74.19% / 98.79%
||
7 Day CHG~0.00%
Published-16 Jun, 2009 | 20:26
Updated-07 Aug, 2024 | 05:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Worldweaver DX Studio Player 3.0.29.0, 3.0.22.0, 3.0.12.0, and probably other versions before 3.0.29.1, when used as a plug-in for Firefox, does not restrict access to the shell.execute JavaScript API method, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes this method.

Action-Not Available
Vendor-dxstudion/aMozilla Corporation
Product-firefoxdx_studio_playern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-41288
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.24% / 46.92%
||
7 Day CHG~0.00%
Published-05 Jan, 2024 | 16:19
Updated-17 Apr, 2025 | 18:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Video Station

An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-video_stationVideo Station
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-19604
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.44% / 79.90%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 23:33
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.

Action-Not Available
Vendor-git-scmn/aDebian GNU/LinuxopenSUSEFedora Project
Product-debian_linuxfedoragitleapn/a
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-19469
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.25% / 48.08%
||
7 Day CHG~0.00%
Published-01 Dec, 2019 | 13:21
Updated-05 Aug, 2024 | 02:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Zmanda Management Console 3.3.9, ZMC_Admin_Advanced?form=adminTasks&action=Apply&command= allows CSRF, as demonstrated by command injection with shell metacharacters. This may depend on weak default credentials.

Action-Not Available
Vendor-zmandan/a
Product-amandan/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-18894
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.34% / 55.89%
||
7 Day CHG~0.00%
Published-13 Jan, 2020 | 16:13
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Avast Premium Security 19.8.2393, attackers can send a specially crafted request to the local web server run by Avast Antivirus on port 27275 to support Bank Mode functionality. A flaw in the processing of a command allows execution of arbitrary OS commands with the privileges of the currently logged in user. This allows for example attackers who compromised a browser extension to escape from the browser sandbox.

Action-Not Available
Vendor-avastn/a
Product-premium_securityn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-17642
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.28% / 51.01%
||
7 Day CHG~0.00%
Published-05 Mar, 2020 | 16:55
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Centreon before 18.10.8, 19.10.1, and 19.04.2. It allows CSRF with resultant remote command execution via shell metacharacters in a POST to centreon-autodiscovery-server/views/scan/ajax/call.php in the Autodiscovery plugin.

Action-Not Available
Vendor-n/aCENTREON
Product-centreonn/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-17096
Matching Score-4
Assigner-Bitdefender
ShareView Details
Matching Score-4
Assigner-Bitdefender
CVSS Score-9||CRITICAL
EPSS-0.81% / 73.29%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 13:39
Updated-17 Sep, 2024 | 02:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Bitdefender BOX 2 bootstrap get_image_size command injection vulnerability

A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command.

Action-Not Available
Vendor-Bitdefender
Product-box_2centralbox_2_firmwareBitdefender BOX 2
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-1636
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-7.50% / 91.41%
||
7 Day CHG~0.00%
Published-23 Jan, 2019 | 23:00
Updated-20 Nov, 2024 | 17:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Teams URI Handler Insecure Library Loading Vulnerability

A vulnerability in the Cisco Webex Teams client, formerly Cisco Spark, could allow an attacker to execute arbitrary commands on a targeted system. This vulnerability is due to unsafe search paths used by the application URI that is defined in Windows operating systems. An attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could cause the application to load libraries from the directory targeted by the URI link. The attacker could use this behavior to execute arbitrary commands on the system with the privileges of the targeted user if the attacker can place a crafted library in a directory that is accessible to the vulnerable system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_teamsCisco Webex Teams
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-12511
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 61.71%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 18:16
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Root Command Injection via MAC Address in SOAP API

