Vulnerabilities > Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

DATE CVE VULNERABILITY TITLE RISK
2009-03-11 CVE-2009-0854 OS Command Injection vulnerability in Dash 0.5.4
Untrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working directory.
local
dash CWE-78
6.9
2009-03-11 CVE-2009-0848 OS Command Injection vulnerability in Opensuse 11.0/11.1
Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path."
4.4
2009-02-21 CVE-2008-6235 OS Command Injection vulnerability in VIM 7.0/7.1
The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.
network
vim CWE-78
critical
9.3
2009-02-21 CVE-2008-3076 OS Command Injection vulnerability in VIM 7.2A.10
The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases.
network
vim CWE-78
critical
9.3
2009-02-21 CVE-2008-3074 OS Command Injection vulnerability in VIM Tar.Vim and VIM
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases.
network
vim CWE-78
critical
9.3
2008-12-26 CVE-2008-5718 OS Command Injection vulnerability in Netatalk
The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
network
netatalk CWE-78
critical
9.3
2008-12-23 CVE-2008-4304 OS Command Injection vulnerability in PHPcollab
general/login.php in phpCollab 2.5 rc3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified input related to the SSL_CLIENT_CERT environment variable.
network
low complexity
phpcollab CWE-78
critical
10.0
2008-10-30 CVE-2008-4796 OS Command Injection vulnerability in multiple products
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
network
low complexity
snoopy-project debian nagios wordpress CWE-78
critical
10.0
2007-10-23 CVE-2007-5653 OS Command Injection vulnerability in PHP
The Component Object Model (COM) functions in PHP 5.x on Windows do not follow safe_mode and disable_functions restrictions, which allows context-dependent attackers to bypass intended limitations, as demonstrated by executing objects with the kill bit set in the corresponding ActiveX control Compatibility Flags, executing programs via a function in compatUI.dll, invoking wscript.shell via wscript.exe, invoking Scripting.FileSystemObject via wshom.ocx, and adding users via a function in shgina.dll, related to the com_load_typelib function.
network
php CWE-78
critical
9.3
2007-10-09 CVE-2007-5322 OS Command Injection vulnerability in Microsoft Visual Foxpro 6.0
Insecure method vulnerability in the FPOLE.OCX 6.0.8450.0 ActiveX control in Microsoft Visual FoxPro 6.0 allows remote attackers to execute arbitrary programs by specifying them as an argument to the FoxDoCmd function.
network
low complexity
microsoft CWE-78
7.5