Total
1397 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-0849 | 1 Netgear | 2 Wndr3700, Wndr3700 Firmware | 2023-02-24 | N/A | 9.8 CRITICAL |
A vulnerability has been found in Netgear WNDR3700v2 1.0.1.14 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221152. | |||||
CVE-2021-43113 | 2 Debian, Itextpdf | 2 Debian Linux, Itext | 2023-02-24 | 7.5 HIGH | 9.8 CRITICAL |
iTextPDF in iText 7 and up to 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java. | |||||
CVE-2021-33963 | 1 Chinamobile | 2 An Lianbao Wf-1, An Lianbao Wf-1 Firmware | 2023-02-24 | 10.0 HIGH | 9.8 CRITICAL |
China Mobile An Lianbao WF-1 v1.0.1 router web interface through /api/ZRMacClone/mac_addr_clone receives parameters by POST request, and the parameter macType has a command injection vulnerability. An attacker can use the vulnerability to execute remote commands. | |||||
CVE-2022-35268 | 1 Robustel | 2 R1510, R1510 Firmware | 2023-02-23 | N/A | 7.5 HIGH |
A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_sdk_file/` API. | |||||
CVE-2023-0315 | 1 Froxlor | 1 Froxlor | 2023-02-23 | N/A | 8.8 HIGH |
Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8. | |||||
CVE-2022-28171 | 1 Hikvision | 22 Ds-a71024, Ds-a71024 Firmware, Ds-a71048 and 19 more | 2023-02-23 | 7.5 HIGH | 9.8 CRITICAL |
The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device. | |||||
CVE-2023-22935 | 1 Splunk | 2 Splunk, Splunk Cloud Platform | 2023-02-23 | N/A | 8.8 HIGH |
In Splunk Enterprise versions below 8.1.13, 8.2.10, and 9.0.4, the ‘display.page.search.patterns.sensitivity’ search parameter lets a search bypass [SPL safeguards for risky commands](https://docs.splunk.com/Documentation/Splunk/latest/Security/SPLsafeguards). The vulnerability requires a higher privileged user to initiate a request within their browser and only affects instances with Splunk Web enabled. | |||||
CVE-2023-0789 | 1 Phpmyfaq | 1 Phpmyfaq | 2023-02-22 | N/A | 9.8 CRITICAL |
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | |||||
CVE-2022-40022 | 1 Microchip | 2 Syncserver S650, Syncserver S650 Firmware | 2023-02-22 | N/A | 9.8 CRITICAL |
Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability. | |||||
CVE-2023-24161 | 1 Totolink | 2 Ca300-poe, Ca300-poe Firmware | 2023-02-22 | N/A | 9.8 CRITICAL |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the webWlanIdx parameter in the setWebWlanIdx function. | |||||
CVE-2023-24159 | 1 Totolink | 2 Ca300-poe, Ca300-poe Firmware | 2023-02-22 | N/A | 9.8 CRITICAL |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function. | |||||
CVE-2023-24160 | 1 Totolink | 2 Ca300-poe, Ca300-poe Firmware | 2023-02-22 | N/A | 9.8 CRITICAL |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function. | |||||
CVE-2023-0127 | 1 D-link | 2 Dwl-2600ap, Dwl-2600ap Firmware | 2023-02-21 | N/A | 7.8 HIGH |
A command injection vulnerability in the firmware_update command, in the device's restricted telnet interface, allows an authenticated attacker to execute arbitrary commands as root. | |||||
CVE-2022-45699 | 1 Apsystems | 2 Ecu-r, Ecu-r Firmware | 2023-02-17 | N/A | 9.8 CRITICAL |
Command injection in the administration interface in APSystems ECU-R version 5203 allows a remote unauthenticated attacker to execute arbitrary commands as root using the timezone parameter. | |||||
CVE-2022-43550 | 2 Jitsi, Microsoft | 2 Jitsi, Windows | 2023-02-16 | N/A | 9.8 CRITICAL |
A command injection vulnerability exists in Jitsi before commit 8aa7be58522f4264078d54752aae5483bfd854b2 when launching browsers on Windows which could allow an attacker to insert an arbitrary URL which opens up the opportunity to remote execution. | |||||
CVE-2022-45768 | 1 Edimax | 2 Br-6428ns, Br-6428ns Firmware | 2023-02-16 | N/A | 8.8 HIGH |
Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function. | |||||
CVE-2022-36534 | 2 Linux, Syncovery | 2 Linux Kernel, Syncovery | 2023-02-15 | N/A | 8.8 HIGH |
Super Flexible Software GmbH & Co. KG Syncovery 9 for Linux v9.47x and below was discovered to contain multiple remote code execution (RCE) vulnerabilities via the Job_ExecuteBefore and Job_ExecuteAfter parameters at post_profilesettings.php. | |||||
CVE-2022-2992 | 1 Gitlab | 1 Gitlab | 2023-02-15 | N/A | 9.9 CRITICAL |
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. | |||||
CVE-2022-45796 | 1 Sharp | 316 Bp-30c25, Bp-30c25 Firmware, Bp-30c25t and 313 more | 2023-02-15 | N/A | 7.2 HIGH |
Command injection vulnerability in nw_interface.html in SHARP multifunction printers (MFPs)'s Digital Full-color Multifunctional System 202 or earlier, 120 or earlier, 600 or earlier, 121 or earlier, 500 or earlier, 402 or earlier, 790 or earlier, and Digital Multifunctional System (Monochrome) 200 or earlier, 211 or earlier, 102 or earlier, 453 or earlier, 400 or earlier, 202 or earlier, 602 or earlier, 500 or earlier, 401 or earlier allows remote attackers to execute arbitrary commands via unspecified vectors. | |||||
CVE-2019-1584 | 1 Zingbox | 1 Inspector | 2023-02-14 | 6.8 MEDIUM | 9.8 CRITICAL |
A security vulnerability exists in Zingbox Inspector version 1.293 and earlier, that allows for remote code execution if the Inspector were sent a malicious command from the Zingbox cloud, or if the Zingbox Inspector were tampered with to connect to an attacker's cloud endpoint. |