Vulnerabilities (CVE)

Filtered by CWE-78
Total 5156 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-15047 2025-10-14 N/A N/A
AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The `exefile` parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. The archived SEARCH-LAB disclosure implies that this vulnerability was remediated in early 2017, but AVTECH has not defined an affected version range.
CVE-2025-0636 2025-10-14 N/A 8.4 HIGH
EMCLI contains a high severity vulnerability where improper neutralization of special elements used in an OS command could be exploited leading to Arbitrary Code Execution.
CVE-2025-9976 2025-10-14 N/A 9.0 CRITICAL
An OS Command Injection vulnerability affecting Station Launcher App in 3DEXPERIENCE platform from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x could allow an attacker to execute arbitrary code on the user's machine.
CVE-2025-5459 1 Puppet 1 Puppet Enterprise 2025-10-14 N/A 8.8 HIGH
A user with specific node group editing permissions and a specially crafted class parameter could be used to execute commands as root on the primary host. It affects Puppet Enterprise versions 2018.1.8 through 2023.8.3 and 2025.3 and has been resolved in versions 2023.8.4 and 2025.4.0.
CVE-2025-59361 1 Chaos-mesh 1 Chaos Mesh 2025-10-14 N/A 9.8 CRITICAL
The cleanIptables mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
CVE-2025-59360 1 Chaos-mesh 1 Chaos Mesh 2025-10-14 N/A 9.8 CRITICAL
The killProcesses mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
CVE-2025-59359 1 Chaos-mesh 1 Chaos Mesh 2025-10-14 N/A 9.8 CRITICAL
The cleanTcs mutation in Chaos Controller Manager is vulnerable to OS command injection. In conjunction with CVE-2025-59358, this allows unauthenticated in-cluster attackers to perform remote code execution across the cluster.
CVE-2024-10035 1 Bg-tek 1 Coslat 2025-10-14 N/A 9.8 CRITICAL
Improper Control of Generation of Code ('Code Injection'), Improper Neutralization of Special Elements used in a Command ('Command Injection'), Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in BG-TEK Informatics Security Technologies CoslatV3 allows Command Injection, Privilege Escalation.This issue affects CoslatV3: through 3.1069. NOTE: The vendor was contacted and it was learned that the product is not supported.
CVE-2025-56819 1 Running-elephant 1 Datart 2025-10-10 N/A 9.8 CRITICAL
An issue in Datart v.1.0.0-rc.3 allows a remote attacker to execute arbitrary code via the INIT connection parameter.
CVE-2025-11138 1 Wenkucms Project 1 Wenkucms 2025-10-10 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in mirweiye wenkucms up to 3.4. This impacts the function createPathOne of the file app/common/common.php. The manipulation results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used.
CVE-2025-60959 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 8.2 HIGH
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information.
CVE-2025-60957 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 9.9 CRITICAL
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-60960 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 8.2 HIGH
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-60962 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 8.2 HIGH
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to gain sensitive information, and possibly other unspecified impacts.
CVE-2025-60963 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 8.2 HIGH
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.
CVE-2025-60787 1 Motioneye Project 1 Motioneye 2025-10-10 N/A 7.2 HIGH
MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
CVE-2025-60965 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 9.1 CRITICAL
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, gain sensitive information, and possibly other unspecified impacts.
CVE-2025-60964 1 Endruntechnologies 2 Sonoma D12, Sonoma D12 Firmware 2025-10-10 N/A 9.1 CRITICAL
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, gain sensitive information, and possibly other unspecified impacts.
CVE-2025-0798 1 Escanav 1 Escan Anti-virus 2025-10-09 7.6 HIGH 8.1 HIGH
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2025-54782 1 Nestjs 1 Devtools-integration 2025-10-09 N/A 8.8 HIGH
Nest is a framework for building scalable Node.js server-side applications. In versions 0.2.0 and below, a critical Remote Code Execution (RCE) vulnerability was discovered in the @nestjs/devtools-integration package. When enabled, the package exposes a local development HTTP server with an API endpoint that uses an unsafe JavaScript sandbox (safe-eval-like implementation). Due to improper sandboxing and missing cross-origin protections, any malicious website visited by a developer can execute arbitrary code on their local machine. The package adds HTTP endpoints to a locally running NestJS development server. One of these endpoints, /inspector/graph/interact, accepts JSON input containing a code field and executes the provided code in a Node.js vm.runInNewContext sandbox. This is fixed in version 0.2.1.