Lucene search

K
ArticaPandora Fms2.1.1

6 matches found

CVE
CVE
added 2010/12/02 5:15 p.m.54 views

CVE-2010-4279

The default configuration of Pandora FMS 3.1 and earlier specifies an empty string for the loginhash_pwd field, which allows remote attackers to bypass authentication by sending a request to index.php with "admin" in the loginhash_user parameter, in conjunction with the md5 hash of "admin" in the l...

10CVSS6.8AI score0.86292EPSS
CVE
CVE
added 2010/12/02 5:15 p.m.53 views

CVE-2010-4282

Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify,...

7.5CVSS7.3AI score0.03744EPSS
CVE
CVE
added 2010/12/02 5:13 p.m.49 views

CVE-2010-4278

operation/agentes/networkmap.php in Pandora FMS before 3.1.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the layout parameter in an operation/agentes/networkmap action to index.php.

9CVSS7.3AI score0.09983EPSS
CVE
CVE
added 2010/12/02 5:15 p.m.49 views

CVE-2010-4283

PHP remote file inclusion vulnerability in extras/pandora_diag.php in Pandora FMS before 3.1.1 allows remote attackers to execute arbitrary PHP code via a URL in the argv[1] parameter.

7.5CVSS7.5AI score0.05799EPSS
CVE
CVE
added 2010/12/02 5:15 p.m.47 views

CVE-2010-4281

Incomplete blacklist vulnerability in the safe_url_extraclean function in ajax.php in Pandora FMS before 3.1.1 allows remote attackers to execute arbitrary PHP code by using a page parameter containing a UNC share pathname, which bypasses the check for the : (colon) character.

7.5CVSS7.6AI score0.07165EPSS
CVE
CVE
added 2010/12/02 5:15 p.m.40 views

CVE-2010-4280

Multiple SQL injection vulnerabilities in Pandora FMS before 3.1.1 allow remote authenticated users to execute arbitrary SQL commands via (1) the id_group parameter in an operation/agentes/ver_agente action to ajax.php or (2) the group_id parameter in an operation/agentes/estado_agente action to in...

7.5CVSS8.1AI score0.07431EPSS