Filtered by vendor Xorux
Subscriptions
Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-54768 | 1 Xorux | 1 Lpar2rrd | 2025-07-30 | 5.3 Medium |
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information. | ||||
CVE-2025-54769 | 1 Xorux | 1 Lpar2rrd | 2025-07-29 | 8.8 High |
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. | ||||
CVE-2025-54767 | 1 Xorux | 1 Lpar2rrd | 2025-07-29 | 6.5 Medium |
An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user. | ||||
CVE-2025-54766 | 1 Xorux | 1 Xormon-ng | 2025-07-29 | 5.3 Medium |
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to export the appliance configuration, exposing sensitive information. | ||||
CVE-2025-54765 | 1 Xorux | 1 Xormon-ng | 2025-07-29 | 5.3 Medium |
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions. | ||||
CVE-2021-42372 | 1 Xorux | 2 Lpar2rrd, Stor2rrd | 2024-11-21 | 8.8 High |
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service. | ||||
CVE-2021-42371 | 1 Xorux | 2 Lpar2rrd, Stor2rrd | 2024-11-21 | 9.8 Critical |
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30. | ||||
CVE-2021-42370 | 1 Xorux | 2 Lpar2rrd, Stor2rrd | 2024-11-21 | 7.5 High |
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.) | ||||
CVE-2020-24032 | 1 Xorux | 2 Lpar2rrd, Stor2rrd | 2024-11-21 | 9.8 Critical |
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone. | ||||
CVE-2014-4982 | 1 Xorux | 1 Lpar2rrd | 2024-11-21 | 9.8 Critical |
LPAR2RRD ≤ 4.53 and ≤ 3.5 has arbitrary command injection on the application server. | ||||
CVE-2014-4981 | 1 Xorux | 1 Lpar2rrd | 2024-11-21 | 9.8 Critical |
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters. |
Page 1 of 1.