Vulnerabilities > Eyesofnetwork > Eyesofnetwork > 5.3.10
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-09-27 | CVE-2022-41570 | SQL Injection vulnerability in Eyesofnetwork An issue was discovered in EyesOfNetwork (EON) through 5.3.11. | 9.8 |
2022-09-27 | CVE-2022-41571 | Unspecified vulnerability in Eyesofnetwork An issue was discovered in EyesOfNetwork (EON) through 5.3.11. | 9.8 |
2021-05-24 | CVE-2021-33525 | OS Command Injection vulnerability in Eyesofnetwork EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. | 9.0 |
2021-02-22 | CVE-2021-27514 | Improper Restriction of Excessive Authentication Attempts vulnerability in Eyesofnetwork 5.310 EyesOfNetwork 5.3-10 uses an integer of between 8 and 10 digits for the session ID, which might be leveraged for brute-force authentication bypass (such as in CVE-2021-27513 exploitation). | 7.5 |
2021-02-22 | CVE-2021-27513 | Unrestricted Upload of File with Dangerous Type vulnerability in Eyesofnetwork 5.310 The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside." | 6.5 |