Vulnerabilities > Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

DATE CVE VULNERABILITY TITLE RISK
2020-01-20 CVE-2020-7240 OS Command Injection vulnerability in Meinbergglobal Lantime M1000 Firmware and Lantime M300 Firmware
Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration).
network
low complexity
meinbergglobal CWE-78
8.8
2020-01-20 CVE-2020-7237 OS Command Injection vulnerability in Cacti 1.2.8
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php.
network
low complexity
cacti CWE-78
8.8
2020-01-17 CVE-2019-10958 OS Command Injection vulnerability in Geutebrueck products
Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated attacker with access to network configuration to supply system commands to the server, leading to remote code execution as root.
network
low complexity
geutebrueck CWE-78
7.2
2020-01-17 CVE-2019-10956 OS Command Injection vulnerability in Geutebrueck products
Geutebruck IP Cameras G-Code(EEC-2xxx), G-Cam(EBC-21xx/EFD-22xx/ETHC-22xx/EWPC-22xx): All versions 1.12.0.25 and prior may allow a remote authenticated user, using a specially crafted URL command, to execute commands as root.
network
low complexity
geutebrueck CWE-78
7.2
2020-01-15 CVE-2020-1609 OS Command Injection vulnerability in Juniper Junos
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv6 packets who may then arbitrarily execute commands as root on the target device.
low complexity
juniper CWE-78
8.8
2020-01-15 CVE-2020-1605 OS Command Injection vulnerability in Juniper Junos
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may then arbitrarily execute commands as root on the target device.
low complexity
juniper CWE-78
8.8
2020-01-15 CVE-2020-1602 OS Command Injection vulnerability in Juniper Junos
When a device using Juniper Network's Dynamic Host Configuration Protocol Daemon (JDHCPD) process on Junos OS or Junos OS Evolved which is configured in relay mode it vulnerable to an attacker sending crafted IPv4 packets who may remotely take over the code execution of the JDHDCP process.
low complexity
juniper CWE-78
8.8
2020-01-14 CVE-2020-5505 OS Command Injection vulnerability in Vaaip Freelancy 1.0.0
Freelancy v1.0.0 allows remote command execution via the "file":"data:application/x-php;base64 substring (in conjunction with "type":"application/x-php"} to the /api/files/ URI.
network
low complexity
vaaip CWE-78
critical
9.8
2020-01-13 CVE-2020-6948 OS Command Injection vulnerability in Hashbrowncms Hashbrown CMS
A remote code execution issue was discovered in HashBrown CMS through 1.3.3.
network
low complexity
hashbrowncms CWE-78
critical
9.8
2020-01-13 CVE-2019-18894 OS Command Injection vulnerability in Avast Premium Security 19.8.2393
In Avast Premium Security 19.8.2393, attackers can send a specially crafted request to the local web server run by Avast Antivirus on port 27275 to support Bank Mode functionality.
local
low complexity
avast CWE-78
7.8