Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-5027

Опубликовано: 06 нояб. 2008
Источник: redhat
EPSS Низкий

Описание

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat HPC SolutionnagiosWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=470840nagios: authorization bypass via custom form or browser addon

EPSS

Процентиль: 70%
0.00707
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

nvd
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

debian
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor befo ...

github
больше 3 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

EPSS

Процентиль: 70%
0.00707
Низкий