Vulnerabilities (CVE)

Filtered by CWE-78
Total 4312 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-16146 1 Opsview 1 Opsview 2024-11-21 9.0 HIGH 7.2 HIGH
The web management console of Opsview Monitor 5.4.x before 5.4.2 provides functionality accessible by an authenticated administrator to test notifications that are triggered under certain configurable events. The value parameter is not properly sanitized, leading to arbitrary command injection with the privileges of the nagios user account.
CVE-2018-16144 1 Opsview 1 Opsview 2024-11-21 10.0 HIGH 9.8 CRITICAL
The test connection functionality in the NetAudit section of Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to command injection due to improper sanitization of the rancid_password parameter.
CVE-2018-16130 1 Mi 2 Mi Router 3, Miwifi Os 2024-11-21 9.0 HIGH 8.8 HIGH
System command injection in request_mitv in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute arbitrary system commands via the "payload" URL parameter.
CVE-2018-16118 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 9.3 HIGH 8.1 HIGH
A shell escape vulnerability in /webconsole/APIController in the API Configuration component of Sophos XG firewall 17.0.8 MR-8 allows remote attackers to execute arbitrary OS commands via shell metachracters in the "X-Forwarded-for" HTTP header.
CVE-2018-16117 1 Sophos 2 Sfos, Xg Firewall 2024-11-21 9.0 HIGH 8.8 HIGH
A shell escape vulnerability in /webconsole/Controller in Admin Portal of Sophos XG firewall 17.0.8 MR-8 allow remote authenticated attackers to execute arbitrary OS commands via shell metacharacters in the "dbName" POST parameter.
CVE-2018-16090 1 Lenovo 8 System Management Module Firmware, Thinkagile Hx Enclosure 7x81, Thinkagile Hx Enclosure 7y87 and 5 more 2024-11-21 6.0 MEDIUM 7.5 HIGH
In System Management Module (SMM) versions prior to 1.06, the SMM certificate creation and parsing logic is vulnerable to post-authentication command injection.
CVE-2018-16089 1 Lenovo 8 System Management Module Firmware, Thinkagile Hx Enclosure 7x81, Thinkagile Hx Enclosure 7y87 and 5 more 2024-11-21 8.5 HIGH 7.5 HIGH
In System Management Module (SMM) versions prior to 1.06, a field in the header of SMM firmware update images is insufficiently sanitized, allowing post-authentication command injection on the SMM as the root user.
CVE-2018-16055 1 Netgate 1 Pfsense 2024-11-21 9.0 HIGH 8.8 HIGH
An authenticated command injection vulnerability exists in status_interfaces.php via dhcp_relinquish_lease() in pfSense before 2.4.4 due to its passing user input from the $_POST parameters "ifdescr" and "ipv" to a shell without escaping the contents of the variables. This allows an authenticated WebGUI user with privileges for the affected page to execute commands in the context of the root user when submitting a request to relinquish a DHCP lease for an interface which is configured to obtain its address via DHCP.
CVE-2018-15887 1 Asus 2 Dsl-n12e C1, Dsl-n12e C1 Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Main_Analysis_Content.asp in ASUS DSL-N12E_C1 1.1.2.3_345 is prone to Authenticated Remote Command Execution, which allows a remote attacker to execute arbitrary OS commands via service parameters, such as shell metacharacters in the destIP parameter of a cmdMethod=ping request.
CVE-2018-15877 1 Plainview Activity Monitor Project 1 Plainview Activity Monitor 2024-11-21 9.0 HIGH 8.8 HIGH
The Plainview Activity Monitor plugin before 20180826 for WordPress is vulnerable to OS command injection via shell metacharacters in the ip parameter of a wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools request.
CVE-2018-15726 1 Pulsesecure 1 Pulse Secure Desktop Client 2024-11-21 4.6 MEDIUM 5.3 MEDIUM
The Pulse Secure Desktop (macOS) 5.3RX before 5.3R5 and 9.0R1 has a Privilege Escalation Vulnerability.
CVE-2018-15722 1 Logitech 2 Harmony Hub, Harmony Hub Firmware 2024-11-21 9.3 HIGH 8.1 HIGH
The Logitech Harmony Hub before version 4.15.206 is vulnerable to OS command injection via the time update request. A remote server or man in the middle can inject OS commands with a properly formatted response.
CVE-2018-15716 1 Nuuo 5 Ne-2020, Ne-2040, Ne-4080 and 2 more 2024-11-21 9.0 HIGH 8.8 HIGH
NUUO NVRMini2 version 3.9.1 is vulnerable to authenticated remote command injection. An attacker can send crafted requests to upgrade_handle.php to execute OS commands as root.
CVE-2018-15711 1 Nagios 1 Nagios Xi 2024-11-21 6.5 MEDIUM 8.8 HIGH
Nagios XI 5.5.6 allows remote authenticated attackers to reset and regenerate the API key of more privileged users. The attacker can then use the new API key to execute API calls at elevated privileges.
CVE-2018-15710 1 Nagios 1 Nagios Xi 2024-11-21 7.2 HIGH 7.8 HIGH
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.
CVE-2018-15709 1 Nagios 1 Nagios Xi 2024-11-21 6.5 MEDIUM 8.8 HIGH
Nagios XI 5.5.6 allows remote authenticated attackers to execute arbitrary commands via a crafted HTTP request.
CVE-2018-15553 1 Telus 2 Actiontec T2200h, Actiontec T2200h Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
fileshare.cmd on Telus Actiontec T2200H T2200H-31.128L.03 devices allows OS Command Injection via shell metacharacters in the smbdUserid or smbdPasswd field.
CVE-2018-15529 1 Mutiny 1 Mutiny 2024-11-21 6.5 MEDIUM 8.8 HIGH
A command injection vulnerability in maintenance.cgi in Mutiny "Monitoring Appliance" before 6.1.0-5263 allows authenticated users, with access to the admin interface, to inject arbitrary commands within the filename of a system upgrade upload.
CVE-2018-15484 1 Kone 2 Group Controller, Group Controller Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on KONE Group Controller (KGC) devices before 4.6.5. Unauthenticated Remote Code Execution is possible through the open HTTP interface by modifying autoexec.bat, aka KONE-01.
CVE-2018-15481 1 Ucopia 2 Wireless Appliance, Wireless Appliance Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.