Vulnerabilities (CVE)

Filtered by CWE-78
Total 4312 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-13388 1 Python 1 Jw.util 2024-11-21 7.5 HIGH 9.8 CRITICAL
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
CVE-2020-13252 1 Centreon 1 Centreon 2024-11-21 9.0 HIGH 8.8 HIGH
Centreon before 19.04.15 allows remote attackers to execute arbitrary OS commands by placing shell metacharacters in RRDdatabase_status_path (via a main.get.php request) and then visiting the include/views/graphs/graphStatus/displayServiceStatus.php page.
CVE-2020-13167 1 Netsweeper 1 Netsweeper 2024-11-21 7.5 HIGH 9.8 CRITICAL
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
CVE-2020-13159 1 Articatech 1 Artica Proxy 2024-11-21 10.0 HIGH 9.8 CRITICAL
Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the Netbios name, Server domain name, dhclient_mac, Hostname, or Alias field. NOTE: this may overlap CVE-2020-10818.
CVE-2020-13151 1 Aerospike 1 Aerospike Server 2024-11-21 10.0 HIGH 9.8 CRITICAL
Aerospike Community Edition 4.9.0.5 allows for unauthenticated submission and execution of user-defined functions (UDFs), written in Lua, as part of a database query. It attempts to restrict code execution by disabling os.execute() calls, but this is insufficient. Anyone with network access can use a crafted UDF to execute arbitrary OS commands on all nodes of the cluster at the permission level of the user running the Aerospike service.
CVE-2020-13124 1 Sabnzbd 1 Sabnzbd 2024-11-21 6.5 MEDIUM 8.8 HIGH
SABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.
CVE-2020-13122 1 Noviflow 1 Noviware 2024-11-21 8.0 HIGH 8.8 HIGH
The novish command-line interface, included in NoviFlow NoviWare before NW500.2.12 and deployed on NoviSwitch devices, is vulnerable to command injection in the "show status destination ipaddr" command. This could be used by a read-only user (monitoring group) or admin to execute commands on the operating system.
CVE-2020-12775 1 Moica 1 Hicos 2024-11-21 10.0 HIGH 9.8 CRITICAL
Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service.
CVE-2020-12774 1 Dlink 2 Dsl-7740c, Dsl-7740c Firmware 2024-11-21 4.6 MEDIUM 8.2 HIGH
D-Link DSL-7740C does not properly validate user input, which allows an authenticated LAN user to inject arbitrary command.
CVE-2020-12620 1 Pi-hole 1 Pi-hole 2024-11-21 7.2 HIGH 7.8 HIGH
Pi-hole 4.4 allows a user able to write to /etc/pihole/dns-servers.conf to escalate privileges through command injection (shell metacharacters after an IP address).
CVE-2020-12522 1 Wago 42 750-8101\/025-000, 750-8102\/025-000, 750-8202\/000-012 and 39 more 2024-11-21 10.0 HIGH 10.0 CRITICAL
The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.
CVE-2020-12513 1 Pepperl-fuchs 24 Io-link Master 4-eip, Io-link Master 4-eip Firmware, Io-link Master 4-pnio and 21 more 2024-11-21 9.0 HIGH 7.5 HIGH
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12393 2 Microsoft, Mozilla 4 Windows, Firefox, Firefox Esr and 1 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
CVE-2020-12246 1 Beeline 2 Smart Box, Smart Box Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
Beeline Smart Box 2.0.38 routers allow "Advanced settings > Other > Diagnostics" OS command injection via the Ping ping_ipaddr parameter, the Nslookup nslookup_ipaddr parameter, or the Traceroute traceroute_ipaddr parameter.
CVE-2020-12242 1 Valvesoftware 1 Source 2024-11-21 7.2 HIGH 7.8 HIGH
Valve Source allows local users to gain privileges by writing to the /tmp/hl2_relaunch file, which is later executed in the context of a different user account.
CVE-2020-12124 1 Wavlink 2 Wn530h4, Wn530h4 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
CVE-2020-12111 1 Tp-link 4 Nc260, Nc260 Firmware, Nc450 and 1 more 2024-11-21 9.0 HIGH 8.8 HIGH
Certain TP-Link devices allow Command Injection. This affects NC260 1.5.2 build 200304 and NC450 1.5.3 build 200304.
CVE-2020-12109 1 Tp-link 14 Nc200, Nc200 Firmware, Nc210 and 11 more 2024-11-21 9.0 HIGH 8.8 HIGH
Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.
CVE-2020-12107 1 Stengg 2 Vpncrypt M10, Vpncrypt M10 Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows command injection via a text field, which allow full control over this module's Operating System.
CVE-2020-12078 1 Opmantek 1 Open-audit 2024-11-21 9.0 HIGH 8.8 HIGH
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.