Vulnerabilities (CVE)

Filtered by CWE-78
Total 5424 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-25063 1 Gradle 1 Gradle-completion 2026-03-12 N/A 7.8 HIGH
gradle-completion provides Bash and Zsh completion support for Gradle. A command injection vulnerability was found in gradle-completion up to and including 9.3.0 that allows arbitrary code execution when a user triggers Bash tab completion in a project containing a malicious Gradle build file. The `gradle-completion` script for Bash fails to adequately sanitize Gradle task names and task descriptions, allowing command injection via a malicious Gradle build file when the user completes a command in Bash (without them explicitly running any task in the build). For example, given a task description that includes a string between backticks, then that string would be evaluated as a command when presenting the task description in the completion list. While task execution is the core feature of Gradle, this inherent execution may lead to unexpected outcomes. The vulnerability does not affect zsh completion. The first patched version is 9.3.1. As a workaround, it is possible and effective to temporarily disable bash completion for Gradle by removing `gradle-completion` from `.bashrc` or `.bash_profile`.
CVE-2026-28292 1 Simple-git Project 1 Simple-git 2026-03-12 N/A 9.8 CRITICAL
`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an updated fix for the vulnerability.
CVE-2019-25441 1 Kostasmitroglou 1 Thesystem 2026-03-12 N/A 9.8 CRITICAL
thesystem 1.0 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the run_command endpoint. Attackers can send POST requests with shell commands in the command parameter to execute arbitrary code on the server without authentication.
CVE-2026-25070 1 Seekswan 2 Zikestor Sks8310-8x, Zikestor Sks8310-8x Firmware 2026-03-12 N/A 9.8 CRITICAL
XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain an OS command injection vulnerability in the /goform/PingTestSet endpoint that allows unauthenticated remote attackers to execute arbitrary operating system commands. Attackers can inject malicious commands through the destIp parameter to achieve remote code execution with root privileges on the network switch.
CVE-2026-1427 1 Wellchoose 1 Single Sign-on Portal System 2026-03-11 N/A 8.8 HIGH
Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.
CVE-2026-1428 1 Wellchoose 1 Single Sign-on Portal System 2026-03-11 N/A 8.8 HIGH
Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.
CVE-2026-23816 2026-03-11 N/A 7.2 HIGH
A vulnerability in the command line interface of AOS-CX Switches could allow an authenticated remote attacker to execute arbitrary commands on the underlying operating system.
CVE-2025-15568 2026-03-11 N/A N/A
A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device. This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.
CVE-2025-65791 1 Zoneminder 1 Zoneminder 2026-03-11 N/A 9.8 CRITICAL
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function. NOTE: this is disputed by the Supplier because there is no unsanitized user input to web/views/image.php.
CVE-2026-29058 1 Wwbn 1 Avideo-encoder 2026-03-10 N/A 9.8 CRITICAL
AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.
CVE-2023-47104 2 Linux, Vareille 2 Linux Kernel, Tinyfiledialogs 2026-03-10 N/A 9.8 CRITICAL
tinyfiledialogs (aka tiny file dialogs) before 3.15.0 allows shell metacharacters (such as a backquote or a dollar sign) in titles, messages, and other input data. NOTE: this issue exists because of an incomplete fix for CVE-2020-36767, which only considered single and double quote characters.
CVE-2026-3696 1 Totolink 2 N300rh, N300rh Firmware 2026-03-10 7.5 HIGH 7.3 HIGH
A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the function setWiFiWpsConfig of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.
CVE-2026-22277 1 Dell 1 Unity Operating Environment 2026-03-10 N/A 7.8 HIGH
Dell UnityVSA, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
CVE-2026-21418 1 Dell 1 Unity Operating Environment 2026-03-10 N/A 7.8 HIGH
Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges.
CVE-2026-28391 1 Openclaw 1 Openclaw 2026-03-10 N/A 9.8 CRITICAL
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests (non-default configuration), allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metacharacters like & or %...% to execute unapproved commands beyond the allowlisted operations.
CVE-2026-28517 1 Opendcim 1 Opendcim 2026-03-10 N/A 9.8 CRITICAL
openDCIM version 23.04, through commit 4467e9c4, contains an OS command injection vulnerability in report_network_map.php. The application retrieves the 'dot' configuration parameter from the database and passes it directly to exec() without validation or sanitation. If an attacker can modify the fac_Config.dot value, arbitrary commands may be executed in the context of the web server process.
CVE-2026-24517 1 Copeland 6 Xweb 300d Pro, Xweb 300d Pro Firmware, Xweb 500b Pro and 3 more 2026-03-09 N/A 8.0 HIGH
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into requests sent to the firmware update route.
CVE-2026-24663 1 Copeland 6 Xweb 300d Pro, Xweb 300d Pro Firmware, Xweb 500b Pro and 3 more 2026-03-09 N/A 9.0 CRITICAL
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an unauthenticated attacker to achieve remote code execution on the system by sending a crafted request to the libraries installation route and injecting malicious input into the request body.
CVE-2026-24689 1 Copeland 6 Xweb 300d Pro, Xweb 300d Pro Firmware, Xweb 500b Pro and 3 more 2026-03-09 N/A 8.0 HIGH
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the devices field of the firmware update apply action.
CVE-2026-24695 1 Copeland 6 Xweb 300d Pro, Xweb 300d Pro Firmware, Xweb 500b Pro and 3 more 2026-03-09 N/A 8.0 HIGH
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into OpenSSL argument fields within requests sent to the utility route, leading to remote code execution.