![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.804247 |
Categoría: | Web application abuses |
Título: | Nagios status.cgi Information Disclosure Vulnerability |
Resumen: | Nagios is prone to an information disclosure vulnerability. |
Descripción: | Summary: Nagios is prone to an information disclosure vulnerability. Vulnerability Insight: The flaw exists in status.cgi which fails to restrict access to all service groups Vulnerability Impact: Successful exploitation will allow remote attackers to obtain sensitive information. Affected Software/OS: Nagios version 4.0 before 4.0 beta4 and 3.x before 3.5.1. Solution: Upgrade to version Nagios version 4.0 beta4, 3.5.1 or later. CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-2214 [oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view http://seclists.org/oss-sec/2013/q2/619 [oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view http://seclists.org/oss-sec/2013/q2/622 http://tracker.nagios.org/view.php?id=456 openSUSE-SU-2013:1158 http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html openSUSE-SU-2013:1160 http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html |
Copyright | Copyright (C) 2014 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |