Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures (CVE®) is a list of common identifiers for publicly known cybersecurity vulnerabilities
Use of CVE Records, which are assigned by CVE Numbering Authorities (CNAs) from around the world, ensures confidence among parties when used to discuss or share information about a unique software or firmware vulnerability, provides a baseline for tool evaluation, and enables automated data exchange.
CVE is an international cybersecurity community effort. In addition to the contributions of the CVE Numbering Authorities, CVE Board, and the CVE Sponsor, numerous organizations from around the world have included CVE IDs in their security advisories, have made their products and services compatible with CVE, and/or have adopted or promoted the use of CVE.
When a security researcher contacts us to report a vulnerability, we ask for details and try to understand the problem. If it exists, we reproduce the bug and prioritize its correction. We ask the researcher not to publish the details of the vulnerability until we have released the fix in an official version and, in coordination with the researcher, we manage the response to our customers and community.
CVE code | Vulnerability details | Publication date | Fixed in version |
---|---|---|---|
CVE-2024-11320 | Command Injection leading to RCE via LDAP Misconfiguration | 21 Nov 2024 | 777.5 |
CVE-2024-35308 | System command injection through Netflow function | 22 Oct 2024 | 777.3 |
CVE-2024-9987 | Unauth Time-Based SQL Injection via API | 22 Oct 2024 | 777.3 |
CVE-2024-35304 | System command injection through Netflow function | 10 Jun 2024 | 777 |
CVE-2024-35305 | Unauth Time-Based SQL Injection via API | 10 Jun 2024 | 777 |
CVE-2024-35306 | OS Command injection in Ajax PHP files through HTTP Request | 10 Jun 2024 | 777 |
CVE-2024-35307 | Argument Injection Leading to Remote Code Execution in Realtime Graph Extension | 10 Jun 2024 | 777 |
CVE-2023-41793 | Path Traversal and Untrusted Upload File | 19 Mar 2024 | 776 |
CVE-2023-44092 | OS Command Injection | 19 Mar 2024 | 776 |
CVE-2023-44091 | Unauth Time-Based SQL Injection | 19 Mar 2024 | 776 |
CVE-2023-44090 | Unauth SQL Injection | 19 Mar 2024 | 776 |
CVE-2023-44089 | XSS en consola visual | 29 Dic 2023 | 775 |
CVE-2023-44088 | SQL Injection en Consola Visual | 29 Dic 2023 | 775 |
CVE-2023-41815 | XSS en File manager | 29 Dic 2023 | 775 |
CVE-2023-41814 | Possible XSS attacks when user opens their notifications | 29 Dic 2023 | 775 |
CVE-2023-41813 | Any User Can Change Any Other User’s Notification Settings | 29 Dic 2023 | 775 |
CVE-2023-41812 | Upload of PHP files using file manager | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41811 | Stored Cross Site Scripting Via Site News Page | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41810 | Stored Cross Site Scripting Via Dashboard Panel | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41808 | Arbitrary File Read As Root Via GoTTY Page | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41807 | Linux Local Privilege Escalation Via GoTTY Page | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41806 | System Denial of Service Via GoTTY Page | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41792 | Lack of Authorization and Stored Cross Site Scripting Via SNMP Trap Editor Page | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41791 | Lack of Authorization and Stored Cross Site Scripting Via Translation Abuse | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41790 | Path Traversal in get_file.php | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41789 | Unauthenticated Admin Account Takeover Via Malicious Agent and XSS | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41788 | Remote Code Execution via MIBS file uploader | 21 Nov 2023 | 774 - 772.2 |
