Vulnerabilities (CVE)

Filtered by CWE-74
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15489 1 Wavlink 2 Wl-wn530hg4, Wl-wn530hg4 Firmware 2021-07-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.
CVE-2020-4774 1 Ibm 1 Curam Social Program Management 2021-07-21 5.5 MEDIUM 5.4 MEDIUM
An XPath vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, caused by the improper handling of user-supplied input. By sending a specially-crafted input, a remote attacker could exploit this vulnerability to obtain unauthorized access or reveal sensitive information such as XML document structure and content. IBM X-Force ID: 189152.
CVE-2020-7600 1 Querymen Project 1 Querymen 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
CVE-2020-15515 1 Turn\! Project 1 Turn\! 2021-07-21 6.5 MEDIUM 8.8 HIGH
The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.
CVE-2020-4432 1 Ibm 10 Aspera Application Platform On Demand, Aspera Faspex On Demand, Aspera High-speed Transfer Endpoint and 7 more 2021-07-21 6.0 MEDIUM 7.5 HIGH
Certain IBM Aspera applications are vulnerable to command injection after valid authentication, which could allow an attacker with intimate knowledge of the system to execute commands in a SOAP API. IBM X-Force ID: 180810.
CVE-2020-9428 4 Debian, Fedoraproject, Opensuse and 1 more 4 Debian Linux, Fedora, Leap and 1 more 2021-07-21 5.0 MEDIUM 7.5 HIGH
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
CVE-2020-7785 1 Node-ps Project 1 Node-ps 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.
CVE-2020-1443 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2021-07-21 3.5 LOW 5.4 MEDIUM
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'.
CVE-2020-7624 1 Effect Project 1 Effect 2021-07-21 7.5 HIGH 9.8 CRITICAL
effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.
CVE-2020-7623 1 Jscover Project 1 Jscover 2021-07-21 7.5 HIGH 9.8 CRITICAL
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
CVE-2020-11546 1 Superwebmailer 1 Superwebmailer 2021-07-21 7.5 HIGH 9.8 CRITICAL
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CVE-2020-7626 1 Karma-mojo Project 1 Karma-mojo 2021-07-21 7.5 HIGH 9.8 CRITICAL
karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument.
CVE-2020-10987 1 Tenda 2 Ac15, Ac15 Firmware 2021-07-21 10.0 HIGH 9.8 CRITICAL
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-13279 1 Gitlab 1 Gitlab-vscode-extension 2021-07-21 6.8 MEDIUM 8.6 HIGH
Client side code execution in gitlab-vscode-extension v2.2.0 allows attacker to execute code on user system
CVE-2020-14434 1 Netgear 24 Rbk752, Rbk752 Firmware, Rbk753 and 21 more 2021-07-21 7.7 HIGH 6.8 MEDIUM
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, RBS850 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, and RBS840 before 3.2.15.25.
CVE-2020-13619 1 Locutus 1 Locutus Php 2021-07-21 7.5 HIGH 9.8 CRITICAL
php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.
CVE-2020-7596 1 Codecov 1 Nodejs Uploader 2021-07-21 6.5 MEDIUM 8.8 HIGH
Codecov npm module before 3.6.2 allows remote attackers to execute arbitrary commands via the "gcov-args" argument.
CVE-2020-7621 1 Ibm 1 Strongloop Nginx Controller 2021-07-21 7.5 HIGH 9.8 CRITICAL
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
CVE-2020-25067 1 Netgear 2 R8300, R8300 Firmware 2021-07-21 5.8 MEDIUM 8.8 HIGH
NETGEAR R8300 devices before 1.0.2.134 are affected by command injection by an unauthenticated attacker.
