{"id":"CVE-2019-16293","details":"The Create Discoveries feature of Open-AudIT before 3.2.0 allows an authenticated attacker to execute arbitrary OS commands via a crafted value for a URL field.","modified":"2026-04-11T21:08:21.906566Z","published":"2019-09-13T17:15:12.053Z","references":[{"type":"EVIDENCE","url":"https://community.opmantek.com/display/OA/Errata+-+3.1.2+Security+issue%2C+September+2019"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opmantek/open-audit","events":[{"introduced":"0"},{"fixed":"7c83163325cd52a1e9b827727bed3a26ad9e8e55"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"3.2.0"}],"cpe":"cpe:2.3:a:opmantek:open-audit:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["Open-AudIT_1.12","Open-AudIT_1.12.2","Open-AudIT_1.12.2_1","Open-AudIT_1.12.4","Open-AudIT_1.12.8","Open-AudIT_1.12.8.1","Open-AudIT_1.12.8.2","Open-AudIT_1.8.2","Open-AudIT_2.0.1","Open-AudIT_2.0.1-1","Open-AudIT_2.0.1-2","Open-AudIT_2.0.10","Open-AudIT_2.0.11","Open-AudIT_2.0.2-1","Open-AudIT_2.0.6","Open-AudIT_2.0.6_beta","Open-AudIT_2.0.8","Open-AudIT_2.1","Open-AudIT_2.2.1","Open-AudIT_2.2.2","Open-AudIT_2.2.3","Open-AudIT_2.2.4","Open-AudIT_2.2.5","Open-AudIT_2.2.6","Open-AudIT_2.2.7","Open-AudIT_2.3.1","Open-AudIT_2.3.2","Open-AudIT_3.0.0","Open-AudIT_3.0.0_windows","Open-AudIT_3.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16293.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}