CVE-2023-41787 | Arbitrary File Read Via API Checker Page | 21 Nov 2023 | 773 - 772.1 |
CVE-2023-41786 | Database Backups Are Available to Any User | 21 Nov 2023 | 773 - 772.1 |
CVE-2023-4677 | Unauthenticated Admin Account Takeover Via Cron Log File Backups | 21 Nov 2023 | 773 - 772.1 |
CVE-2023-2807 | Authentication bypass in password reset process | 20 Jun 2023 | 772 |
CVE-2023-0828 | Stored Cross Site Scripting in syslog section | 17 Apr 2023 | 770 |
CVE-2023-24518 | Disable Admin's account via Cross-site Request Forgery | 17 Apr 2023 | 770 |
CVE-2023-24517 | Remote Code Execution via Unrestricted File Upload | 21 Feb 2023 | 769 |
CVE-2023-24516 | Stored Cross Site Scripting - Special Days Module | 21 Feb 2023 | 769 |
CVE-2023-24515 | Server side request forgery in api checker | 21 Feb 2023 | 769 |
CVE-2023-24514 | Stored Cross Site Scripting Vulnerability in Visual Console Module | 21 Feb 2023 | 769 | CVE-2022-47373 | Reflected Cross Site Scripting in Search Functionality of Module Library | 14 Dec 2022 | 767 |
CVE-2022-47372 | Stored cross-site scripting vulnerability in the Create event section | 14 Dec 2022 | 767 |
CVE-2022-45437 | Cross-Site Scripting (XSS) in the reporting dashboard module | 16 Nov 2022 | 766 |
CVE-2022-45436 | Reflected Cross Site Scripting leading to session in help button network map | 16 Nov 2022 | 766 |
CVE-2022-43980 | Stored cross-site scripting vulnerability in the network maps edit functionality | 03 Nov 2022 | 766 |
CVE-2022-43979 | Path Traversal leading to Local File Inclusion | 03 Nov 2022 | 766 |
CVE-2022-43978 | Limited Authentication bypass due to hardcoded secret | 03 Nov 2022 | 766 |
CVE-2022-2032 | Stored Cross Site-Scripting in File Manager | 14 Jun 2022 | 762 |
CVE-2022-2059 | Stored Cross Site-Scripting in Agent Manager | 14 Jun 2022 | 762 |
CVE-2022-1648 | Relative Path Traversal to Remote Code Execution in File Manager | 13 May 2022 | 761 |
CVE-2022-26310 | Improper Authorization in User Management to Vertical Privilege Escalation | 13 May 2022 | 761 |
CVE-2022-26309 | Cross-Site Request en Bulk operation (User operation) | 13 May 2022 | 761 |
CVE-2022-26308 | Improper Access Control in Configuration (Credential store) | 13 May 2022 | 761 |
CVE-2022-0507 | Vulnerability: Authenticated SQL Injection in API | 10 Feb 2022 | 760 |
CVE-2021-46681 | Vulnerability XSS in module mass operation name field | 15 Sept 2021 | 757 |
CVE-2021-46680 | Vulnerability XSS in module form name field | 15 Sept 2021 | 757 |
CVE-2021-46679 | Vulnerability XSS in service elements | 15 Sept 2021 | 757 |
CVE-2021-46678 | Vulnerability XSS in service from name field | 15 Sept 2021 | 757 |
CVE-2021-46677 | Vulnerability XSS in Event filter name field | 15 Sept 2021 | 757 |
CVE-2021-46676 | Vulnerability XSS in Transaction Map name field | 15 Sept 2021 | 757 |
CVE-2021-34075 | In Artica Pandora FMS <=754 in the File Manager component, there is sensitive information exposed on the client side which attackers can access. | 30 Jun 2021 | 756 |
CVE-2021-35501 | Vulnerability XSS in in the name field of a visual console | 25 Jun 2021 | 755 |
CVE-2021-32100 | A remote file inclusion vulnerability exists in Artica Pandora FMS 742, exploitable by the lowest privileged user. | 29 Jan 2020 | 743 |
CVE-2021-32099 | A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an nauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass. | 29 Jan 2020 | 743 |
CVE-2021-32098 | functions_netflow.php in Artica Pandora FMS 7.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the index.php?operation/netflow/nf_live_view ip_dst, dst_port, or src_port parameter, a different vulnerability than CVE-2019-20224. | 29 Jan 2020 | 743 |
CVE-2020-8947 | functions_netflow.php in Artica Pandora FMS 7.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the index.php?operation/netflow/nf_live_view ip_dst, dst_port, or src_port parameter, a different vulnerability than CVE-2019-20224. | 18 Dec 2019 | 742 |
