Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Pnp4nagios
(Pnp4nagios)Repositories | https://github.com/lingej/pnp4nagios |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-07-15 | CVE-2023-38349 | PNP4Nagios through 81ebfc5 lacks CSRF protection in the AJAX controller. This affects 0.6.26. | Pnp4nagios | 8.8 | ||
2023-07-15 | CVE-2023-38350 | PNP4Nagios through 81ebfc5 has stored XSS in the AJAX controller via the basket API and filters. This affects 0.6.26. | Pnp4nagios | 5.4 | ||
2017-11-16 | CVE-2017-16834 | PNP4Nagios through 0.6.26 has /usr/bin/npcd and npcd.cfg owned by an unprivileged account but root code execution depends on these files, which allows local users to gain privileges by leveraging access to this unprivileged account. | Pnp4nagios | 7.8 | ||
2014-07-11 | CVE-2014-4908 | Multiple cross-site scripting (XSS) vulnerabilities in PNP4Nagios through 0.6.22 allow remote attackers to inject arbitrary web script or HTML via the URI used for reaching (1) share/pnp/application/views/kohana_error_page.php or (2) share/pnp/application/views/template.php, leading to improper handling within an http-equiv="refresh" META element. | Pnp4nagios | N/A | ||
2014-07-11 | CVE-2014-4907 | Cross-site scripting (XSS) vulnerability in share/pnp/application/views/kohana_error_page.php in PNP4Nagios before 0.6.22 allows remote attackers to inject arbitrary web script or HTML via a parameter that is not properly handled in an error message. | Monitor, Pnp4nagios | N/A | ||
2012-08-11 | CVE-2012-3457 | PNP4Nagios 0.6 through 0.6.16 uses world-readable permissions for process_perfdata.cfg, which allows local users to obtain the Gearman shared secret by reading the file. | Pnp4nagios | N/A |