CVE-2020-14436 1 Netgear 24 Rbk752, Rbk752 Firmware, Rbk753 and 21 more 2021-07-21 5.8 MEDIUM 8.8 HIGH
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK752 before 3.2.15.25, RBK753 before 3.2.15.25, RBK753S before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBK853 before 3.2.15.25, RBR850 before 3.2.15.25, RBS850 before 3.2.15.25, RBK842 before 3.2.15.25, RBR840 before 3.2.15.25, and RBS840 before 3.2.15.25.
CVE-2020-15477 1 Raspberrytorte 1 Raspberrytortoise 2021-07-21 10.0 HIGH 9.8 CRITICAL
The WebControl in RaspberryTortoise through 2012-10-28 is vulnerable to remote code execution via shell metacharacters in a URI. The file nodejs/raspberryTortoise.js has no validation on the parameter incomingString before passing it to the child_process.exec function.
CVE-2020-12393 2 Microsoft, Mozilla 4 Windows, Firefox, Firefox Esr and 1 more 2021-07-21 4.6 MEDIUM 7.8 HIGH
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
CVE-2020-35734 1 Batflat 1 Batflat 2021-07-21 6.5 MEDIUM 7.2 HIGH
** UNSUPPORTED WHEN ASSIGNED ** Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2020-7045 2 Debian, Wireshark 2 Debian Linux, Wireshark 2021-07-21 3.3 LOW 6.5 MEDIUM
In Wireshark 3.0.x before 3.0.8, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by validating opcodes.
CVE-2020-5593 1 Zenphoto 1 Zenphoto 2021-07-21 6.5 MEDIUM 8.8 HIGH
Zenphoto versions prior to 1.5.7 allows an attacker to conduct PHP code injection attacks by leading a user to upload a specially crafted .zip file.
CVE-2019-16962 1 Zohocorp 1 Manageengine Desktop Central 2021-07-21 3.5 LOW 5.4 MEDIUM
Zoho ManageEngine Desktop Central 10.0.430 allows HTML injection via a modified Report Name in a New Custom Report.
CVE-2020-11733 1 Spirent 3 Avalanche, C100-mp, Testcenter 2021-07-21 9.0 HIGH 6.7 MEDIUM
An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.
CVE-2020-15816 1 Westerndigital 1 Wd Discovery 2021-07-21 6.5 MEDIUM 8.8 HIGH
In Western Digital WD Discovery before 4.0.251.0, a malicious application running with standard user permissions could potentially execute code in the application's process through library injection by using DYLD environment variables.
CVE-2020-8797 1 Juplink 2 Rx4-1500, Rx4-1500 Firmware 2021-07-21 6.9 MEDIUM 6.7 MEDIUM
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
CVE-2020-7786 1 Macfromip Project 1 Macfromip 2021-07-21 7.5 HIGH 9.8 CRITICAL
This affects all versions of package macfromip. The injection point is located in line 66 in macfromip.js.
CVE-2019-16268 1 Zohocorp 1 Manageengine Remote Access Plus 2021-07-21 3.5 LOW 4.8 MEDIUM
Zoho ManageEngine Remote Access Plus 10.0.259 allows HTML injection via the Description field on the Admin - User Administration userMgmt.do?actionToCall=ShowUser screen.
CVE-2019-16954 1 Solarwinds 1 Web Help Desk 2021-07-21 4.9 MEDIUM 5.4 MEDIUM
SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket.
CVE-2020-5203 1 Fatfreeframework 1 Fat-free Framework 2021-07-21 7.5 HIGH 9.8 CRITICAL
In Fat-Free Framework 3.7.1, attackers can achieve arbitrary code execution if developers choose to pass user controlled input (e.g., $_REQUEST, $_GET, or $_POST) to the framework's Clear method.
CVE-2020-25094 1 Logrhythm 1 Platform Manager 2021-07-21 10.0 HIGH 9.8 CRITICAL
LogRhythm Platform Manager 7.4.9 allows Command Injection. To exploit this, an attacker can inject arbitrary program names and arguments into a WebSocket. These are forwarded to any remote server with a LogRhythm Smart Response agent installed. By default, the commands are run with LocalSystem privileges.
