Filtered by vendor Nagios
Subscriptions
Filtered by product Nagios Xi
Subscriptions
Total
98 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-22427 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 7.2 High |
NagiosXI 5.6.11 is affected by a remote code execution (RCE) vulnerability. An authenticated nagiosadmin user can inject additional commands into a request. NOTE: the vendor disputes whether the CVE and its references are actionable because all technical details are omitted, and the only option is to pay for a subscription service where technical details may be disclosed at an unspecified later time | ||||
CVE-2020-15903 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 9.8 Critical |
An issue was found in Nagios XI before 5.7.3. There is a privilege escalation vulnerability in backend scripts that ran as root where some included files were editable by nagios user. This issue was fixed in version 5.7.3. | ||||
CVE-2020-15902 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 6.1 Medium |
Graph Explorer in Nagios XI before 5.7.2 allows XSS via the link url option. | ||||
CVE-2020-15901 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
In Nagios XI before 5.7.3, ajaxhelper.php allows remote authenticated attackers to execute arbitrary commands via cmdsubsys. | ||||
CVE-2020-10821 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 4.8 Medium |
Nagios XI 5.6.11 allows XSS via the account/main.php theme parameter. | ||||
CVE-2020-10820 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 4.8 Medium |
Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ password parameter. | ||||
CVE-2020-10819 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 4.8 Medium |
Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ username parameter. | ||||
CVE-2019-9167 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 6.1 Medium |
Cross-site scripting (XSS) vulnerability in Nagios XI before 5.5.11 allows attackers to inject arbitrary web script or HTML via the xiwindow parameter. | ||||
CVE-2019-9166 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 7.8 High |
Privilege escalation in Nagios XI before 5.5.11 allows local attackers to elevate privileges to root via write access to config.inc.php and import_xiconfig.php. | ||||
CVE-2019-9165 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 9.8 Critical |
SQL injection vulnerability in Nagios XI before 5.5.11 allows attackers to execute arbitrary SQL commands via the API when using fusekeys and malicious user id. | ||||
CVE-2019-9164 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
Command injection in Nagios XI before 5.5.11 allows an authenticated users to execute arbitrary remote commands via a new autodiscovery job. | ||||
CVE-2019-20197 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account. | ||||
CVE-2019-20139 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 5.4 Medium |
In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user. | ||||
CVE-2019-15949 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | 8.8 High |
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root. | ||||
CVE-2019-12279 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck | ||||
CVE-2018-8736 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
A privilege escalation vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to leverage an RCE vulnerability escalating to root. | ||||
CVE-2018-8735 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Remote command execution (RCE) vulnerability in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary commands on the target system, aka OS command injection. | ||||
CVE-2018-8734 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
SQL injection vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an attacker to execute arbitrary SQL commands via the selInfoKey1 parameter. | ||||
CVE-2018-8733 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.x through 5.4.x before 5.4.13 allows an unauthenticated attacker to make configuration changes and leverage an authenticated SQL injection vulnerability. | ||||
CVE-2018-20172 | 1 Nagios | 1 Nagios Xi | 2024-11-21 | N/A |
An issue was discovered in Nagios XI before 5.5.8. The rss_url parameter of rss_dashlet/magpierss/scripts/magpie_slashbox.php is not filtered, resulting in an XSS vulnerability. |