CVE-2020-8511 | In Artica Pandora FMS through 7.42, Web Admin users can execute arbitrary code by uploading a .php file via the File Repository component, a different issue than CVE-2020-7935 and CVE-2020-8500. | 8 Jun 2021 | 93 |
CVE-2020-8500 | ** DISPUTED ** In Artica Pandora FMS 7.42, Web Admin users can execute arbitrary code by uploading a .php file via the Updater or Extension component. NOTE: The vendor reports that this is intended functionality. | 8 Jun 2021 | 93 |
CVE-2020-8497 | In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. | 8 Jun 2021 | 93 |
CVE-2020-7935 | Artica Pandora FMS through 7.42 is vulnerable to remote PHP code execution because of an Unrestricted Upload Of A File With A Dangerous Type issue in the File Manager. An attacker can create a (or use an existing) directory that is externally accessible to store PHP files. The filename and the exact path is known by the attacker, so it is possible to execute PHP code in the context of the application. The vulnerability is exploitable only with Administrator access. | 8 Jun 2021 | 755 |
CVE-2020-5844 | index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0 NG allows authenticated administrators to upload malicious PHP scripts, and execute them via base64 decoding of the file location. This affects v7.0NG.742_FIX_PERL2020. | 10 Feb 2021 | 752 |
CVE-2020-26518 | Pandora FMS before 743 allows unauthenticated attackers to conduct SQL injection attacks via the pandora_console/include/chart_generator.php session_id parameter. | 2 Oct 2020 | 743 |
CVE-2020-13855 | Pandora FMS 744 allows arbitrary file upload (leading to remote command execution) via the File Repository Manager feature. | 4 Jun 2020 | 745 |
CVE-2020-13854 | Pandora FMS 744 allows privilege escalation. | 4 Jun 2020 | 745 |
CVE-2020-13853 | Pandora FMS 744 has persistent XSS in the Messages feature. | 4 Jun 2020 | 745 |
CVE-2020-13852 | Pandora FMS 744 allows arbitrary file upload (leading to remote command execution) via the File Manager feature. | 4 Jun 2020 | 745 |
CVE-2020-13851 | Pandora FMS 744 allows remote command execution via the events feature. | 4 Jun 2020 | 745 |
CVE-2020-13850 | Artica Pandora FMS 744 has inadequate access controls on a web folder. | 4 Jun 2020 | 747 |
CVE-2020-11749 | Pandora FMS 7.0 NG 746 suffers from Multiple XSS vulnerabilities in different browser views. A network administrator scanning a SNMP device can trigger a Cross Site Scripting (XSS), which can run arbitrary code to allow Remote Code Execution as root or apache2. | 14 Apr 2020 | 747 |
CVE-2020-8947 | Allows remote attackers to execute arbitrary OS commands via shell metacharacters in the netflow report. It needs valid credentials to success. | 12 Feb 2020 | 743 |
CVE-2020-8511 | Pandora FMS through 7.42, admin users can execute arbitrary code by uploading a .php file via the File Repository component. | 31 Jan 2020 | N/A |
CVE-2020-8497 | Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. | 30 Jan 2020 | 746 |
CVE-2020-7935 | Artica Pandora FMS through 742 is vulnerable to remote PHP code execution because of an Unrestricted Upload Of A File With A Dangerous Type issue in the File Manager by the admin user. The vulnerability is exploitable only with Administrator access. | 23 Jan 2020 | N/A |
CVE-2020-5844 | Files_repo in Pandora FMS v7.0 NG allows authenticated administrators to upload malicious PHP scripts, and execute them via base64 decoding of the file location. | 6 Jan 2020 | 743 |
CVE-2019-20224 | Netflow stats in Pandora FMS NG allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ip_src parameter. | 2 Jan 2020 | 742 |
