Command Injection Vulnerability
+Affected versions:
+ < 5.3.1 and < 4.34.11
+ Date: 2021-02-14
+ CVE indentifier -
+
Impact
+We had an issue that there was a possibility to perform a potential command injection possibility by passing a manipulated array as a parameter to the following functions. Affected commands: inetLatency(), inetChecksite(), services(), processLoad().
+ +Patch
+Problem was fixed with additional parameter checking. Please upgrade to version >= 5.3.1 (or >= 4.34.11 if you are using version 4).
+ +Workarround
+If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to inetLatency(), inetChecksite(), services(), processLoad() (string only)
++
DOS Injection Vulnerability
Affected versions:
< 5.2.6 and < 4.34.10
diff --git a/docs/v4/history.html b/docs/v4/history.html
index 67dcfe3..b3fddef 100644
--- a/docs/v4/history.html
+++ b/docs/v4/history.html
@@ -83,6 +83,11 @@