In NETGEAR Nighthawk X10-R9000 prior to 1.0.4.26, an attacker may execute arbitrary system commands as root by sending a specially-crafted MAC address to the "NETGEAR Genie" SOAP endpoint at AdvancedQoS:GetCurrentBandwidthByMAC. Although this requires QoS being enabled, advanced QoS being enabled, and a valid authentication JWT, additional vulnerabilities (CVE-2019-12510) allow an attacker to interact with the entire SOAP API without authentication. Additionally, DNS rebinding techniques may be used to exploit this vulnerability remotely. Exploiting this vulnerability is somewhat involved. The following limitations apply to the payload and must be overcome for successful exploitation: - No more than 17 characters may be used. - At least one colon must be included to prevent mangling. - A single-quote and meta-character must be used to break out of the existing command. - Parent command remnants after the injection point must be dealt with. - The payload must be in all-caps. Despite these limitations, it is still possible to gain access to an interactive root shell via this vulnerability. Since the web server assigns certain HTTP headers to environment variables with all-caps names, it is possible to insert a payload into one such header and reference the subsequent environment variable in the injection point.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-nighthawk_x10-r9000_firmwarenighthawk_x10-r9000n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-12735
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-56.63% / 98.03%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 13:07
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Action-Not Available
Vendor-neovimn/aVim
Product-neovimvimn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-11689
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.41% / 84.48%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 14:59
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ASUSTOR exFAT Driver through 1.0.0.r20. When conducting license validation, exfat.cgi and exfatctl fail to properly validate server responses and pass unsanitized text to the system shell, resulting in code execution as root.

Action-Not Available
Vendor-n/aASUSTOR Inc.
Product-exfat_drivern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-34974
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.15% / 36.14%
||
7 Day CHG~0.00%
Published-06 Sep, 2024 | 16:27
Updated-13 Sep, 2024 | 21:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
QTS, QuTS hero, QuTScloud, QVR, QES

An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. QuTScloud, QVR, QES are not affected. We have already fixed the vulnerability in the following versions: QTS 4.5.4.2790 build 20240605 and later QuTS hero h4.5.4.2626 build 20231225 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-quts_heroqtsQuTS heroQESQVRQuTScloudQTSquts_heroqts
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-33965
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.7||CRITICAL
EPSS-6.33% / 90.59%
||
7 Day CHG~0.00%
Published-01 Jun, 2023 | 14:10
Updated-09 Jan, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brook's tproxy server is vulnerable to a drive-by command injection.

Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. A patch is available in version 20230606.

Action-Not Available
Vendor-txthinkingtxthinking
Product-brookbrook
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-24441
Matching Score-4
Assigner-Snyk
ShareView Details
Matching Score-4
Assigner-Snyk
CVSS Score-5.8||MEDIUM
EPSS-1.45% / 79.95%
||
7 Day CHG+0.29%
Published-30 Nov, 2022 | 00:00
Updated-24 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Code Injection

The package snyk before 1.1064.0 are vulnerable to Code Injection when analyzing a project. An attacker who can convince a user to scan a malicious project can include commands in a build file such as build.gradle or gradle-wrapper.jar, which will be executed with the privileges of the application. This vulnerability may be triggered when running the the CLI tool directly, or when running a scan with one of the IDE plugins that invoke the Snyk CLI. Successful exploitation of this issue would likely require some level of social engineering - to coerce an untrusted project to be downloaded and analyzed via the Snyk CLI or opened in an IDE where a Snyk IDE plugin is installed and enabled. Additionally, if the IDE has a Trust feature then the target folder must be marked as ‘trusted’ in order to be vulnerable. **NOTE:** This issue is independent of the one reported in [CVE-2022-40764](https://security.snyk.io/vuln/SNYK-JS-SNYK-3037342), and upgrading to a fixed version for this addresses that issue as well. The affected IDE plugins and versions are: - VS Code - Affected: <=1.8.0, Fixed: 1.9.0 - IntelliJ - Affected: <=2.4.47, Fixed: 2.4.48 - Visual Studio - Affected: <=1.1.30, Fixed: 1.1.31 - Eclipse - Affected: <=v20221115.132308, Fixed: All subsequent versions - Language Server - Affected: <=v20221109.114426, Fixed: All subsequent versions

Action-Not Available
Vendor-snykn/a
Product-snyk_securitysnyk_clisnyk_language_serversnyk
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found