VYPR

Luci

by Scientificlinux

CVEs (3)

  • CVE-2014-3593Oct 15, 2014
    risk 0.00cvss epss 0.00

    Eval injection vulnerability in luci 0.26.0 allows remote authenticated users with certain permissions to execute arbitrary Python code via a crafted cluster configuration.

  • CVE-2013-4482Nov 23, 2013
    risk 0.00cvss epss 0.00

    Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

  • CVE-2013-4481Nov 23, 2013
    risk 0.00cvss epss 0.00

    Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as "authentication secrets."