Vulnerabilities (CVE)

Filtered by CWE-77
Total 2294 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-3678 1 Apple 1 Mac Os X 2025-04-12 7.2 HIGH N/A
AppleThunderboltEDMService in Apple OS X before 10.10.4 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified Thunderbolt commands.
CVE-2016-1388 1 Cisco 3 Network Analysis Module, Prime Network Analysis Module Software, Prime Virtual Network Analysis Module Software 2025-04-12 7.5 HIGH 9.8 CRITICAL
Cisco Prime Network Analysis Module (NAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) and Prime Virtual Network Analysis Module (vNAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) allow remote attackers to execute arbitrary OS commands via a crafted HTTP request, aka Bug ID CSCuy21882.
CVE-2015-2846 1 Bittorrent 1 Sync 2025-04-12 9.3 HIGH N/A
BitTorrent Sync allows remote attackers to execute arbitrary commands via a crafted btsync: link.
CVE-2015-5349 1 Apache 2 Directory Studio, Ldap Studio 2025-04-12 9.3 HIGH 7.8 HIGH
The CSV export in Apache LDAP Studio and Apache Directory Studio before 2.0.0-M10 does not properly escape field values, which might allow attackers to execute arbitrary commands by leveraging a crafted LDAP entry that is interpreted as a formula when imported into a spreadsheet.
CVE-2014-9622 1 Gentoo 1 Xdg-utils 2025-04-12 6.8 MEDIUM N/A
Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
CVE-2014-4336 1 Linuxfoundation 1 Cups-filters 2025-04-12 5.8 MEDIUM N/A
The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
CVE-2015-6613 1 Google 1 Android 2025-04-12 5.1 MEDIUM N/A
Bluetooth in Android before 5.1.1 LMY48X and 6.0 before 2015-11-01 allows attackers to send commands to a debugging port, and consequently gain privileges, via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24371736.
CVE-2015-5190 1 Pacemaker\/corosync Configuration System Project 1 Pacemaker\/corosync Configuration System 2025-04-12 8.5 HIGH N/A
The pcsd web UI in PCS 0.9.139 and earlier allows remote authenticated users to execute arbitrary commands via "escape characters" in a URL.
CVE-2016-2875 1 Ibm 1 Qradar Security Information And Event Manager 2025-04-12 9.0 HIGH 8.8 HIGH
IBM Security QRadar SIEM 7.1.x and 7.2.x before 7.2.7 allows remote authenticated users to execute arbitrary OS commands as root via unspecified vectors.
CVE-2015-0857 2 Debian, Tardiff Project 2 Debian Linux, Tardiff 2025-04-12 10.0 HIGH 9.8 CRITICAL
Cool Projects TarDiff allows remote attackers to execute arbitrary commands via shell metacharacters in the name of a (1) tar file or (2) file within a tar file.
CVE-2016-1000156 1 Mailcwp Project 1 Mailcwp 2025-04-12 7.5 HIGH 9.8 CRITICAL
Mailcwp remote file upload vulnerability incomplete fix v1.100
CVE-2015-4525 1 Emc 1 Isilon Onefs 2025-04-12 9.0 HIGH N/A
The log-gather implementation in the web administration interface in EMC Isilon OneFS 6.5.x.x through 7.1.1.x before 7.1.1.5 and 7.2.0.x before 7.2.0.2 allows remote authenticated users to execute arbitrary commands with root privileges via unspecified vectors.
CVE-2015-8968 1 Squareup 1 Git-fastclone 2025-04-12 9.3 HIGH 8.8 HIGH
git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories.
CVE-2014-8515 1 Bittorrent 1 Bittorrent 2025-04-12 6.8 MEDIUM N/A
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
CVE-2015-3716 1 Apple 1 Mac Os X 2025-04-12 4.4 MEDIUM N/A
Spotlight in Apple OS X before 10.10.4 allows attackers to execute arbitrary commands via a crafted name of a photo file within the local photo library.
CVE-2016-6656 1 Pivotal Software 1 Greenplum 2025-04-12 6.5 MEDIUM 7.2 HIGH
An issue was discovered in Pivotal Greenplum before 4.3.10.0. Creation of external tables using GPHDFS protocol has a vulnerability whereby arbitrary commands can be injected into the system. In order to exploit this vulnerability the user must have superuser 'gpadmin' access to the system or have been granted GPHDFS protocol permissions in order to create a GPHDFS external table.
CVE-2016-0861 1 Ge 1 Ups Snmp Web Adapter Firmware 2025-04-12 9.0 HIGH 8.8 HIGH
General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to execute arbitrary commands via unspecified vectors.
CVE-2015-5003 1 Ibm 1 Tivoli Monitoring 2025-04-12 8.5 HIGH 8.5 HIGH
The portal in IBM Tivoli Monitoring (ITM) 6.2.2 through FP9, 6.2.3 through FP5, and 6.3.0 before FP7 allows remote authenticated users to execute arbitrary commands by leveraging Take Action view authority and providing crafted input.
CVE-2016-6367 1 Cisco 30 Adaptive Security Appliance Software, Asa 5500, Asa 5500-x and 27 more 2025-04-12 6.8 MEDIUM 7.8 HIGH
Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.
CVE-2016-0236 1 Ibm 1 Security Guardium Database Activity Monitor 2025-04-12 9.0 HIGH 8.8 HIGH
IBM Security Guardium Database Activity Monitor 8.2 before p310, 9.x through 9.5 before p700, and 10.x through 10.1 before p100 allows remote authenticated users to execute arbitrary commands with root privileges via the search field.