Vulnerabilities (CVE)

Filtered by CWE-78
Total 4418 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24015 1 Fortinet 1 Fortimail 2024-11-21 6.5 MEDIUM 7.2 HIGH
An improper neutralization of special elements used in an OS Command vulnerability in the administrative interface of FortiMail before 6.4.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted HTTP requests.
CVE-2021-24009 1 Fortinet 1 Fortiwan 2024-11-21 9.0 HIGH 7.2 HIGH
Multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in the Web GUI of FortiWAN before 4.5.9 may allow an authenticated attacker to execute arbitrary commands on the underlying system's shell via specifically crafted HTTP requests.
CVE-2021-23862 1 Bosch 8 Bosch Video Management System, Divar Ip 5000 Firmware, Divar Ip 7000 Firmware and 5 more 2024-11-21 9.0 HIGH 7.2 HIGH
A crafted configuration packet sent by an authenticated administrative user can be used to execute arbitrary commands in system context. This issue also affects installations of the VRM, DIVAR IP, BVMS with VRM installed, the VIDEOJET decoder (VJD-7513 and VJD-8000).
CVE-2021-23732 1 Quobject 1 Docker-cli-js 2024-11-21 9.3 HIGH 9.0 CRITICAL
This affects all versions of package docker-cli-js. If the command parameter of the Docker.command method can at least be partially controlled by a user, they will be in a position to execute any arbitrary OS commands on the host system.
CVE-2021-23632 1 Git Project 1 Git 2024-11-21 7.5 HIGH 6.6 MEDIUM
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. Steps to Reproduce 1. Create a file named exploit.js with the following content: js var Git = require("git").Git; var repo = new Git("repo-test"); var user_input = "version; date"; repo.git(user_input, function(err, result) { console.log(result); }) 2. In the same directory as exploit.js, run npm install git. 3. Run exploit.js: node exploit.js. You should see the outputs of both the git version and date command-lines. Note that the repo-test Git repository does not need to be present to make this PoC work.
CVE-2021-23422 1 Bikeshed Project 1 Bikeshed 2024-11-21 6.8 MEDIUM 7.8 HIGH
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output.
CVE-2021-23399 1 Wincred Project 1 Wincred 2024-11-21 7.5 HIGH 7.3 HIGH
This affects all versions of package wincred. If attacker-controlled user input is given to the getCredential function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23359 1 Port-killer Project 1 Port-killer 2024-11-21 6.5 MEDIUM 7.5 HIGH
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
CVE-2021-23198 1 Myscada 1 Mypro 2024-11-21 7.5 HIGH 10.0 CRITICAL
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-23154 1 Mirantis 1 Lens 2024-11-21 9.3 HIGH 6.3 MEDIUM
In Lens prior to 5.3.4, custom helm chart configuration creates helm commands from string concatenation of provided arguments which are then executed in the user's shell. Arguments can be provided which cause arbitrary shell commands to run on the system.
CVE-2021-23031 1 F5 2 Big-ip Advanced Web Application Firewall, Big-ip Application Security Manager 2024-11-21 6.5 MEDIUM 9.9 CRITICAL
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4, 12.1.x before 12.1.6, and 11.6.x before 11.6.5.3, an authenticated user may perform a privilege escalation on the BIG-IP Advanced WAF and ASM Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2021-23025 1 F5 14 Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager, Big-ip Advanced Web Application Firewall and 11 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
On version 15.1.x before 15.1.0.5, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.5, and all versions of 12.1.x and 11.6.x, an authenticated remote command execution vulnerability exists in the BIG-IP Configuration utility. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2021-22795 1 Schneider-electric 1 Struxureware Data Center Expert 2024-11-21 7.5 HIGH 9.1 CRITICAL
A CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote code execution when performed over the network. Affected Product: StruxureWare Data Center Expert (V7.8.1 and prior)
CVE-2021-22657 1 Myscada 1 Mypro 2024-11-21 7.5 HIGH 10.0 CRITICAL
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.
CVE-2021-22557 1 Google 1 Slo Generator 2024-11-21 6.8 MEDIUM 5.3 MEDIUM
SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173
CVE-2021-22127 1 Fortinet 1 Forticlient 2024-11-21 7.9 HIGH 7.1 HIGH
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user into connecting to a network with a malicious name.
CVE-2021-22125 1 Fortinet 1 Fortisandbox 2024-11-21 9.0 HIGH 6.3 MEDIUM
An instance of improper neutralization of special elements in the sniffer module of FortiSandbox before 3.2.2 may allow an authenticated administrator to execute commands on the underlying system's shell via altering the content of its configuration file.
CVE-2021-22123 1 Fortinet 1 Fortiweb 2024-11-21 9.0 HIGH 7.6 HIGH
An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page.
CVE-2021-21954 1 Anker 2 Eufy Homebase 2, Eufy Homebase 2 Firmware 2024-11-21 9.0 HIGH 9.9 CRITICAL
A command execution vulnerability exists in the wifi_country_code_update functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to arbitrary command execution.
CVE-2021-21888 1 Lantronix 2 Premierwave 2050, Premierwave 2050 Firmware 2024-11-21 9.0 HIGH 9.1 CRITICAL
An OS command injection vulnerability exists in the Web Manager SslGenerateCertificate functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.