Security for everyone

CVE-2016-10367 Scanner

Detects 'Local File Inclusion (LFI)' vulnerability in Opsview Monitor Pro affects v. (Prior to, prior to, prior to, and 4.5.x without a certain 2016 security patch.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2016-10367 Scanner Detail

Opsview Monitor Pro is a monitoring and alerting tool designed for IT infrastructure. This product is commonly used in enterprises to monitor their critical servers and applications. Opsview offers a single view of the IT infrastructure through comprehensive dashboards, making it easier for IT teams to proactively detect and resolve issues in real-time.

CVE-2016-10367 is an unauthenticated Directory Traversal vulnerability discovered in Opsview Monitor Pro. This vulnerability is caused by a lack of input validation when parsing URL-encoded strings containing directory traversal sequences. Attackers can exploit this by sending specially crafted HTTP GET requests utilizing a simple URL encoding bypass, %252f instead of /, to execute arbitrary code.

Exploitation of the CVE-2016-10367 vulnerability represents a severe risk to organizations using Opsview Monitor Pro. Attackers who successfully exploit this vulnerability can access sensitive information within an organization, modify or delete data, or even execute remote code on affected systems. This could result in service disruption, data theft, or other nefarious activities, leading to negative economic impact and reputational damage.

In conclusion, security is a critical part of any organization's digital assets. Thanks to the pro features of the platform, users can explore and learn about the vulnerabilities in their digital assets and implement the necessary precautions to protect against them. By following best practices for security, organizations can minimize their attack surface and maintain a secure and resilient IT infrastructure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture