Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Lpar2rrd
(Xorux)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-08-18 | CVE-2020-24032 | tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone. | Lpar2rrd, Stor2rrd | 9.8 | ||
2021-11-08 | CVE-2021-42370 | A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.) | Lpar2rrd, Stor2rrd | 7.5 | ||
2021-11-08 | CVE-2021-42371 | lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30. | Lpar2rrd, Stor2rrd | 9.8 | ||
2021-11-08 | CVE-2021-42372 | A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service. | Lpar2rrd, Stor2rrd | 8.8 | ||
2020-01-10 | CVE-2014-4982 | LPAR2RRD = 4.53 and = 3.5 has arbitrary command injection on the application server. | Lpar2rrd | 9.8 | ||
2020-02-17 | CVE-2014-4981 | LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters. | Lpar2rrd | N/A |