Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2288

Опубликовано: 01 июл. 2009
Источник: debian
EPSS Критический

Описание

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nagios3fixed3.0.6-5package
nagios2removedpackage

Примечания

  • http://secunia.com/advisories/35543

EPSS

Процентиль: 100%
0.933
Критический

Связанные уязвимости

ubuntu
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

redhat
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

nvd
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

github
почти 4 года назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

EPSS

Процентиль: 100%
0.933
Критический