Filtered by CWE-78
Total 4028 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2018-11177 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 35 of 46).
CVE-2018-11183 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 41 of 46).
CVE-2018-11157 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 15 of 46).
CVE-2018-11168 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 26 of 46).
CVE-2018-11132 1 Quest 1 Kace System Management Appliance 2024-08-05 N/A
In order to perform actions that require higher privileges, the Quest KACE System Management Appliance 8.0.318 relies on a message queue that runs daemonized with root privileges and only allows a set of commands to be executed. A command injection vulnerability exists within this message queue which allows low-privilege users to append arbitrary commands that will be run as root.
CVE-2018-11154 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 12 of 46).
CVE-2018-11161 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 19 of 46).
CVE-2018-11145 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 3 of 46).
CVE-2018-11138 1 Quest 1 Kace System Management Appliance 2024-08-05 N/A
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
CVE-2018-11159 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 17 of 46).
CVE-2018-11139 1 Quest 1 Kace System Management Appliance 2024-08-05 N/A
The '/common/ajax_email_connection_test.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by any authenticated user and can be abused to execute arbitrary commands on the system. This script is vulnerable to command injection via the unsanitized user input 'TEST_SERVER' sent to the script via the POST method.
CVE-2018-11150 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 8 of 46).
CVE-2018-11146 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 4 of 46).
CVE-2018-11152 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 10 of 46).
CVE-2018-11147 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 5 of 46).
CVE-2018-11155 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 13 of 46).
CVE-2018-11151 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 9 of 46).
CVE-2018-11143 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 1 of 46).
CVE-2018-11144 1 Quest 1 Disk Backup 2024-08-05 N/A
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 2 of 46).
CVE-2018-10987 1 Diqee 2 Diqee360, Diqee360 Firmware 2024-08-05 N/A
An issue was discovered on Dongguan Diqee Diqee360 devices. The affected vacuum cleaner suffers from an authenticated remote code execution vulnerability. An authenticated attacker can send a specially crafted UDP packet, and execute commands on the vacuum cleaner as root. The bug is in the function REQUEST_SET_WIFIPASSWD (UDP command 153). A crafted UDP packet runs "/mnt/skyeye/mode_switch.sh %s" with an attacker controlling the %s variable. In some cases, authentication can be achieved with the default password of 888888 for the admin account.