Total
2086 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-26429 | 1 Open-xchange | 1 Open-xchange Appsuite Backend | 2024-08-02 | 3.5 Low |
Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported data structure. We now drop all control characters that are not whitespace character during the export. No publicly available exploits are known. | ||||
CVE-2023-26295 | 1 Hp | 1 Hp Device Manager | 2024-08-02 | 9.8 Critical |
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | ||||
CVE-2023-26296 | 1 Hp | 1 Hp Device Manager | 2024-08-02 | 8.8 High |
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | ||||
CVE-2023-26297 | 1 Hp | 1 Hp Device Manager | 2024-08-02 | 8.8 High |
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | ||||
CVE-2023-26294 | 1 Hp | 1 Hp Device Manager | 2024-08-02 | 7.8 High |
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | ||||
CVE-2023-26298 | 1 Hp | 1 Hp Device Manager | 2024-08-02 | 8.8 High |
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | ||||
CVE-2023-26127 | 1 N158 Project | 1 N158 | 2024-08-02 | 7.8 High |
All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. | ||||
CVE-2023-26128 | 1 Keep-module-latest Project | 1 Keep-module-latest | 2024-08-02 | 8.4 High |
All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. | ||||
CVE-2023-26129 | 1 Bwm-ng Project | 1 Bwm-ng | 2024-08-02 | 8.4 High |
All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file. **Note:** To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment. | ||||
CVE-2023-26134 | 1 Git-commit-info Project | 1 Git-commit-info | 2024-08-02 | 9.8 Critical |
Versions of the package git-commit-info before 2.0.2 are vulnerable to Command Injection such that the package-exported method gitCommitInfo () fails to sanitize its parameter commit, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they control the hash content. | ||||
CVE-2023-25805 | 1 Versionn Project | 1 Versionn | 2024-08-02 | 9.8 Critical |
versionn, software for changing version information across multiple files, has a command injection vulnerability in all versions prior to version 1.1.0. This issue is patched in version 1.1.0. | ||||
CVE-2023-24229 | 1 Draytek | 2 Vigor2960, Vigor2960 Firmware | 2024-08-02 | 7.8 High |
DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | ||||
CVE-2023-24612 | 1 Pdfbook Project | 1 Pdfbook | 2024-08-02 | 9.8 Critical |
The PdfBook extension through 2.0.5 before b07b6a64 for MediaWiki allows command injection via an option. | ||||
CVE-2023-24330 | 2024-08-02 | 8.8 High | ||
Command Injection vulnerability in D-Link Dir 882 with firmware version DIR882A1_FW130B06 allows attackers to run arbitrary commands via crafted POST request to /HNAP1/. | ||||
CVE-2023-24238 | 1 Totolink | 2 A7100ru, A7100ru Firmware | 2024-08-02 | 9.8 Critical |
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the city parameter at setting/delStaticDhcpRules. | ||||
CVE-2023-24276 | 1 Totolink | 2 A7100ru, A7100ru Firmware | 2024-08-02 | 9.8 Critical |
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the country parameter at setting/delStaticDhcpRules. | ||||
CVE-2023-24236 | 1 Totolink | 2 A7100ru, A7100ru Firmware | 2024-08-02 | 9.8 Critical |
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the province parameter at setting/delStaticDhcpRules. | ||||
CVE-2023-24142 | 1 Totolink | 2 Ca300-poe, Ca300-poe Firmware | 2024-08-02 | 9.8 Critical |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingSize parameter in the setNetworkDiag function. | ||||
CVE-2023-24143 | 1 Totolink | 2 Ca300-poe, Ca300-poe Firmware | 2024-08-02 | 9.8 Critical |
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagTracertHop parameter in the setNetworkDiag function. | ||||
CVE-2023-24152 | 1 Totolink | 2 T8, T8 Firmware | 2024-08-02 | 9.8 Critical |
A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. |