![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-41571
https://notcve.org/view.php?id=CVE-2022-41571
27 Sep 2022 — An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur. Se ha detectado un problema en EyesOfNetwork (EON) versiones hasta 5.3.11. Puede producirse una inclusión de archivos Locales • https://github.com/EyesOfNetworkCommunity/eonweb/issues/120 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-41570
https://notcve.org/view.php?id=CVE-2022-41570
27 Sep 2022 — An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Unauthenticated SQL injection can occur. Se ha detectado un problema en EyesOfNetwork (EON) versiones hasta 5.3.11. Puede producirse una inyección SQL no Autenticada • https://github.com/EyesOfNetworkCommunity/eonweb/issues/120 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-40643
https://notcve.org/view.php?id=CVE-2021-40643
30 Jun 2022 — EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application in the "cacti" configuration page (by default/usr/sbin/sendmail) it is possible to execute any command, which will be executed when we make a test of the configuration ("send test mail"). EyesOfNetwork versiones anteriores a 07-07-2021, presenta una vulnerabilidad de Ejecución de Código Remota en la página de configuración de las opciones de correo. ... • https://eyesofnetwork.com •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-24612
https://notcve.org/view.php?id=CVE-2022-24612
25 Feb 2022 — An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS. Un usuario autenticado puede subir un archivo XML que contenga una vulnerabilidad de tipo XSS por medio del módulo ITSM de EyesOfNetwork 5.3.11,resultando en un ataque de tipo XSS almacenado. • https://github.com/EyesOfNetworkCommunity/eonweb/issues/114 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-33525
https://notcve.org/view.php?id=CVE-2021-33525
24 May 2021 — EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. EyesOfNetwork eonweb versiones hasta 5.3-11, permite una ejecución de comandos remota (por usuarios autenticados) por medio de metacaracteres shell en el parámetro nagios_path hacia el archivo lilac/export.php, como es demostrado por %26%26+curl para insertar una s... • https://github.com/ArianeBlow/LilacPathVUln/blob/main/eon-pwn.sh • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-27513
https://notcve.org/view.php?id=CVE-2021-27513
21 Feb 2021 — The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside." El módulo admin_ITSM en EyesOfNetwork versión 5.3-10, permite a usuarios autenticados remoto cargar archivos .xml.php arbitrarios porque es basado en "le filtre userside" • https://github.com/ArianeBlow/CVE-2021-27513 • CWE-434: Unrestricted Upload of File with Dangerous Type •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-27514
https://notcve.org/view.php?id=CVE-2021-27514
21 Feb 2021 — EyesOfNetwork 5.3-10 uses an integer of between 8 and 10 digits for the session ID, which might be leveraged for brute-force authentication bypass (such as in CVE-2021-27513 exploitation). EyesOfNetwork versión 5.3-10, usa un número entero de entre 8 y 10 dígitos para el ID de sesión, que podría ser aprovechado para omitir una autenticación de fuerza bruta (como en la explotación del CVE-2021-27513) • https://github.com/ArianeBlow/CVE-2021-27513-CVE-2021-27514 • CWE-307: Improper Restriction of Excessive Authentication Attempts •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27887
https://notcve.org/view.php?id=CVE-2020-27887
29 Oct 2020 — An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php. Se detectó un problema en EyesOfNetwork versiones 5.3 hasta 5.3-8. Un usuario web autenticado con suficientes privilegios podría abusar del módulo AutoDiscovery para ejecutar comandos arbitrarios de Sistema Operativo por medio del parámetro nmap_binary en el archivo lil... • http://download.eyesofnetwork.com/EyesOfNetwork-5.3-x86_64-bin.iso • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-27886
https://notcve.org/view.php?id=CVE-2020-27886
29 Oct 2020 — An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php). Se detectó un problema en EyesOfNetwork eonweb versiones 5.3-7 hasta 5.3-8. La interfaz web eonweb es propensa a una inyección SQL, permitiendo a un atacante no autenticado explotar la función username_available del archivo includes/func... • http://download.eyesofnetwork.com/EyesOfNetwork-5.3-x86_64-bin.iso • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-24390
https://notcve.org/view.php?id=CVE-2020-24390
27 Aug 2020 — eonweb in EyesOfNetwork before 5.3-7 does not properly escape the username on the /module/admin_logs page, which might allow pre-authentication stored XSS during login/logout logs recording. eonweb en EyesOfNetwork versiones anteriores a 5.3-7, no escapa apropiadamente el nombre de usuario en la página /module/admin_logs, lo que podría permitir una autenticación previa de tipo XSS almacenado durante la grabación de registros de inicio y cierre de sesión • https://github.com/EyesOfNetworkCommunity/eonweb/commit/c416b52d3b500d96ab40875f95b7c7939628854b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •