Vulnerabilities > Mutiny
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-08-28 | CVE-2018-15529 | OS Command Injection vulnerability in Mutiny 5.01.00/5.01.10/5.01.11 A command injection vulnerability in maintenance.cgi in Mutiny "Monitoring Appliance" before 6.1.0-5263 allows authenticated users, with access to the admin interface, to inject arbitrary commands within the filename of a system upgrade upload. | 6.5 |
2013-06-01 | CVE-2013-0136 | Path Traversal vulnerability in Mutiny Mutiny, Mutiny Appliance and Mutiny Virtual Appliance Multiple directory traversal vulnerabilities in the EditDocument servlet in the Frontend in Mutiny before 5.0-1.11 allow remote authenticated users to upload and execute arbitrary programs, read arbitrary files, or cause a denial of service (file deletion or renaming) via (1) the uploadPath parameter in an UPLOAD operation; the paths[] parameter in a (2) DELETE, (3) CUT, or (4) COPY operation; or the newPath parameter in a (5) CUT or (6) COPY operation. | 8.5 |
2012-10-22 | CVE-2012-3001 | OS Command Injection vulnerability in Mutiny Standard Mutiny Standard before 4.5-1.12 allows remote attackers to execute arbitrary commands via the network-interface menu, related to a "command injection vulnerability." Per: http://www.kb.cert.org/vuls/id/841851 "Impact An authenticated attacker can run arbitrary commands on the appliance." Per: http://www.mutiny.com/products.php "Mutiny is a virtual appliance that uses industry standard SNMP to gather information from IT Infrastructure, process and display the results in a multi-user web front-end that allows administrators and managers alike to quickly asses the health of their estate." | 8.5 |