CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
81.5%
Directory traversal vulnerability in the trend-data daemon (xymond_rrd) in Xymon 4.x before 4.3.12 allows remote attackers to delete arbitrary files via a … (dot dot) in the host name in a “drophost” command.
Vendor | Product | Version | CPE |
---|---|---|---|
xymon | xymon | * | cpe:2.3:a:xymon:xymon:*:*:*:*:*:*:*:* |
xymon | xymon | 4.0 | cpe:2.3:a:xymon:xymon:4.0:*:*:*:*:*:*:* |
xymon | xymon | 4.0.1 | cpe:2.3:a:xymon:xymon:4.0.1:*:*:*:*:*:*:* |
xymon | xymon | 4.0.2 | cpe:2.3:a:xymon:xymon:4.0.2:*:*:*:*:*:*:* |
xymon | xymon | 4.0.3 | cpe:2.3:a:xymon:xymon:4.0.3:*:*:*:*:*:*:* |
xymon | xymon | 4.0.4 | cpe:2.3:a:xymon:xymon:4.0.4:*:*:*:*:*:*:* |
xymon | xymon | 4.1.0 | cpe:2.3:a:xymon:xymon:4.1.0:*:*:*:*:*:*:* |
xymon | xymon | 4.1.1 | cpe:2.3:a:xymon:xymon:4.1.1:*:*:*:*:*:*:* |
xymon | xymon | 4.1.2 | cpe:2.3:a:xymon:xymon:4.1.2:*:*:*:*:*:*:* |
xymon | xymon | 4.2.0 | cpe:2.3:a:xymon:xymon:4.2.0:*:*:*:*:*:*:* |