Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-97vg-j9rv-47hw

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

EPSS

Процентиль: 70%
0.00707
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

redhat
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

nvd
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

debian
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor befo ...

EPSS

Процентиль: 70%
0.00707
Низкий