Vulnerabilities > Opsview > Opsview > 5.1.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-09-05 | CVE-2018-16148 | Cross-site Scripting vulnerability in Opsview The diagnosticsb2ksy parameter of the /rest endpoint in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to Cross-Site Scripting. | 4.3 |
2018-09-05 | CVE-2018-16147 | Cross-site Scripting vulnerability in Opsview The data parameter of the /settings/api/router endpoint in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to Cross-Site Scripting. | 4.3 |
2018-09-05 | CVE-2018-16145 | Incorrect Permission Assignment for Critical Resource vulnerability in Opsview The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance. | 9.3 |
2018-09-05 | CVE-2018-16144 | OS Command Injection vulnerability in Opsview The test connection functionality in the NetAudit section of Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to command injection due to improper sanitization of the rancid_password parameter. | 10.0 |
2017-05-03 | CVE-2016-10368 | Open Redirect vulnerability in Opsview Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the /login URI. | 5.8 |
2017-05-03 | CVE-2016-10367 | Path Traversal vulnerability in Opsview In Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch), an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request utilizing a simple URL encoding bypass, %252f instead of /. | 5.0 |