Search Results (20448 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-39808 1 Fortinet 3 Fortisandbox, Fortisandbox Paas, Fortisandboxpaas 2026-05-22 9.1 Critical
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>
CVE-2024-51092 1 Librenms 1 Librenms 2026-05-22 9.1 Critical
LibreNMS before 24.10.0 allows a remote attacker to execute arbitrary code via OS command injection involving AboutController.php's index(), SettingsController.php's update(), and PollDevice.php's initRrdDirectory().
CVE-2022-27224 1 Galsys 2 Nts-6002-gps, Nts-6002-gps Firmware 2026-05-22 7.2 High
An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address). NOTE: this is disputed by the Supplier because the affected components were never shipped in a production release (they were only present in development releases), and because no privilege boundary is crossed (an applicable "authenticated attacker" always also has the supported ability to make an SSH connection as root).
CVE-2026-9277 2026-05-22 8.1 High
shell-quote's `quote()` function did not validate object-token inputs against the operator model used by `parse()`. The `.op` field was backslash-escaped character by character using `/(.)/g`, which in JavaScript does not match line terminators (\n, \r, U+2028, U+2029). A line terminator in `.op` therefore passed through unescaped into the output; POSIX shells treat a literal newline as a command separator, so any content after it would execute as a second command. The vulnerable code path is reachable in two ways: (1) direct construction of `{ op: '...\n...' }` from external input, and (2) via `parse(cmd, envFn)` when `envFn` returns object tokens whose `.op` is attacker-influenced. Both are documented API surface. Fixed by replacing the per-character escape with strict shape validation: `.op` must match the parser's control-operator allowlist; `{ op: 'glob', pattern }` validates `pattern` and forbids line terminators; `{ comment }` validates `comment` and forbids line terminators; any other object shape throws `TypeError`.
CVE-2022-22709 1 Microsoft 1 Vp9 Video Extensions 2026-05-22 7.8 High
VP9 Video Extensions Remote Code Execution Vulnerability
CVE-2022-23282 1 Microsoft 1 Paint 3d 2026-05-22 7.8 High
Paint 3D Remote Code Execution Vulnerability
CVE-2022-24451 1 Microsoft 1 Vp9 Video Extensions 2026-05-22 7.8 High
VP9 Video Extensions Remote Code Execution Vulnerability
CVE-2022-24457 1 Microsoft 1 Heif Image Extension 2026-05-22 7.8 High
HEIF Image Extensions Remote Code Execution Vulnerability
CVE-2022-24501 1 Microsoft 1 Vp9 Video Extensions 2026-05-22 7.8 High
VP9 Video Extensions Remote Code Execution Vulnerability
CVE-2026-5740 1 Mattermost 1 Mattermost 2026-05-22 7.5 High
Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to properly validate msgpack-encoded WebSocket frames before memory allocation which allows an unauthenticated remote attacker to crash the server process and cause a full service outage for all users via a crafted binary WebSocket message sent to the public WebSocket endpoint.. Mattermost Advisory ID: MMSA-2026-00647
CVE-2026-44072 1 Netatalk 1 Netatalk 2026-05-22 2.5 Low
Netatalk 2.2.1 through 4.4.2 calls system() after a failed chdir() without properly handling the error condition, which allows a local privileged user to execute unintended commands or cause a minor service disruption under specific conditions.
CVE-2026-5433 1 Honeywell 1 Control Network Module (cnm) 2026-05-22 9.1 Critical
Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).
CVE-2026-39830 1 Golang 1 Ssh 2026-05-22 N/A
A malicious SSH peer could send unsolicited global request responses to fill an internal buffer, blocking the connection's read loop. The blocked goroutine could not be released by calling Close(), resulting in a resource leak per connection. Unsolicited global responses are now discarded.
CVE-2023-3050 1 Tmtmakine 2 Lockcell, Lockcell Firmware 2026-05-22 9.8 Critical
Reliance on Cookies without Validation and Integrity Checking in a Security Decision vulnerability in TMT Lockcell allows Privilege Abuse, Authentication Bypass. This issue affects Lockcell: before 15.
CVE-2026-32311 2 Flowsint, Reconurge 2 Flowsint, Flowsint 2026-05-21 9.8 Critical
Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and relationships. The sketches contain information on an OSINT target (usernames, websites, etc) within these nodes and relationships. The nodes can have automated processes execute on them called 'transformers'. A remote attacker can create a sketch, then trigger the 'org_to_asn' transform on an organization node to execute arbitrary OS commands as root on the host machine via shell metacharacters and a docker container escape. Commit b52cbbb904c8013b74308d58af88bc7dbb1b055c appears to remove the code that causes this issue.
CVE-2026-33816 1 Jackc 1 Pgx 2026-05-21 9.8 Critical
Memory-safety vulnerability in github.com/jackc/pgx/v5.
CVE-2026-33815 1 Jackc 1 Pgx 2026-05-21 9.8 Critical
Memory-safety vulnerability in github.com/jackc/pgx/v5.
CVE-2026-45253 1 Freebsd 1 Freebsd 2026-05-21 8.4 High
ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the affected system.
CVE-2026-45255 1 Freebsd 1 Freebsd 2026-05-21 7.5 High
When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled network names was not careful to prevent expansion by the shell. As a result, a suitably crafted network name can be used to execute commands via a subshell. The problem can be exploited to execute code as root on the system running bsdinstall or bsdconfig. The attacker would need to create an access point with a specially crafted name and be within range of a Wi-Fi scan. Note that bsdinstall and bsdconfig are vulnerable as soon as the user prompts them to scan for nearby networks; they do not need to actually select the malicious network.
CVE-2026-8632 2 Hp, Hp Inc 2 Linux Imaging And Printing, Hp Linux Imaging And Printing Software 2026-05-21 7.8 High
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.