An issue in OpenTSDB 2.3.0 allows command execution via /q URL parameters
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Remote Code Execution (RCE) | 2 Jul 201803:43 | – | veracode |
![]() | CVE-2018-12972 | 29 Jun 201805:29 | – | osv |
![]() | GHSA-CX2V-JRJC-G54W OpenTSDB vulnerable to OS Command Injection | 13 May 202201:49 | – | osv |
![]() | Input validation | 29 Jun 201805:29 | – | prion |
![]() | CVE-2018-12972 | 29 Jun 201805:00 | – | cvelist |
![]() | CVE-2018-12972 | 29 Jun 201805:29 | – | nvd |
![]() | OpenTSDB vulnerable to OS Command Injection | 13 May 202201:49 | – | github |
Source | Link |
---|---|
github | www.github.com/OpenTSDB/opentsdb/issues/1239 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo