Vulnerabilities
Vulnerable Software
Xorux:  Security Vulnerabilities
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to export the appliance configuration, exposing sensitive information.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-07-29
An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user.
CVSS Score
6.5
EPSS Score
0.0
Published
2025-07-29
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-07-29
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
CVSS Score
8.8
EPSS Score
0.046
Published
2025-07-29
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to import the appliance configuration, allowing an attacker to control the configuration of the appliance, to include granting themselves administrative level permissions.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-07-29
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)
CVSS Score
7.5
EPSS Score
0.002
Published
2021-11-08
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
CVSS Score
9.8
EPSS Score
0.007
Published
2021-11-08
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
CVSS Score
8.8
EPSS Score
0.118
Published
2021-11-08
tz.pl on XoruX LPAR2RRD and STOR2RRD 2.70 virtual appliances allows cmd=set&tz=OS command injection via shell metacharacters in a timezone.
CVSS Score
9.8
EPSS Score
0.168
Published
2020-08-18
LPAR2RRD in 3.5 and earlier allows remote attackers to execute arbitrary commands due to insufficient input sanitization of the web GUI parameters.
CVSS Score
9.8
EPSS Score
0.387
Published
2020-02-17


Contact Us

Shodan ® - All rights reserved