Page 17 of 85 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

The escape_command function in include/Administration/corePerformance/getStats.php in Centreon (formerly Merethis Centreon) 2.5.4 and earlier (fixed in Centreon 19.10.0) uses an incorrect regular expression, which allows remote authenticated users to execute arbitrary commands via shell metacharacters in the ns_id parameter. La función escape_command en el archivo include/Administration/corePerformance/getStats.php en Centreon (anteriormente Merethis Centreon) versión 2.5.4 y anteriores (corregido en Centreon versión 19.10.0), usa una expresión regular incorrecta, lo que permite a usuarios autenticados remotos ejecutar comandos arbitrarios por medio de metacaracteres de shell en el parámetro ns_id. Merethis Centreon versions 2.5.4 and below suffer from remote SQL injection and command execution vulnerabilities. • https://www.exploit-db.com/exploits/37528 http://packetstormsecurity.com/files/132607/Merethis-Centreon-2.5.4-SQL-Injection-Remote-Command-Execution.html http://www.securityfocus.com/archive/1/535961/100/0/threaded https://forge.centreon.com/projects/centreon/repository/revisions/387dffdd051dbc7a234e1138a9d06f3089bb55bb https://github.com/centreon/centreon/commit/a78c60aad6fd5af9b51a6d5de5d65560ea37a98a#diff-27550b563fa8d660b64bca871a219cb1 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 4.3EPSS: 1%CPEs: 6EXPL: 1

Directory traversal vulnerability in include/doc/index.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter, a different vector than CVE-2008-1119. Vulnerabilidad de salto de directorio de include/doc/index.php en Centreon 1.4.2.3 y anteriores, que permite a atacantes remotos leer archivos de su elección a través de la secuencia .. (punto punto) en la página. Vector diferente del CVE-2008-1119. • https://www.exploit-db.com/exploits/31318 http://secunia.com/advisories/29158 http://securityreason.com/securityalert/3715 http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html http://www.securityfocus.com/archive/1/488956/100/0/threaded http://www.securityfocus.com/bid/28052 https://exchange.xforce.ibmcloud.com/vulnerabilities/40950 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in include/common/javascript/color_picker.php in Centreon 1.4.2.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) title parameters. NOTE: some of these details are obtained from third party information. Múltiples Vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) de include/common/javascript/color_picker.php en Centreon 1.4.2.3, que permite a atacantes remotos inyectar secuencias de comandos web o html de su elección a través de los parámetros (1) name y (2) title. NOTA: Los detalles se han obtenido a través de información por parte de terceros. • http://secunia.com/advisories/29158 http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html http://www.securityfocus.com/bid/28043 https://exchange.xforce.ibmcloud.com/vulnerabilities/40924 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 1

Directory traversal vulnerability in include/doc/get_image.php in Centreon 1.4.2.3 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter. Una vulnerabilidad de salto de directorio en el archivo include/doc/get_image.php en Centreon versión 1.4.2.3 y anteriores, permite a atacantes remotos leer archivos arbitrarios por medio de un .. (punto punto) en el parámetro img. • https://www.exploit-db.com/exploits/5204 http://www.centreon.com/Product/Changelog-Centreon-1.4.x.html http://www.securityfocus.com/bid/28022 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 11%CPEs: 1EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in Centreon 1.4.1 (aka Oreon 1.4) allow remote attackers to execute arbitrary PHP code via a URL in the fileOreonConf parameter to (1) MakeXML.php or (2) MakeXML4statusCounter.php in include/monitoring/engine/. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en Centreon 1.4.1 (también conocido como Oreon 1.4) permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro fileOreonConf en (1) MakeXML.php o (2) MakeXML4statusCounter.php en include/monitoring/engine/. • https://www.exploit-db.com/exploits/4735 http://secunia.com/advisories/28112 http://securityreason.com/securityalert/3472 http://www.osvdb.org/39226 http://www.osvdb.org/39227 http://www.securityfocus.com/archive/1/485152/100/0/threaded http://www.securityfocus.com/bid/26883 https://exchange.xforce.ibmcloud.com/vulnerabilities/39065 • CWE-94: Improper Control of Generation of Code ('Code Injection') •