Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown
CVE-2025-22498
Disclosure Date: January 13, 2025 (last updated January 14, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5.
0
Attacker Value
Unknown
CVE-2023-3085
Disclosure Date: June 03, 2023 (last updated October 23, 2023)
A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663.
0
Attacker Value
Unknown
CVE-2023-24181
Disclosure Date: April 10, 2023 (last updated October 08, 2023)
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.
0
Attacker Value
Unknown
CVE-2022-41435
Disclosure Date: November 03, 2022 (last updated December 22, 2024)
OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments.
0
Attacker Value
Unknown
CVE-2021-27821
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
The Web Interface for OpenWRT LuCI version 19.07 and lower has been discovered to have a cross-site scripting vulnerability which can lead to attackers carrying out arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-10871
Disclosure Date: March 23, 2020 (last updated February 21, 2025)
In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further
0
Attacker Value
Unknown
CVE-2019-12272
Disclosure Date: May 23, 2019 (last updated November 27, 2024)
In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability.
0
Attacker Value
Unknown
CVE-2014-7575
Disclosure Date: October 20, 2014 (last updated October 05, 2023)
The eBiblio Andalucia (aka com.bqreaders.reader.ebiblioandalucia) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-3593
Disclosure Date: October 15, 2014 (last updated October 05, 2023)
Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.
0
Attacker Value
Unknown
CVE-2013-4481
Disclosure Date: November 23, 2013 (last updated October 05, 2023)
Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as "authentication secrets."
0