CVE-2022-0576
- EPSS 0.01%
- Veröffentlicht 14.02.2022 12:15:23
- Zuletzt bearbeitet 21.11.2024 06:38:57
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
CVE-2021-44278
- EPSS 0%
- Veröffentlicht 03.12.2021 13:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:42
Librenms 21.11.0 is affected by a path manipulation vulnerability in includes/html/pages/device/showconfig.inc.php.
CVE-2021-44277
- EPSS 0%
- Veröffentlicht 01.12.2021 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:42
Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
CVE-2021-44279
- EPSS 0%
- Veröffentlicht 01.12.2021 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:42
Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
CVE-2021-43324
- EPSS 0%
- Veröffentlicht 03.11.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:29:05
LibreNMS through 21.10.2 allows XSS via a widget title.
CVE-2021-31274
- EPSS 0.01%
- Veröffentlicht 08.09.2021 18:15:10
- Zuletzt bearbeitet 21.11.2024 06:05:23
In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.
CVE-2020-35700
- EPSS 0.08%
- Veröffentlicht 08.02.2021 09:15:12
- Zuletzt bearbeitet 21.11.2024 05:27:52
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /...
CVE-2020-15873
- EPSS 7.53%
- Veröffentlicht 21.07.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:21
In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.
CVE-2020-15877
- EPSS 0.08%
- Veröffentlicht 21.07.2020 17:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:21
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
CVE-2019-10670
- EPSS 0%
- Veröffentlicht 09.09.2019 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:19:43
An issue was discovered in LibreNMS through 1.47. Many of the scripts rely on the function mysqli_escape_real_string for filtering data. However, this is particularly ineffective when returning user supplied input in an HTML or a JavaScript context, ...