Filtered by vendor Nagios
Subscriptions
Total
176 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-9165 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 9.8 Critical |
SQL injection vulnerability in Nagios XI before 5.5.11 allows attackers to execute arbitrary SQL commands via the API when using fusekeys and malicious user id. | ||||
CVE-2019-9164 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
Command injection in Nagios XI before 5.5.11 allows an authenticated users to execute arbitrary remote commands via a new autodiscovery job. | ||||
CVE-2019-3698 | 3 Nagios, Opensuse, Suse | 4 Nagios, Backports Sle, Leap and 1 more | 2024-11-21 | 5.7 Medium |
UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions. | ||||
CVE-2019-20197 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account. | ||||
CVE-2019-20139 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 5.4 Medium |
In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user. | ||||
CVE-2019-15949 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root. | ||||
CVE-2019-15898 | 1 Nagios | 1 Log Server | 2024-11-21 | N/A |
Nagios Log Server before 2.0.8 allows Reflected XSS via the username on the Login page. | ||||
CVE-2019-12279 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck | ||||
CVE-2018-8736 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root. | ||||
CVE-2018-8735 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Remote command execution (RCE) vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary commands on the target system, aka OS command injection. | ||||
CVE-2018-8734 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
SQL injection vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary SQL commands via the selInfoKey1 parameter. | ||||
CVE-2018-8733 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an unauthenticated attacker to make configuration changes and leverage an authenticated SQL injection vulnerability. | ||||
CVE-2018-20172 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
An issue was discovered in Nagios XI before 5.5.8. The rss_url parameter of rss_dashlet/magpierss/scripts/magpie_slashbox.php is not filtered, resulting in an XSS vulnerability. | ||||
CVE-2018-20171 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
An issue was discovered in Nagios XI before 5.5.8. The url parameter of rss_dashlet/magpierss/scripts/magpie_simple.php is not filtered, resulting in an XSS vulnerability. | ||||
CVE-2018-18245 | 2 Debian, Nagios | 2 Debian Linux, Nagios Core | 2024-11-21 | N/A |
Nagios Core 4.4.2 has XSS via the alert summary reports of plugin results, as demonstrated by a SCRIPT element delivered by a modified check_load plugin to NRPE. | ||||
CVE-2018-17148 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
An Insufficient Access Control vulnerability (leading to credential disclosure) in coreconfigsnapshot.php (aka configuration snapshot page) in Nagios XI before 5.5.4 allows remote attackers to gain access to configuration files containing confidential credentials. | ||||
CVE-2018-17147 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Nagios XI before 5.5.4 has XSS in the auto login admin management page. | ||||
CVE-2018-17146 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
A cross-site scripting vulnerability exists in Nagios XI before 5.5.4 via the 'name' parameter within the Account Information page. Exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code within the auto login admin management page. | ||||
CVE-2018-15714 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Nagios XI 5.5.6 allows reflected cross site scripting from remote unauthenticated attackers via the oname and oname2 parameters. | ||||
CVE-2018-15713 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Nagios XI 5.5.6 allows persistent cross site scripting from remote authenticated attackers via the stored email address in admin/users.php. |