Show filters
82 Total Results
Displaying 61-70 of 82
Sort by:
Attacker Value
Unknown

CVE-2021-44279

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
Attacker Value
Unknown

CVE-2021-44277

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Librenms 21.11.0 is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
Attacker Value
Unknown

CVE-2021-43324

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
LibreNMS through 21.10.2 allows XSS via a widget title.
Attacker Value
Unknown

CVE-2021-31274

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed.
Attacker Value
Unknown

CVE-2020-35700

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.
Attacker Value
Unknown

CVE-2020-15873

Disclosure Date: July 21, 2020 (last updated February 21, 2025)
In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php.
Attacker Value
Unknown

CVE-2020-15877

Disclosure Date: July 21, 2020 (last updated November 28, 2024)
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
Attacker Value
Unknown

CVE-2019-12463

Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE: relative to CVE-2019-10665, this requires authentication and the pathnames differ.
Attacker Value
Unknown

CVE-2019-12465

Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.
Attacker Value
Unknown

CVE-2019-12464

Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in LibreNMS 1.50.1. An authenticated user can perform a directory traversal attack against the /pdf.php file with a partial filename in the report parameter, to cause local file inclusion resulting in code execution.