Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) — Vulnerability Class 2678

2678 vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)). AI Chinese analysis included.

CVE IDTitleCVSSSeverityPublished
CVE-2024-4505 Ruijie RG-UAC ip_addr_add_commit.php os command injection — RG-UAC 4.7 Medium2024-05-05
CVE-2024-4504 Ruijie RG-UAC commit.php os command injection — RG-UAC 4.7 Medium2024-05-05
CVE-2024-4503 Ruijie RG-UAC dhcp_relay_commit.php os command injection — RG-UAC 4.7 Medium2024-05-05
CVE-2024-4502 Ruijie RG-UAC dhcp_client_commit.php os command injection — RG-UAC 4.7 Medium2024-05-05
CVE-2024-4501 Ruijie RG-UAC commit.php os command injection — RG-UAC 4.7 Medium2024-05-05
CVE-2023-37407 IBM Aspera Orchestrator command execution — Aspera Orchestrator 8.8 High2024-05-03
CVE-2024-34073 Command Injection in sagemaker-python-sdk — sagemaker-python-sdk 7.8 High2024-05-03
CVE-2023-47220 Media Streaming add-on — Media Streaming add-on 6.6 Medium2024-05-03
CVE-2023-51625 D-Link DCS-8300LHV2 ONVIF SetSystemDateAndTime Command Injection Remote Code Execution Vulnerability — DCS-8300LHV2 8.0 -2024-05-03
CVE-2023-51585 Voltronic Power ViewPower USBCommEx shutdown Command Injection Remote Code Execution Vulnerability — ViewPower 8.8 -2024-05-03
CVE-2023-50217 D-Link G416 awsfile rm Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50216 D-Link G416 awsfile tar File Handling Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50215 D-Link G416 nodered gz File Handling Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50214 D-Link G416 nodered tar File Handling Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50213 D-Link G416 nodered File Handling Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50207 D-Link G416 flupl filename Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50206 D-Link G416 flupl query_type edit Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50204 D-Link G416 flupl pythonapp Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50205 D-Link G416 awsfile chmod Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50203 D-Link G416 nodered chmod Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50202 D-Link G416 flupl pythonmodules Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50201 D-Link G416 cfgsave upusb Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50200 D-Link G416 cfgsave backusb Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-50198 D-Link G416 cfgsave Command Injection Remote Code Execution Vulnerability — G416 8.8 -2024-05-03
CVE-2023-44426 D-Link DIR-X3260 SetSysEmailSettings AccountPassword Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.0 -2024-05-03
CVE-2023-44427 D-Link DIR-X3260 SetSysEmailSettings SMTPServerAddress Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.8 -2024-05-03
CVE-2023-44425 D-Link DIR-X3260 SetSysEmailSettings AccountName Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.0 -2024-05-03
CVE-2023-44423 D-Link DIR-X3260 SetTriggerPPPoEValidate Password Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.0 -2024-05-03
CVE-2023-44424 D-Link DIR-X3260 SetSysEmailSettings EmailTo Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.0 -2024-05-03
CVE-2023-44422 D-Link DIR-X3260 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability — DIR-X3260 8.0 -2024-05-03

Vulnerabilities classified as CWE-78 (OS命令中使用的特殊元素转义处理不恰当(OS命令注入)) represent 2678 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.