Vulnerabilities > Opsview > Opsview > 5.1.0

DATE CVE VULNERABILITY TITLE RISK
2018-09-05 CVE-2018-16148 Cross-site Scripting vulnerability in Opsview
The diagnosticsb2ksy parameter of the /rest endpoint in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to Cross-Site Scripting.
network
opsview CWE-79
4.3
2018-09-05 CVE-2018-16147 Cross-site Scripting vulnerability in Opsview
The data parameter of the /settings/api/router endpoint in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to Cross-Site Scripting.
network
opsview CWE-79
4.3
2018-09-05 CVE-2018-16145 Incorrect Permission Assignment for Critical Resource vulnerability in Opsview
The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
network
opsview CWE-732
critical
9.3
2018-09-05 CVE-2018-16144 OS Command Injection vulnerability in Opsview
The test connection functionality in the NetAudit section of Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 is vulnerable to command injection due to improper sanitization of the rancid_password parameter.
network
low complexity
opsview CWE-78
critical
10.0
2017-05-03 CVE-2016-10368 Open Redirect vulnerability in Opsview
Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the /login URI.
network
opsview CWE-601
5.8
2017-05-03 CVE-2016-10367 Path Traversal vulnerability in Opsview
In Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch), an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request utilizing a simple URL encoding bypass, %252f instead of /.
network
low complexity
opsview CWE-22
5.0