[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-5965":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-21T11:17:02.443Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":55,"kevs":66,"epss":9,"epss_history":67,"metrics":68,"affected":80},"CVE-2026-5965","NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],[],[],[],[],[],[],"2026-04-21T03:32:55.138Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":47},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[56,62],{"url":57,"sources":58,"tags":60},"https://www.twcert.org.tw/tw/cp-132-10856-4979f-1.html",[53,59],"nvd",[61],"Third Party Advisory",{"url":63,"sources":64,"tags":65},"https://www.twcert.org.tw/en/cp-139-10857-c46f7-2.html",[53,59],[61],[],[],[69,76],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":70,"cvss_v4_0":73},{"baseScore":51,"baseSeverity":71,"vectorString":54,"impactScore":51,"exploitabilityScore":72},"CRITICAL",10,{"baseScore":74,"baseSeverity":71,"vectorString":75,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":59,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":77,"cvss_v4_0":78},{"baseScore":51,"baseSeverity":71,"vectorString":54,"impactScore":51,"exploitabilityScore":72},{"baseScore":74,"baseSeverity":71,"vectorString":79,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[81],{"ecosystem":9,"name":82,"vendor":83,"product":84,"cpe_part":85,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":86},"NewSoftOA","newsoft","newsoftoa","a",[87],{"version":88,"is_range":89,"range_type":53,"version_start":9,"version_start_type":9,"version_end":90,"version_end_type":91,"fixed_in":9},"\u003C 10.1.8.3",true,"10.1.8.3","excluding"]