Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2021-42372

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
Attacker Value
Unknown

CVE-2021-42370

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)
Attacker Value
Unknown

CVE-2021-42371

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
Attacker Value
Unknown

CVE-2020-24032

Disclosure Date: August 18, 2020 (last updated February 22, 2025)
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
Attacker Value
Unknown

CVE-2019-19041

Disclosure Date: June 21, 2019 (last updated November 27, 2024)
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by the underlying system. It is possible to achieve this by modifying the values in the files.SUM file (which are used for integrity control) and injecting malicious code into the upgrade.sh file.