CVE-2020-28470 1 Scully 1 Scully 2021-07-21 4.3 MEDIUM 6.1 MEDIUM
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
CVE-2020-35938 1 Pickplugins 2 Post Grid, Team Showcase 2021-07-21 6.0 MEDIUM 8.8 HIGH
PHP Object injection vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to inject arbitrary PHP objects due to insecure unserialization of data supplied in a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.
CVE-2020-9688 2 Adobe, Microsoft 2 Download Manager, Windows 2021-07-21 9.3 HIGH 7.8 HIGH
Adobe Download Manager version 2.0.0.518 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2020-8821 1 Webmin 1 Webmin 2021-07-21 3.5 LOW 5.4 MEDIUM
An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTML code will be rendered (however, JavaScript is not executed). Changes are kept across users.
CVE-2020-13480 1 Verint 1 Workforce Optimization 2021-07-21 3.5 LOW 5.4 MEDIUM
Verint Workforce Optimization (WFO) 15.2 allows HTML injection via the "send email" feature.
CVE-2020-1481 1 Microsoft 1 Visual Studio Code Eslint Extension 2021-07-21 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists in the ESLint extension for Visual Studio Code when it validates source code after opening a project, aka 'Visual Studio Code ESLint Extention Remote Code Execution Vulnerability'.
CVE-2020-13311 1 Gitlab 1 Gitlab 2021-07-21 4.0 MEDIUM 4.3 MEDIUM
A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Wiki was vulnerable to a parser attack that prohibits anyone from accessing the Wiki functionality through the user interface.
CVE-2020-7172 1 Hp 1 Intelligent Management Center 2021-07-21 10.0 HIGH 9.8 CRITICAL
A templateselect expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
CVE-2020-7602 1 Node-prompt-here Project 1 Node-prompt-here 2021-07-21 7.5 HIGH 9.8 CRITICAL
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The "runCommand()" is called by "getDevices()" function in file "linux/manager.js", which is required by the "index. process.env.NM_CLI" in the file "linux/manager.js". This function is used to construct the argument of function "execSync()", which can be controlled by users without any sanitization.
CVE-2020-6261 1 Sap 1 Solution Manager 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-12074 1 Webtoffee 1 Import Export Wordpress Users 2021-07-21 6.5 MEDIUM 8.8 HIGH
The users-customers-import-export-for-wp-woocommerce plugin before 1.3.9 for WordPress allows subscribers to import administrative accounts via CSV.
CVE-2020-12835 1 Smartbear 1 Readyapi 2021-07-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
CVE-2020-25268 1 Ilias 1 Ilias 2021-07-21 6.5 MEDIUM 8.8 HIGH
Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data.
CVE-2020-13651 1 Digdash 1 Digdash 2021-07-21 6.8 MEDIUM 7.8 HIGH
An issue was discovered in DigDash 2018R2 before p20200528, 2019R1 before p20200421, and 2019R2 before p20200430. It allows a user to provide data that will be used to generate the JNLP file used by a client to obtain the right Java application. By providing an attacker-controlled URL, the client will obtain a rogue JNLP file specifying the installation of malicious JAR archives and executed with full privileges on the client computer.
CVE-2020-9254 1 Huawei 2 P30 Pro, P30 Pro Firmware 2021-07-21 6.8 MEDIUM 7.8 HIGH
HUAWEI P30 Pro smartphones with versions earlier than 10.1.0.123(C432E19R2P5patch02), versions earlier than 10.1.0.126(C10E11R5P1), and versions earlier than 10.1.0.160(C00E160R2P8) have a logic check error vulnerability. A logic error occurs when the software checking the size of certain parameter, the attacker should trick the user into installing a malicious application, successful exploit may cause code execution.
CVE-2020-15951 1 Immuta 1 Immuta 2021-07-21 4.3 MEDIUM 6.1 MEDIUM
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.