Export limit exceeded: 23792 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (6029 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-2094 1 Totolink 2 Ex1800t, Ex1800t Firmware 2025-04-03 6.3 Medium
A vulnerability was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. It has been rated as critical. Affected by this issue is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliKey/key leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2095 1 Totolink 2 Ex1800t, Ex1800t Firmware 2025-04-03 6.3 Medium
A vulnerability classified as critical has been found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This affects the function setDmzCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-2096 1 Totolink 2 Ex1800t, Ex1800t Firmware 2025-04-03 6.3 Medium
A vulnerability classified as critical was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function setRebootScheCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mode/week/minute/recHour leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-55030 1 Nasa 1 Fprime 2025-04-03 9.8 Critical
A command injection vulnerability in the Command Dispatcher Service of NASA Fprime v3.4.3 allows attackers to execute arbitrary commands.
CVE-2024-25850 1 Netis-systems 2 Wf2780, Wf2780 Firmware 2025-04-03 9.8 Critical
Netis WF2780 v2.1.40144 was discovered to contain a command injection vulnerability via the wps_ap_ssid5g parameter
CVE-2022-20489 1 Google 1 Android 2025-04-02 7.8 High
In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
CVE-2025-0315 1 Ollama 1 Ollama 2025-04-02 7.5 High
A vulnerability in ollama/ollama <=0.3.14 allows a malicious user to create a customized GGUF model file, upload it to the Ollama server, and create it. This can cause the server to allocate unlimited memory, leading to a Denial of Service (DoS) attack.
CVE-2023-23949 1 Broadcom 2 Symantec Identity Governance And Administration, Symantec Identity Manager 2025-04-02 8.1 High
An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.
CVE-2022-20456 1 Google 1 Android 2025-04-02 7.8 High
In AutomaticZenRule of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703780
CVE-2025-29226 1 Linksys 2 E5600, E5600 Firmware 2025-04-01 6.3 Medium
In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt["count"] parameter.
CVE-2025-29227 1 Linksys 2 E5600, E5600 Firmware 2025-04-01 6.3 Medium
In Linksys E5600 V1.1.0.26, the \usr\share\lua\runtime.lua file contains a command injection vulnerability in the runtime.pingTest function via the pt["pkgsize"] parameter.
CVE-2025-29230 1 Linksys 2 E5600, E5600 Firmware 2025-04-01 8.6 High
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability can be triggered via the `pt["email"]` parameter.
CVE-2025-29223 1 Linksys 2 E5600, E5600 Firmware 2025-04-01 6.3 Medium
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability via the pt parameter in the traceRoute function.
CVE-2022-20490 1 Google 1 Android 2025-04-01 7.8 High
In multiple functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703505
CVE-2022-25908 1 Create-choo-electron Project 1 Create-choo-electron 2025-04-01 7.4 High
All versions of the package create-choo-electron are vulnerable to Command Injection via the devInstall function due to improper user-input sanitization.
CVE-2022-25350 1 Helecloud 1 Puppet-facter 2025-04-01 7.4 High
All versions of the package puppet-facter are vulnerable to Command Injection via the getFact function due to improper input sanitization.
CVE-2024-28353 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2025-04-01 8.8 High
There is a command injection vulnerability in the TRENDnet TEW-827DRU router with firmware version 2.10B01. An attacker can inject commands into the post request parameters usapps.config.smb_admin_name in the apply.cgi interface, thereby gaining root shell privileges.
CVE-2024-28354 1 Trendnet 2 Tew-827dru, Tew-827dru Firmware 2025-04-01 10.0 Critical
There is a command injection vulnerability in the TRENDnet TEW-827DRU router with firmware version 2.10B01. An attacker can inject commands into the post request parameters usapps.@smb[%d].username in the apply.cgi interface, thereby gaining root shell privileges.
CVE-2022-25962 1 Vagrant.js Project 1 Vagrant.js 2025-04-01 7.4 High
All versions of the package vagrant.js are vulnerable to Command Injection via the boxAdd function due to improper input sanitization.
CVE-2022-21810 1 Smartctl Project 1 Smartctl 2025-04-01 7.4 High
All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.