CVE-2008-5027
EUVD-2008-500610.11.2008, 15:23
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| nagios | nagios | 𝑥 ≤ 3.0.4 |
| nagios | nagios | 1.0 |
| nagios | nagios | 1.0_b1:_b1 |
| nagios | nagios | 1.0_b2:_b2 |
| nagios | nagios | 1.0_b3:_b3 |
| nagios | nagios | 1.0b1:b1 |
| nagios | nagios | 1.0b2:b2 |
| nagios | nagios | 1.0b3:b3 |
| nagios | nagios | 1.0b4:b4 |
| nagios | nagios | 1.0b5:b5 |
| nagios | nagios | 1.0b6:b6 |
| nagios | nagios | 1.1 |
| nagios | nagios | 1.2 |
| nagios | nagios | 1.3 |
| nagios | nagios | 1.4 |
| nagios | nagios | 1.4.1 |
| nagios | nagios | 2.0 |
| nagios | nagios | 2.0b1:b1 |
| nagios | nagios | 2.0b2:b2 |
| nagios | nagios | 2.0b3:b3 |
| nagios | nagios | 2.0b4:b4 |
| nagios | nagios | 2.0b5:b5 |
| nagios | nagios | 2.0b6:b6 |
| nagios | nagios | 2.0rc1:rc1 |
| nagios | nagios | 2.0rc2:rc2 |
| nagios | nagios | 2.1 |
| nagios | nagios | 2.2 |
| nagios | nagios | 2.3 |
| nagios | nagios | 2.3.1 |
| nagios | nagios | 2.4 |
| nagios | nagios | 2.5 |
| nagios | nagios | 2.7 |
| nagios | nagios | 2.8 |
| nagios | nagios | 2.9 |
| nagios | nagios | 2.10 |
| nagios | nagios | 2.11 |
| nagios | nagios | 3.0 |
| nagios | nagios | 3.0:alpha1 |
| nagios | nagios | 3.0:alpha2 |
| nagios | nagios | 3.0:alpha3 |
| nagios | nagios | 3.0:alpha4 |
| nagios | nagios | 3.0:beta1 |
| nagios | nagios | 3.0:beta2 |
| nagios | nagios | 3.0:beta3 |
| nagios | nagios | 3.0:beta4 |
| nagios | nagios | 3.0:beta5 |
| nagios | nagios | 3.0:beta6 |
| nagios | nagios | 3.0:beta7 |
| nagios | nagios | 3.0:rc1 |
| nagios | nagios | 3.0:rc2 |
| nagios | nagios | 3.0:rc3 |
| nagios | nagios | 3.0.1 |
| nagios | nagios | 3.0.2 |
| nagios | nagios | 3.0.3 |
| op5 | monitor | 𝑥 ≤ 4.0.0 |
| op5 | monitor | 2.4 |
| op5 | monitor | 2.6 |
| op5 | monitor | 2.8 |
| op5 | monitor | 3.0 |
| op5 | monitor | 3.0.0 |
| op5 | monitor | 3.2 |
| op5 | monitor | 3.2.4 |
| op5 | monitor | 3.3.1 |
| op5 | monitor | 3.3.2 |
| op5 | monitor | 3.3.3 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References