Vulnerabilities (CVE)

Filtered by vendor Opmantek Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-8813 4 Cacti, Fedoraproject, Opensuse and 1 more 5 Cacti, Fedora, Suse Linux Enterprise Server and 2 more 2022-05-24 9.3 HIGH 8.8 HIGH
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-12078 1 Opmantek 1 Open-audit 2021-07-21 9.0 HIGH 8.8 HIGH
An issue was discovered in Open-AudIT 3.3.1. There is shell metacharacter injection via attributes to an open-audit/configuration/ URI. An attacker can exploit this by adding an excluded IP address to the global discovery settings (internally called exclude_ip). This exclude_ip value is passed to the exec function in the discoveries_helper.php file (inside the all_ip_list function) without being filtered, which means that the attacker can provide a payload instead of a valid IP address.
CVE-2020-11943 1 Opmantek 1 Open-audit 2020-05-05 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Open-AudIT 3.2.2. There is Arbitrary file upload.
CVE-2020-11941 1 Opmantek 1 Open-audit 2020-05-05 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Open-AudIT 3.2.2. There is OS Command injection in Discovery.
CVE-2019-16293 1 Opmantek 1 Open-audit 2019-09-13 6.5 MEDIUM 8.8 HIGH
The Create Discoveries feature of Open-AudIT before 3.2.0 allows an authenticated attacker to execute arbitrary OS commands via a crafted value for a URL field.
CVE-2016-6534 1 Opmantek 1 Network Management Information System 2017-04-14 6.0 MEDIUM 7.5 HIGH
Opmantek NMIS before 4.3.7c has command injection via man, finger, ping, trace, and nslookup in the tools.pl CGI script. Versions before 8.5.12G might be affected in non-default configurations.