Filtered by vendor
Subscriptions
Total
2354 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-27837 | 1 Tp-link | 2 Tl-wpa8630p, Tl-wpa8630p Firmware | 2025-01-04 | 9.8 Critical |
TP-Link TL-WPA8630P (US)_ V2_ Version 171011 was discovered to contain a command injection vulnerability via the key parameter in the function sub_ 40A774. | ||||
CVE-2023-35390 | 2 Microsoft, Redhat | 5 .net, Visual Studio 2022, Enterprise Linux and 2 more | 2025-01-01 | 7.8 High |
.NET and Visual Studio Remote Code Execution Vulnerability | ||||
CVE-2023-36414 | 1 Microsoft | 1 Azure Identity Sdk | 2025-01-01 | 8.8 High |
Azure Identity SDK Remote Code Execution Vulnerability | ||||
CVE-2023-36415 | 1 Microsoft | 1 Azure Identity Sdk | 2025-01-01 | 8.8 High |
Azure Identity SDK Remote Code Execution Vulnerability | ||||
CVE-2023-36805 | 1 Microsoft | 11 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 8 more | 2025-01-01 | 7 High |
Windows MSHTML Platform Security Feature Bypass Vulnerability | ||||
CVE-2023-33136 | 1 Microsoft | 1 Azure Devops Server | 2025-01-01 | 8.8 High |
Azure DevOps Server Remote Code Execution Vulnerability | ||||
CVE-2023-21805 | 1 Microsoft | 13 Windows 10, Windows 10 1607, Windows 10 1809 and 10 more | 2025-01-01 | 7.8 High |
Windows MSHTML Platform Remote Code Execution Vulnerability | ||||
CVE-2024-38228 | 1 Microsoft | 1 Sharepoint Server | 2025-01-01 | 7.2 High |
Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
CVE-2024-38227 | 1 Microsoft | 1 Sharepoint Server | 2025-01-01 | 7.2 High |
Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
CVE-2024-20667 | 1 Microsoft | 1 Azure Devops Server | 2024-12-31 | 7.5 High |
Azure DevOps Server Remote Code Execution Vulnerability | ||||
CVE-2024-20676 | 1 Microsoft | 1 Azure Storage Mover | 2024-12-31 | 8 High |
Azure Storage Mover Remote Code Execution Vulnerability | ||||
CVE-2024-7700 | 2 Redhat, Theforeman | 2 Satellite, Foreman | 2024-12-31 | 6.5 Medium |
A command injection flaw was found in the "Host Init Config" template in the Foreman application via the "Install Packages" field on the "Register Host" page. This flaw allows an attacker with the necessary privileges to inject arbitrary commands into the configuration, potentially allowing unauthorized command execution during host registration. Although this issue requires user interaction to execute injected commands, it poses a significant risk if an unsuspecting user runs the generated registration script. | ||||
CVE-2024-12986 | 2024-12-30 | 7.3 High | ||
A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 and Vigor300B 1.5.1.3/1.5.1.4. This issue affects some unknown processing of the file /cgi-bin/mainfunction.cgi/apmcfgupptim of the component Web Management Interface. The manipulation of the argument session leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. | ||||
CVE-2024-12987 | 2024-12-28 | 7.3 High | ||
A vulnerability, which was classified as critical, was found in DrayTek Vigor2960 and Vigor300B 1.5.1.4. Affected is an unknown function of the file /cgi-bin/mainfunction.cgi/apmcfgupload of the component Web Management Interface. The manipulation of the argument session leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.1.5 is able to address this issue. It is recommended to upgrade the affected component. | ||||
CVE-2024-12985 | 2024-12-27 | 6.3 Medium | ||
A vulnerability classified as critical was found in Overtek OT-E801G OTE801G65.1.1.0. This vulnerability affects unknown code of the file /diag_ping.cmd?action=test&interface=ppp0.1&ipaddr=8.8.8.8%26%26cat%20/etc/passwd&ipversion=4&sessionKey=test. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2020-13712 | 2024-12-26 | 7.8 High | ||
A command injection is possible through the user interface, allowing arbitrary command execution as the root user. oMG2000 running MGOS 3.15.1 or earlier is affected. MG90 running MGOS 4.2.1 or earlier is affected. | ||||
CVE-2024-25255 | 1 Sublimetext | 1 Sublime Text 4 | 2024-12-24 | 9.8 Critical |
Sublime Text 4 was discovered to contain a command injection vulnerability via the New Build System module. NOTE: multiple third parties report that this is intended behavior. | ||||
CVE-2023-23356 | 2024-12-24 | 5.5 Medium | ||
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QuFirewall 2.3.3 ( 2023/03/27 ) and later and later | ||||
CVE-2024-56084 | 2024-12-23 | 7.1 High | ||
An issue was discovered in Logpoint UniversalNormalizer before 5.7.0. Authenticated users can inject payloads while creating Universal Normalizer. These are executed, leading to Remote Code Execution. | ||||
CVE-2024-12111 | 2024-12-20 | 8 High | ||
In a specific scenario a LDAP user can abuse the authentication process in OpenText Privileged Access Manager that allows authentication bypass. This issue affects Privileged Access Manager version 23.3(4.4); 24.3(4.5) |