1185 vulnerabilities classified as CWE-77 (在命令中使用的特殊元素转义处理不恰当(命令注入)). AI Chinese analysis included.
CWE-77 represents a critical input validation weakness where software constructs commands using untrusted data without properly sanitizing special characters. Attackers typically exploit this by injecting malicious payloads, such as semicolons or pipe operators, into user-supplied fields to alter the intended command structure. This allows them to execute arbitrary system commands, potentially leading to full system compromise, data exfiltration, or denial of service. To prevent such vulnerabilities, developers must strictly validate and sanitize all external inputs, ensuring that only expected data formats are processed. Utilizing parameterized APIs or safe command execution libraries instead of direct string concatenation significantly reduces risk. Additionally, implementing the principle of least privilege for application processes limits the potential impact of successful injection attempts, thereby enhancing overall system security against command injection attacks.
prompt = "Explain the difference between {} and {}".format(arg1, arg2) result = invokeChatbot(prompt) resultHTML = encodeForHTML(result) print resultHTMLExplain the difference between CWE-77 and CWE-78my $arg = GetArgument("filename"); do_listing($arg); sub do_listing { my($fname) = @_; if (! validate_name($fname)) { print "Error: name is not well-formed!\n"; return; } # build command my $cmd = "/bin/ls -l $fname"; system($cmd); } sub validate_name { my($name) = @_; if ($name =~ /^[\w\-]+$/) { return(1); } else { return(0); } }if ($name =~ /^\w[\w\-]+$/) ...| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-36642 | trampgeek jobe LanguageTask.php run_in_sandbox command injection — jobe | 5.5 | Medium | 2023-01-06 |
| CVE-2021-4304 | eprintsug ulcc-core toolbox command injection — ulcc-core | 6.3 | Medium | 2023-01-05 |
| CVE-2022-39081 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39082 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39083 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39084 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39085 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39086 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39087 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2022-39088 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 6.7 | - | 2023-01-04 |
| CVE-2017-20156 | Exciting Printer Argument prepare_page.rb command injection — Printer | 5.5 | Medium | 2022-12-31 |
| CVE-2021-32692 | Activity Watch vulnerable to command execution on macOS via printAppTitle.scpt — Activity Watch | 9.6 | Critical | 2022-12-23 |
| CVE-2022-46421 | Apache Airflow Hive Provider: Hive Provider RCE vulnerability with hive_cli_params — Apache Airflow Hive Provider | 9.8 | - | 2022-12-20 |
| CVE-2022-45796 | SHARP Multifunction Printer - Command Injection — SHARP multifunction printers | 9.1 | Critical | 2022-12-16 |
| CVE-2022-4364 | Teledyne FLIR AX8 Web Service palette.php command injection — AX8 | 7.3 | High | 2022-12-08 |
| CVE-2022-41800 | Appliance mode iControl REST vulnerability — BIG-IP | 8.7 | High | 2022-12-07 |
| CVE-2022-3086 | Cradlepoint IBR600 Command Injection — IBR600 | 7.1 | High | 2022-11-29 |
| CVE-2022-45462 | Apache DolphinScheduler prior to 2.0.5 have command execution vulnerability — Apache DolphinScheduler | 9.8 | - | 2022-11-23 |
| CVE-2022-40746 | IBM i 代码问题漏洞 — i | 7.2 | High | 2022-11-21 |
| CVE-2022-40752 | IBM InfoSphere DataStage Flow Designer 命令注入漏洞 — InfoSphere DataStage | 9.8 | Critical | 2022-11-16 |
| CVE-2022-20926 | Cisco Firepower Management Center 操作系统命令注入漏洞 — Cisco Firepower Management Center | 6.3 | Medium | 2022-11-10 |
| CVE-2022-20925 | Cisco Firepower Management Center 操作系统命令注入漏洞 — Cisco Firepower Management Center | 6.3 | Medium | 2022-11-10 |
| CVE-2022-20934 | Cisco Firepower Threat Defense和Cisco FXOS Software 操作系统操作系统命令注入漏洞 — Cisco Firepower Threat Defense Software | 6.0 | Medium | 2022-11-10 |
| CVE-2022-32765 | Robustel R1510 操作系统操作系统命令注入漏洞 — R1510 | 9.8 | - | 2022-10-25 |
| CVE-2022-41617 | BIG-IP Advanced WAF and ASM iControl REST vulnerability CVE-2022-41617 — BIG-IP Advanced WAF & ASM | 7.2 | High | 2022-10-19 |
| CVE-2022-34432 | Dell Hybrid Client 安全漏洞 — Dell Hybrid Client (DHC) | 7.3 | High | 2022-10-11 |
| CVE-2022-20851 | Cisco IOS XE Software Web UI Command Injection Vulnerability — Cisco IOS XE Software | 5.5 | Medium | 2022-09-30 |
| CVE-2022-39243 | NuProcess vulnerable to command-line injection through insertion of NUL character(s) — NuProcess | 8.4 | High | 2022-09-26 |
| CVE-2022-28220 | STARTTLS command injection in Apache JAMES — Apache James | 7.5 | - | 2022-09-08 |
| CVE-2022-34383 | Dell Edge Gateway 操作系统命令注入漏洞 — Edge Gateway 5200 | 8.1 | High | 2022-08-31 |
Vulnerabilities classified as CWE-77 (在命令中使用的特殊元素转义处理不恰当(命令注入)) represent 1185 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.