[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:106728
ganglia is installed

oval:org.secpod.oval:def:106182
Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format.

oval:org.secpod.oval:def:109619
Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format.

oval:org.secpod.oval:def:1200016
Ganglia-web auth can be bypassed using boolean serialization .

oval:org.secpod.oval:def:109631
Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format.

oval:org.secpod.oval:def:1600215
Cross-site scripting vulnerability in header.php in Ganglia Web 3.5.8 and 3.5.10 allows remote attackers to inject arbitrary web script or HTML via the host_regex parameter to the default URI, which is processed by get_context.php.

oval:org.secpod.oval:def:111293
Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format.

oval:org.secpod.oval:def:111300
Ganglia is a scalable, real-time monitoring and execution environment with all execution requests and statistics expressed in an open well-defined XML format.

CVE    2
CVE-2019-20379
CVE-2019-20378
*CPE
cpe:/a:ganglia:ganglia-web

© SecPod Technologies