Total
4312 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-18568 | 1 Dlink | 4 Dsr-1000n, Dsr-1000n Firmware, Dsr-250 and 1 more | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The D-Link DSR-250 (3.14) DSR-1000N (2.11B201) UPnP service contains a command injection vulnerability, which can cause remote command execution. | |||||
CVE-2020-17505 | 1 Articatech | 1 Web Proxy | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform. | |||||
CVE-2020-17456 | 1 Seowonintech | 10 Slc-130, Slc-130 Firmware, Slr-120d42g and 7 more | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the ipAddr parameter to the system_log.cgi page. | |||||
CVE-2020-17406 | 1 Microhardcorp | 2 Bullet-lte, Bullet-lte Firmware | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the ping parameter provided to tools.sh. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10595. | |||||
CVE-2020-17384 | 1 Cellopoint | 1 Cellos | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
Cellopoint Cellos v4.1.10 Build 20190922 does not validate URL inputted properly. With the cookie of the system administrator, attackers can inject and remotely execute arbitrary command to manipulate the system. | |||||
CVE-2020-17368 | 4 Debian, Fedoraproject, Firejail Project and 1 more | 4 Debian Linux, Fedora, Firejail and 1 more | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection. | |||||
CVE-2020-17363 | 1 Usvn | 1 Usvn | 2024-11-21 | 9.0 HIGH | 9.9 CRITICAL |
USVN (aka User-friendly SVN) before 1.0.9 allows remote code execution via shell metacharacters in the number_start or number_end parameter to LastHundredRequest (aka lasthundredrequestAction) in the Timeline module. NOTE: this may overlap CVE-2020-25069. | |||||
CVE-2020-17352 | 1 Sophos | 1 Xg Firewall Firmware | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
Two OS command injection vulnerabilities in the User Portal of Sophos XG Firewall through 2020-08-05 potentially allow an authenticated attacker to remotely execute arbitrary code. | |||||
CVE-2020-17010 | 1 Microsoft | 2 Windows 10, Windows Server 2016 | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Win32k Elevation of Privilege Vulnerability | |||||
CVE-2020-16282 | 1 Rangee | 1 Rangeeos | 2024-11-21 | 7.2 HIGH | 8.8 HIGH |
In the default configuration of Rangee GmbH RangeeOS 8.0.4, all components are executed in the context of the privileged root user. This may allow a local attacker to break out of the restricted environment or inject malicious code into the application and fully compromise the operating system. | |||||
CVE-2020-16279 | 1 Rangee | 1 Rangeeos | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Kommbox component in Rangee GmbH RangeeOS 8.0.4 is vulnerable to Remote Code Execution due to untrusted user supplied input being passed to the command line without sanitization. | |||||
CVE-2020-16257 | 1 Winstonprivacy | 2 Winston, Winston Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
Winston 1.5.4 devices are vulnerable to command injection via the API. | |||||
CVE-2020-16205 | 1 Geutebrueck | 22 G-cam Ebc-2110, G-cam Ebc-2110 Firmware, G-cam Ebc-2111 and 19 more | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
Using a specially crafted URL command, a remote authenticated user can execute commands as root on the G-Cam and G-Code (Firmware Versions 1.12.0.25 and prior as well as the limited Versions 1.12.13.2 and 1.12.14.5). | |||||
CVE-2020-16148 | 1 Telmat | 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more | 2024-11-21 | 9.0 HIGH | 7.2 HIGH |
The ping page of the administration panel in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via authenticated code injection over the network. | |||||
CVE-2020-16147 | 1 Telmat | 6 Accesslog, Accesslog Firmware, Educ\@box and 3 more | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
The login page in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via Unauthenticated code injection over the network. | |||||
CVE-2020-15922 | 1 Midasolutions | 1 Eframework | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
There is an OS Command Injection in Mida eFramework 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. Authentication is required. | |||||
CVE-2020-15920 | 1 Midasolutions | 1 Eframework | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required. | |||||
CVE-2020-15916 | 1 Tenda | 2 Ac15, Ac15 Firmware | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter. | |||||
CVE-2020-15893 | 1 Dlink | 2 Dir-816l, Dir-816l Firmware | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet. | |||||
CVE-2020-15778 | 3 Broadcom, Netapp, Openbsd | 10 Fabric Operating System, A700s, A700s Firmware and 7 more | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows." |