Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3j95-hrrj-gfw8

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

EPSS

Процентиль: 100%
0.933
Критический

Дефекты

CWE-78

Связанные уязвимости

ubuntu
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

redhat
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

nvd
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

debian
больше 16 лет назад

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execut ...

EPSS

Процентиль: 100%
0.933
Критический

Дефекты

CWE-78