Vulnerabilities > Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

DATE CVE VULNERABILITY TITLE RISK
2009-02-21 CVE-2008-6235 OS Command Injection vulnerability in VIM 7.0/7.1
The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.
network
vim CWE-78
critical
9.3
2009-02-21 CVE-2008-3076 OS Command Injection vulnerability in VIM 7.2A.10
The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test cases.
network
vim CWE-78
critical
9.3
2009-02-21 CVE-2008-3074 OS Command Injection vulnerability in VIM Tar.Vim and VIM
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases.
network
vim CWE-78
critical
9.3
2008-12-26 CVE-2008-5718 OS Command Injection vulnerability in Netatalk
The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
network
netatalk CWE-78
critical
9.3
2008-12-23 CVE-2008-4304 OS Command Injection vulnerability in PHPcollab
general/login.php in phpCollab 2.5 rc3 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified input related to the SSL_CLIENT_CERT environment variable.
network
low complexity
phpcollab CWE-78
critical
10.0
2008-10-30 CVE-2008-4796 OS Command Injection vulnerability in multiple products
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
network
low complexity
snoopy-project debian nagios wordpress CWE-78
critical
10.0
2007-10-23 CVE-2007-5653 OS Command Injection vulnerability in PHP
The Component Object Model (COM) functions in PHP 5.x on Windows do not follow safe_mode and disable_functions restrictions, which allows context-dependent attackers to bypass intended limitations, as demonstrated by executing objects with the kill bit set in the corresponding ActiveX control Compatibility Flags, executing programs via a function in compatUI.dll, invoking wscript.shell via wscript.exe, invoking Scripting.FileSystemObject via wshom.ocx, and adding users via a function in shgina.dll, related to the com_load_typelib function.
network
php CWE-78
critical
9.3
2007-10-09 CVE-2007-5322 OS Command Injection vulnerability in Microsoft Visual Foxpro 6.0
Insecure method vulnerability in the FPOLE.OCX 6.0.8450.0 ActiveX control in Microsoft Visual FoxPro 6.0 allows remote attackers to execute arbitrary programs by specifying them as an argument to the FoxDoCmd function.
network
low complexity
microsoft CWE-78
7.5
2007-10-04 CVE-2007-4673 OS Command Injection vulnerability in Apple Quicktime 7.2
Argument injection vulnerability in Apple QuickTime 7.2 for Windows XP SP2 and Vista allows remote attackers to execute arbitrary commands via a URL in the qtnext field in a crafted QTL file.
network
apple CWE-78
critical
9.3
2007-09-14 CVE-2007-4891 OS Command Injection vulnerability in Microsoft Visual Studio 6.0/6.0.0.9782
A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell.
network
microsoft CWE-78
6.8