Filtered by CWE-77
Total 2382 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-32700 4 Luatex Project, Miktex, Redhat and 1 more 8 Luatex, Miktex, Enterprise Linux and 5 more 2025-01-31 8.8 High
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
CVE-2022-36769 2 Ibm, Redhat 2 Cloud Pak For Data, Openshift 2025-01-31 7.2 High
IBM Cloud Pak for Data 4.5 and 4.6 could allow a privileged user to upload malicious files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 232034.
CVE-2024-25951 1 Dell 1 Idrac8 2025-01-31 8 High
A command injection vulnerability exists in local RACADM. A malicious authenticated user could gain control of the underlying operating system.
CVE-2024-45824 1 Rockwellautomation 1 Factorytalk View 2025-01-31 9.8 Critical
CVE-2024-45824 IMPACT A remote code vulnerability exists in the affected products. The vulnerability occurs when chained with Path Traversal, Command Injection, and XSS Vulnerabilities and allows for full unauthenticated remote code execution. The link in the mitigations section below contains patches to fix this issue.
CVE-2023-31460 1 Mitel 1 Mivoice Connect 2025-01-31 7.2 High
A vulnerability in the Connect Mobility Router component of MiVoice Connect versions 9.6.2208.101 and earlier could allow an authenticated attacker with internal network access to conduct a command injection attack due to insufficient restriction on URL parameters.
CVE-2023-2373 1 Ui 3 Edgemax Edgerouter Firmware, Er-x, Er-x-sfp 2025-01-30 6.3 Medium
A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Management Interface. The manipulation of the argument ecn-up leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227649 was assigned to this vulnerability.
CVE-2024-4712 2 Microsoft, Papercut 3 Windows, Papercut Mf, Papercut Ng 2025-01-30 7.8 High
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation. Note: This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
CVE-2024-49026 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-01-30 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-43613 1 Microsoft 1 Azure Database For Postgresql Flexible Server 2025-01-30 7.2 High
Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
CVE-2024-49042 1 Microsoft 1 Azure Database For Postgresql Flexible Server 2025-01-30 7.2 High
Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability
CVE-2024-43591 1 Microsoft 2 Azure Cli, Azure Service Connector 2025-01-29 8.7 High
Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability
CVE-2024-43497 1 Microsoft 1 Deepspeed 2025-01-29 8.4 High
DeepSpeed Remote Code Execution Vulnerability
CVE-2024-43601 2 Linux, Microsoft 2 Linux Kernel, Visual Studio Code 2025-01-29 7.8 High
Visual Studio Code for Linux Remote Code Execution Vulnerability
CVE-2023-31476 1 Gl-inet 4 Gl-mv1000, Gl-mv1000 Firmware, Gl-mv1000w and 1 more 2025-01-29 7.5 High
An issue was discovered on GL.iNet devices running firmware before 3.216. There is an arbitrary file write in which an empty file can be created almost anywhere on the filesystem, as long as the filename and path is no more than 6 characters (the working directory is /www).
CVE-2023-30135 1 Tenda 2 Ac18, Ac18 Firmware 2025-01-29 9.8 Critical
Tenda AC18 v15.03.05.19(6318_)_cn was discovered to contain a command injection vulnerability via the deviceName parameter in the setUsbUnload function.
CVE-2023-26125 2 Gin-gonic, Redhat 5 Gin, Migration Toolkit Applications, Migration Toolkit Virtualization and 2 more 2025-01-29 5.6 Medium
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
CVE-2023-22788 2 Arubanetworks, Hp 2 Arubaos, Instantos 2025-01-28 7.2 High
Multiple authenticated command injection vulnerabilities exist in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
CVE-2024-57590 2025-01-28 9.8 Critical
TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface "ntp_sync.cgi",which allows remote attackers to execute arbitrary commands via parameter "ntp_server" passed to the "ntp_sync.cgi" binary through a POST request.
CVE-2024-48419 2025-01-28 8.8 High
Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Command Injection issues in /bin/goahead. Specifically, these issues can be triggered through /goform/tracerouteDiagnosis, /goform/pingDiagnosis, and /goform/fromSysToolPingCmd Each of these issues allows an attacker with access to the web interface to inject and execute arbitrary shell commands, with "root" privileges.
CVE-2023-27407 1 Siemens 2 Scalance Lpe9403, Scalance Lpe9403 Firmware 2025-01-28 9.9 Critical
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The web based management of affected device does not properly validate user input, making it susceptible to command injection. This could allow an authenticated remote attacker to access the underlying operating system as the root user.