Vulnerabilities
Vulnerable Software
Xorux:  >> Lpar2rrd  >> 4.70  Security Vulnerabilities
An authenticated, read-only user can kill any processes running on the Xormon Original virtual appliance as the lpar2rrd user.
CVSS Score
6.5
EPSS Score
0.0
Published
2025-07-29
An API endpoint that should be limited to web application administrators is hidden from, but accessible by, lower-level read only web application users. The endpoint can be used to download logs from the appliance configuration, exposing sensitive information.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-07-29
An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
CVSS Score
8.8
EPSS Score
0.046
Published
2025-07-29
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
CVSS Score
9.8
EPSS Score
0.007
Published
2021-11-08
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
CVSS Score
8.8
EPSS Score
0.118
Published
2021-11-08


Contact Us

Shodan ® - All rights reserved