CVE-2022-41572
- EPSS 0.24%
- Veröffentlicht 07.01.2025 20:15:27
- Zuletzt bearbeitet 13.06.2025 15:10:08
An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Privilege escalation can be accomplished on the server because nmap can be run as root. The attacker achieves total control over the server.
CVE-2022-41571
- EPSS 0.6%
- Veröffentlicht 27.09.2022 23:15:16
- Zuletzt bearbeitet 21.05.2025 19:16:05
An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Local file inclusion can occur.
CVE-2022-41570
- EPSS 0.32%
- Veröffentlicht 27.09.2022 23:15:16
- Zuletzt bearbeitet 21.05.2025 16:15:29
An issue was discovered in EyesOfNetwork (EON) through 5.3.11. Unauthenticated SQL injection can occur.
- EPSS 3.22%
- Veröffentlicht 30.06.2022 11:15:07
- Zuletzt bearbeitet 21.11.2024 06:24:29
EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the "sendmail" application in the "cacti" configuration page (by default/usr/sbin/sendmail) it is possible to execute...
CVE-2022-24612
- EPSS 0.24%
- Veröffentlicht 25.02.2022 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:50:45
An authenticated user can upload an XML file containing an XSS via the ITSM module of EyesOfNetwork 5.3.11, resulting in a stored XSS.
- EPSS 7.71%
- Veröffentlicht 24.05.2021 20:15:07
- Zuletzt bearbeitet 21.11.2024 06:09:00
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
CVE-2021-27514
- EPSS 13.67%
- Veröffentlicht 22.02.2021 00:15:12
- Zuletzt bearbeitet 21.11.2024 05:58:08
EyesOfNetwork 5.3-10 uses an integer of between 8 and 10 digits for the session ID, which might be leveraged for brute-force authentication bypass (such as in CVE-2021-27513 exploitation).
CVE-2021-27513
- EPSS 44.41%
- Veröffentlicht 22.02.2021 00:15:12
- Zuletzt bearbeitet 21.11.2024 05:58:08
The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside."
- EPSS 0.96%
- Veröffentlicht 29.10.2020 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:21:59
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
CVE-2020-27886
- EPSS 2.09%
- Veröffentlicht 29.10.2020 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:21:59
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is ca...