Search Results (6341 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-38156 1 Kratosdefense 2 Spectralnet Narrowband, Spectralnet Narrowband Firmware 2025-01-03 7.2 High
A remote command injection issues exists in the web server of the Kratos SpectralNet device with SpectralNet Narrowband (NB) before 1.7.5. As an admin user, an attacker can send a crafted password in order to execute Linux commands as the root user.
CVE-2023-33625 1 Dlink 2 Dir-600, Dir-600 Firmware 2025-01-03 9.8 Critical
D-Link DIR-600 Hardware Version B5, Firmware Version 2.18 was discovered to contain a command injection vulnerability via the ST parameter in the lxmldbc_system() function.
CVE-2023-35035 1 Atos 2 Unify Openscape 4000 Assistant, Unify Openscape 4000 Manager 2025-01-03 8.8 High
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-23557.
CVE-2023-34105 1 Ossrs 1 Simple Realtime Server 2025-01-03 7.5 High
SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.
CVE-2023-27837 1 Tp-link 2 Tl-wpa8630p, Tl-wpa8630p Firmware 2025-01-03 9.8 Critical
TP-Link TL-WPA8630P (US)_ V2_ Version 171011 was discovered to contain a command injection vulnerability via the key parameter in the function sub_ 40A774.
CVE-2024-49767 2 Palletsprojects, Redhat 3 Quart, Werkzeug, Openshift Ai 2025-01-03 7.5 High
Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
CVE-2022-23267 3 Fedoraproject, Microsoft, Redhat 9 Fedora, .net, .net Core and 6 more 2025-01-02 7.5 High
.NET and Visual Studio Denial of Service Vulnerability
CVE-2024-29086 1 Openatom 1 Openharmony 2025-01-02 3.3 Low
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow.
CVE-2022-21986 3 Fedoraproject, Microsoft, Redhat 6 Fedora, .net, Visual Studio 2019 and 3 more 2025-01-02 7.5 High
.NET Denial of Service Vulnerability
CVE-2023-35390 2 Microsoft, Redhat 6 .net, Visual Studio, Visual Studio 2022 and 3 more 2025-01-01 7.8 High
.NET and Visual Studio Remote Code Execution Vulnerability
CVE-2023-21805 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2025-01-01 7.8 High
Windows MSHTML Platform Remote Code Execution Vulnerability
CVE-2024-38228 1 Microsoft 1 Sharepoint Server 2024-12-31 7.2 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38227 1 Microsoft 1 Sharepoint Server 2024-12-31 7.2 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-42427 1 Dell 2 Wyse Proprietary Os, Wyse Thinos 2024-12-20 7.6 High
Dell ThinOS versions 2402 and 2405, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with physical access could potentially exploit this vulnerability, leading to Elevation of privileges.
CVE-2023-21144 1 Google 1 Android 2024-12-18 7.5 High
In doInBackground of NotificationContentInflater.java, there is a possible temporary denial or service due to long running operations. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-252766417
CVE-2023-24032 1 Zimbra 1 Collaboration 2024-12-18 7.8 High
In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE).
CVE-2023-47124 1 Traefik 1 Traefik 2024-12-18 5.9 Medium
Traefik is an open source HTTP reverse proxy and load balancer. When Traefik is configured to use the `HTTPChallenge` to generate and renew the Let's Encrypt TLS certificates, the delay authorized to solve the challenge (50 seconds) can be exploited by attackers to achieve a `slowloris attack`. This vulnerability has been patch in version 2.10.6 and 3.0.0-beta5. Users are advised to upgrade. Users unable to upgrade should replace the `HTTPChallenge` with the `TLSChallenge` or the `DNSChallenge`.
CVE-2024-43083 1 Google 1 Android 2024-12-17 6.2 Medium
In validate of WifiConfigurationUtil.java , there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-31314 1 Google 1 Android 2024-12-17 6.2 Medium
In multiple functions of ShortcutService.java, there is a possible persistent DOS due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-30903 1 Hp 1 Hp-ux 2024-12-17 5.5 Medium
HP-UX could be exploited locally to create a Denial of Service (DoS) when any physical interface is configured with IPv6/inet6.