Vulnerabilities (CVE)

Filtered by CWE-78
Total 4242 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10786 1 Network-manager Project 1 Network-manager 2024-11-21 7.5 HIGH 9.8 CRITICAL
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
CVE-2019-10783 1 Isof Project 1 Isof 2024-11-21 7.5 HIGH 9.8 CRITICAL
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
CVE-2019-10780 1 Bibtex-ruby Project 1 Bibtex-ruby 2024-11-21 10.0 HIGH 9.8 CRITICAL
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
CVE-2019-10778 1 Devcert-sanscache Project 1 Devcert-sanscache 2024-11-21 7.5 HIGH 9.8 CRITICAL
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
CVE-2019-10777 1 Amazon 1 Aws Lambda 2024-11-21 7.5 HIGH 9.8 CRITICAL
In aws-lambda versions prior to version 1.0.5, the "config.FunctioName" is used to construct the argument used within the "exec" function without any sanitization. It is possible for a user to inject arbitrary commands to the "zipCmd" used within "config.FunctionName".
CVE-2019-10776 1 Git-diff-apply Project 1 Git-diff-apply 2024-11-21 7.5 HIGH 9.8 CRITICAL
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
CVE-2019-10774 1 Php-shellcommand Project 1 Php-shellcommand 2024-11-21 10.0 HIGH 9.8 CRITICAL
php-shellcommand versions before 1.6.1 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-10669 1 Librenms 1 Librenms 2024-11-21 6.5 MEDIUM 7.2 HIGH
An issue was discovered in LibreNMS through 1.47. There is a command injection vulnerability in html/includes/graphs/device/collectd.inc.php where user supplied parameters are filtered with the mysqli_escape_real_string function. This function is not the appropriate function to sanitize command arguments as it does not escape a number of command line syntax characters such as ` (backtick), allowing an attacker to inject commands into the variable $rrd_cmd, which gets executed via passthru().
CVE-2019-10662 1 Grandstream 2 Ucm6204, Ucm6204 Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the backupUCMConfig file-backup parameter to the /cgi? URI.
CVE-2019-10660 1 Grandstream 2 Gxv3611ir Hd, Gxv3611ir Hd Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the /goform/systemlog?cmd=set logserver field.
CVE-2019-10659 1 Grandstream 4 Gxv3370, Gxv3370 Firmware, Wp820 and 1 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in a /manager?action=getlogcat priority field.
CVE-2019-10658 1 Grandstream 2 Gwn7610, Gwn7610 Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/controller.icc.update_nds_webroot_from_tmp update_nds_webroot_from_tmp API call.
CVE-2019-10657 1 Grandstream 4 Gwn7000, Gwn7000 Firmware, Gwn7610 and 1 more 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
CVE-2019-10656 1 Grandstream 2 Gwn7000, Gwn7000 Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/uci.apply update_nds_webroot_from_tmp API call.
CVE-2019-10655 1 Grandstream 10 Gac2500, Gac2500 Firmware, Gvc3202 and 7 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.
CVE-2019-10631 1 Zyxel 2 Nas326, Nas326 Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Shell Metacharacter Injection in the package installer on Zyxel NAS 326 version 5.21 and below allows an authenticated attacker to execute arbitrary code via multiple different requests.
CVE-2019-10392 1 Jenkins 1 Git Client 2024-11-21 6.5 MEDIUM 8.8 HIGH
Jenkins Git Client Plugin 2.8.4 and earlier and 3.0.0-rc did not properly restrict values passed as URL argument to an invocation of 'git ls-remote', resulting in OS command injection.
CVE-2019-10061 1 Node-opencv Project 1 Node-opencv 2024-11-21 7.5 HIGH 9.8 CRITICAL
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
CVE-2019-10048 1 Pydio 1 Pydio 2024-11-21 9.0 HIGH 7.2 HIGH
The ImageMagick plugin that is installed by default in Pydio through 8.2.2 does not perform the appropriate validation and sanitization of user supplied input in the plugin's configuration options, allowing arbitrary shell commands to be entered that result in command execution on the underlying operating system, with the privileges of the local user running the web server. The attacker must be authenticated into the application with an administrator user account in order to be able to edit the affected plugin configuration.
CVE-2019-1020004 1 Tridactyl Project 1 Tridactyl 2024-11-21 5.0 MEDIUM 7.5 HIGH
Tridactyl before 1.16.0 allows fake key events.