CVE-2019-20050 | Pandora FMS 742 suffers from a remote code execution vulnerability. To exploit the vulnerability, an authenticated user should create a new folder with a "tricky" name in the filemanager. The exploit works when the php-fileinfo extension is disabled on the host system. The attacker must include shell metacharacters in the content type. | 27 Dec 2019 | 742 |
CCVE-2019-13035 | Pandora FMS 7.0 NG before 735 suffers from local privilege escalation due to improper permissions on C:\PandoraFMS and its sub-folders, allowing standard users to create new files. Moreover, the Apache service httpd.exe will try to execute cmd.exe from C:\PandoraFMS (the current directory) as NT AUTHORITY\SYSTEM upon web requests to the portal. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. | 29 Jun 2019 | 735 |
CVE-2018-11223 | XSS in Artica Pandora FMS before 723 allows an attacker to execute arbitrary code via a crafted "refr" parameter. | 16 May 2018 | 723 |
CVE-2018-11222 | Local File Inclusion (LFI) in Pandora FMS through version 723 allows an attacker to call any php file via the /pandora_console/ajax.php ajax endpoint. | 16 May 2018 | 723 |
CVE-2018-11221 | Unauthenticated untrusted file upload in Pandora FMS through version 723 allows an attacker to upload an arbitrary plugin via include/ajax/update_manager.ajax in the update system. | 16 May 2018 | 723 |
CVE-2017-15937 | Pandora FMS version 7.0 leaks a full installation pathname via GET data when intercepting the main page's graph requisition. This also implies that general OS information is leaked (e.g., a /var/www pathname typically means Linux or UNIX). | 27 Oct 2017 | 714 |
CVE-2017-15936 | Pandora FMS NG an Attacker with write Permission can create an agent with an XSS Payload; when a user enters the agent definitions page, the script will get executed. | 27 Oct 2017 | 714 |
CVE-2017-15935 | Pandora FMS 7.0 vulnerable to remote PHP code execution through the manager files function. This is only exploitable by administrators who upload a PHP file. | 27 Oct 2017 | 714 |
CVE-2017-15934 | Pandora FMS 7.0 is vulnerable to stored Cross-Site Scripting in the map name parameter. | 27 Oct 2017 | 714 |
CVE-2010-4283 | PHP remote file inclusion vulnerability in extras/pandora_diag.php in Pandora FMS before 3.1.1 allows remote attackers to execute arbitrary PHP code via a URL in the argv[1] parameter. | 17 Nov 2014 | 3.1.1 |
CVE-2010-4282 | Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. | 17 Nov 2014 | 3.1.1 |
CVE-2010-4281 | Incomplete blacklist vulnerability in the safe_url_extraclean function in ajax.php in Pandora FMS before 3.1.1 allows remote attackers to execute arbitrary PHP code by using a page parameter containing a UNC share pathname, which bypasses the check for the : (colon) character. | 17 Nov 2014 | 3.1.1 |
CVE-2010-4280 | Multiple SQL injection vulnerabilities in Pandora FMS before 3.1.1 allow remote authenticated users to execute arbitrary SQL commands via (1) the id_group parameter in an operation/agentes/ver_agente action to ajax.php or (2) the group_id parameter in an operation/agentes/estado_agente action to index.php, related to operation/agentes/estado_agente.php. | 17 Nov 2014 | 3.1.1 |
CVE-2010-4279 | The default configuration of Pandora FMS 3.1 and earlier specifies an empty string for the loginhash_pwd field, which allows remote attackers to bypass authentication by sending a request to index.php with "admin" in the loginhash_user parameter, in conjunction with the md5 hash of "admin" in the loginhash_data parameter. | 17 Nov 2014 | 3.1.1 |
CVE-2010-4278 | operation/agentes/networkmap.php in Pandora FMS before 3.1.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the layout parameter in an operation/agentes/networkmap action to index.php. | 17 Nov 2014 | 3.1.1 |
CVE-2014-8629 | Cross-site scripting (XSS) vulnerability in the Page visualization agents in Pandora FMS 5.1 SP1 and earlier allows remote attackers to inject arbitrary web script or HTML via the refr parameter to index.php. | 11 Nov 2014 | 5.1 SP2 |