Page 2 of 64 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Stored Cross-Site Scripting (XSS) can be achieved by uploading a new Background for a Custom Map. Users with "admin" role can set background for a custom map, this allow the upload of SVG file that can contain XSS payload which will trigger on load. This led to Stored Cross-Site Scripting (XSS). The vulnerability is fixed in 24.9.0. • https://github.com/librenms/librenms/commit/d959bf1b366319eda16e3cd6dfda8a22beb203be https://github.com/librenms/librenms/security/advisories/GHSA-x8gm-j36p-fppf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-116: Improper Encoding or Escaping of Output CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. • https://github.com/librenms/librenms/commit/83fe4b10c440d69a47fe2f8616e290ba2bd3a27c https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability. LibreNMS es un sistema de monitoreo de red de código abierto basado en PHP/MySQL/SNMP. Antes de la versión 24.4.0, había una sanitización inadecuada en el nombre de la plantilla "Servicio", lo que puede provocar que se almacenen Cross Site Scripting. • https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23 https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability. LibreNMS es un sistema de monitoreo de red de código abierto basado en PHP/MySQL/SNMP. • https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6 https://github.com/librenms/librenms/commit/d29201fce134347f891102699fbde7070debee33 https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. In affected versions the login method has no rate limit. An attacker may be able to leverage this vulnerability to gain access to user accounts. This issue has been addressed in version 23.11.0. Users are advised to upgrade. • https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx • CWE-307: Improper Restriction of Excessive Authentication Attempts •