Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
command injection vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-1212
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
1 Github repository
NA
CVE-2009-2261
PeaZIP 2.6.1, 2.5.1, and previous versions on Windows allows user-assisted remote malicious users to execute arbitrary commands via a .zip archive with a .txt file whose name contains | (pipe) characters and a command.
Giorgio Tani Peazip
Giorgio Tani Peazip 2.4.1
Giorgio Tani Peazip 1.10
Giorgio Tani Peazip 1.9.3
Giorgio Tani Peazip 1.6
Giorgio Tani Peazip 1.5
Giorgio Tani Peazip 2.2
Giorgio Tani Peazip 2.1
Giorgio Tani Peazip 1.8.2
Giorgio Tani Peazip 1.8.1
Giorgio Tani Peazip 1.2
Giorgio Tani Peazip 1.1
Giorgio Tani Peazip 2.4
Giorgio Tani Peazip 2.3a
Giorgio Tani Peazip 1.9.2
Giorgio Tani Peazip 1.9.1
Giorgio Tani Peazip 1.9
Giorgio Tani Peazip 1.4
Giorgio Tani Peazip 1.3
Giorgio Tani Peazip 2.6.1
Giorgio Tani Peazip 2.0
Giorgio Tani Peazip 1.11
2 EDB exploits
9.8
CVSSv3
CVE-2017-6316
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote malicious users to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
Citrix Netscaler Sd-wan
2 EDB exploits
9.8
CVSSv3
CVE-2022-46169
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a...
Cacti Cacti
1 Metasploit module
42 Github repositories
8.1
CVSSv3
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix prior to 2.0.18, 2.2.x prior to 2.2.13, and 3.0.x prior to 3.0.3, when used with a shell other than bash, allows context-dependent malicious users to execute arbitrary code or SQL comm...
Zabbix Zabbix 2.0.14
Zabbix Zabbix 2.0.13
Zabbix Zabbix 2.0.6
Zabbix Zabbix 2.0.5
Zabbix Zabbix 2.2.10
Zabbix Zabbix 2.2.9
Zabbix Zabbix 2.0.12
Zabbix Zabbix 2.0.11
Zabbix Zabbix 2.0.4
Zabbix Zabbix 2.0.3
Zabbix Zabbix 2.0.2
Zabbix Zabbix 2.2.8
Zabbix Zabbix 2.2.7
Zabbix Zabbix 2.2.0
Zabbix Zabbix 3.0.2
Zabbix Zabbix 2.2.2
Zabbix Zabbix 2.2.1
Zabbix Zabbix 2.0.17
Zabbix Zabbix 2.0.10
Zabbix Zabbix 2.0.9
Zabbix Zabbix 2.0.1
Zabbix Zabbix 2.0.0
1 EDB exploit
6.7
CVSSv3
CVE-2018-0477
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local malicious user to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability exist because the affected software improperly sanitizes c...
Cisco Ios Xe 16.7\\(1\\)
Cisco Ios Xe 16.7.1
Cisco Ios Xe 15.3\\(3\\)s3.16
6.7
CVSSv3
CVE-2018-0481
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local malicious user to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability exist because the affected software improperly sanitizes c...
Cisco Ios Xe 15.3\\(3\\)s3.16
Cisco Ios Xe 16.7.1
Cisco Ios Xe 16.7\\(1\\)
8.8
CVSSv3
CVE-2019-16663
An issue exists in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.
Rconfig Rconfig 3.9.2
3 Github repositories
7.8
CVSSv3
CVE-2022-45639
OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows malicious users to execute arbitrary commands via a crafted value to the m parameter. NOTE: third parties have disputed this because there is no analysis showing that the backtick command executes outside the ...
Sleuthkit The Sleuth Kit 4.11.1
NA
CVE-2014-83893
Core Security Technologies Advisory - AirLive MD-3025, BU-3026, BU-2015, WL-2000CAM, and POE-200CAM are IP cameras designed for professional surveillance and security applications. The built-in IR LEDs provide high quality nighttime monitoring. These AirLive devices are vulnerabl...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »