Librenms

Librenms

101 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0%
  • Veröffentlicht 01.12.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:30:42

Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.

  • EPSS 0%
  • Veröffentlicht 03.11.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:29:05

LibreNMS through 21.10.2 allows XSS via a widget title.

  • EPSS 0.01%
  • Veröffentlicht 08.09.2021 18:15:10
  • Zuletzt bearbeitet 21.11.2024 06:05:23

In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 08.02.2021 09:15:12
  • Zuletzt bearbeitet 21.11.2024 05:27:52

A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /...

Exploit
  • EPSS 5.25%
  • Veröffentlicht 21.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:21

In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 21.07.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:21

An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.

Exploit
  • EPSS 0%
  • Veröffentlicht 09.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:43

An issue was discovered in LibreNMS through 1.47. Many of the scripts rely on the function mysqli_escape_real_string for filtering data. However, this is particularly ineffective when returning user supplied input in an HTML or a JavaScript context, ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:43

An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as dem...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:22:54

An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some para...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 09.09.2019 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:22:54

An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.