Vulnerabilities > Librenms > Librenms > 1.46
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-07-21 | CVE-2020-15873 | SQL Injection vulnerability in Librenms In LibreNMS before 1.65.1, an authenticated attacker can achieve SQL Injection via the customoid.inc.php device_id POST parameter to ajax_form.php. | 4.0 |
2019-09-09 | CVE-2019-12465 | SQL Injection vulnerability in Librenms An issue was discovered in LibreNMS 1.50.1. | 5.5 |
2019-09-09 | CVE-2019-10671 | SQL Injection vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 6.5 |
2019-09-09 | CVE-2019-10670 | Cross-site Scripting vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 4.3 |
2019-09-09 | CVE-2019-10669 | OS Command Injection vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 6.5 |
2019-09-09 | CVE-2019-10668 | Missing Authentication for Critical Function vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 6.4 |
2019-09-09 | CVE-2019-10667 | Information Exposure vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 5.0 |
2019-09-09 | CVE-2019-10666 | Code Injection vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 6.8 |
2019-09-09 | CVE-2019-10665 | Injection vulnerability in Librenms An issue was discovered in LibreNMS through 1.47. | 7.5 |
2019-04-24 | CVE-2018-20434 | OS Command Injection vulnerability in Librenms 1.46 LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling. | 10.0 |