Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown

CVE-2025-22498

Disclosure Date: January 13, 2025 (last updated January 14, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Normal LLC LucidLMS allows Reflected XSS.This issue affects LucidLMS: from n/a through 1.0.5.
0
Attacker Value
Unknown

CVE-2023-3085

Disclosure Date: June 03, 2023 (last updated October 23, 2023)
A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663.
Attacker Value
Unknown

CVE-2023-24181

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.
Attacker Value
Unknown

CVE-2022-41435

Disclosure Date: November 03, 2022 (last updated December 22, 2024)
OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments.
Attacker Value
Unknown

CVE-2021-27821

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
The Web Interface for OpenWRT LuCI version 19.07 and lower has been discovered to have a cross-site scripting vulnerability which can lead to attackers carrying out arbitrary code execution.
Attacker Value
Unknown

CVE-2020-10871

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
In OpenWrt LuCI git-20.x, remote unauthenticated attackers can retrieve the list of installed packages and services. NOTE: the vendor disputes the significance of this report because, for instances reachable by an unauthenticated actor, the same information is available in other (more complex) ways, and there is no plan to restrict the information further
Attacker Value
Unknown

CVE-2019-12272

Disclosure Date: May 23, 2019 (last updated November 27, 2024)
In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability.
0
Attacker Value
Unknown

CVE-2014-7575

Disclosure Date: October 20, 2014 (last updated October 05, 2023)
The eBiblio Andalucia (aka com.bqreaders.reader.ebiblioandalucia) application 1.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown

CVE-2014-3593

Disclosure Date: October 15, 2014 (last updated October 05, 2023)
Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.
0
Attacker Value
Unknown

CVE-2013-4481

Disclosure Date: November 23, 2013 (last updated October 05, 2023)
Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as "authentication secrets."
0