Fogproject

Fogproject

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 27.03.2026 19:45:12
  • Zuletzt bearbeitet 08.04.2026 15:08:44

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.1812, the listing tables on multiple management pages (Host, Storage, Group, Image, Printer, Snapin) are vulnerable to Stored Cross-Site Scripting (XS...

  • EPSS 0.02%
  • Veröffentlicht 23.01.2026 00:19:33
  • Zuletzt bearbeitet 15.04.2026 00:35:42

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1754 and below contain an unauthenticated SSRF vulnerability in getversion.php which can be triggered by providing a user-controlled url parameter. It...

Exploit
  • EPSS 11.68%
  • Veröffentlicht 06.09.2025 20:04:25
  • Zuletzt bearbeitet 29.09.2025 13:49:57

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could p...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 02.08.2024 20:17:03
  • Zuletzt bearbeitet 10.09.2024 16:44:12

FOG is a cloning/imaging/rescue suite/inventory management system. FOG Server 1.5.10.41.4 and earlier can leak authorized and rejected logins via logs stored directly on the root of the web server. FOG Server creates 2 logs on the root of the web ser...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 02.08.2024 20:17:02
  • Zuletzt bearbeitet 10.09.2024 16:49:09

FOG is a cloning/imaging/rescue suite/inventory management system. FOG Server 1.5.10.41.2 can leak AD username and password when registering a computer. This vulnerability is fixed in 1.5.10.41.3 and 1.6.0-beta.1395.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 31.07.2024 20:15:06
  • Zuletzt bearbeitet 05.09.2024 16:18:09

FOG is a cloning/imaging/rescue suite/inventory management system. The application stores plaintext service account credentials in the "/opt/fog/.fogsettings" file. This file is by default readable by all users on the host. By exploiting these creden...

Exploit
  • EPSS 0.41%
  • Veröffentlicht 31.07.2024 19:15:12
  • Zuletzt bearbeitet 05.09.2024 16:27:50

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. The hostinfo page has missing/improper access control since only the host's mac address is required to obtain the configuration information. This data can only be ret...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 31.07.2024 19:15:11
  • Zuletzt bearbeitet 05.09.2024 17:09:16

FOG is a cloning/imaging/rescue suite/inventory management system. An improperly restricted file upload feature allows authenticated users to execute arbitrary code on the fogproject server. The Rebranding feature has a check on the client banner ima...

Exploit
  • EPSS 93.56%
  • Veröffentlicht 12.07.2024 15:15:11
  • Zuletzt bearbeitet 29.09.2025 13:51:33

FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability ...

  • EPSS 0.34%
  • Veröffentlicht 12.07.2024 15:15:11
  • Zuletzt bearbeitet 21.11.2024 09:28:33

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. There is a security issue with the NFS configuration in /etc/exports generated by the installer that allows an attacker to modify files outside the export in the defa...