Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2024-47140
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A cross-site scripting (xss) vulnerability exists in the add_alert_check page of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2024-47002
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A html code injection vulnerability exists in the vlan management part of Observium CE 24.4.13528. A specially crafted HTTP request can lead to an arbitrary html code. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2024-45061
Disclosure Date: January 15, 2025 (last updated January 16, 2025)
A cross-site scripting (xss) vulnerability exists in the weather map editor functionality of Observium CE 24.4.13528. A specially crafted HTTP request can lead to a arbitrary javascript code execution. An authenticated user would need to click a malicious link provided by the attacker.
0
Attacker Value
Unknown
CVE-2020-25147
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via username[0] to the default URI, because of includes/authenticate.inc.php.
0
Attacker Value
Unknown
CVE-2020-25141
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via a /device/device=140/tab=wifi/view= URI.
0
Attacker Value
Unknown
CVE-2020-25142
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable if any links and forms lack an unpredictable CSRF token. Without such a token, attackers can forge malicious requests, such as for adding Device Settings via the /addsrv URI.
0
Attacker Value
Unknown
CVE-2020-25145
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /device/device=345/?tab=ports&view=../ URIs because of device/port.inc.php.
0
Attacker Value
Unknown
CVE-2020-25146
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via la_id to the /syslog_rules URI for edit_syslog_rule.
0
Attacker Value
Unknown
CVE-2020-25144
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to directory traversal and local file inclusion due to the fact that there is an unrestricted possibility of loading any file with an inc.php extension. Inclusion of other files (even though limited to the mentioned extension) can lead to Remote Code Execution. This can occur via /apps/?app=../ URIs.
0
Attacker Value
Unknown
CVE-2020-25143
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to SQL Injection due to the fact that it is possible to inject malicious SQL statements in malformed parameter types. This can occur via /ajax/device_entities.php?entity_type=netscalervsvr&device_id[]= because of /ajax/device_entities.php.
0