Количество 3
Количество 3
CVE-2021-33525
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
GHSA-r7vx-27c9-pg66
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
BDU:2021-02941
Уязвимость параметра nagios_path (lilac/export.php) программного средства мониторинга систем и сетей EyesOfNetwork (EON), позволяющая нарушителю выполнить произвольные команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-33525 EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. | CVSS3: 8.8 | 8% Низкий | больше 4 лет назад | |
GHSA-r7vx-27c9-pg66 EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. | 8% Низкий | больше 3 лет назад | ||
BDU:2021-02941 Уязвимость параметра nagios_path (lilac/export.php) программного средства мониторинга систем и сетей EyesOfNetwork (EON), позволяющая нарушителю выполнить произвольные команды | CVSS3: 8.8 | 8% Низкий | больше 4 лет назад |
Уязвимостей на страницу