Filtered by vendor Phpipam
Subscriptions
Filtered by product Phpipam
Subscriptions
Total
38 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-23045 | 1 Phpipam | 1 Phpipam | 2024-08-03 | 4.8 Medium |
PhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the "Site title" parameter while updating the site settings. The "Site title" setting is injected in several locations which triggers the XSS. | ||||
CVE-2022-23046 | 1 Phpipam | 1 Phpipam | 2024-08-03 | 7.2 High |
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php | ||||
CVE-2022-3845 | 1 Phpipam | 1 Phpipam | 2024-08-03 | 2.4 Low |
A vulnerability has been found in phpipam and classified as problematic. Affected by this vulnerability is an unknown functionality of the file app/admin/import-export/import-load-data.php of the component Import Preview Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 22c797c3583001211fe7d31bccd3f1d4aeeb3bbc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-212863. | ||||
CVE-2022-1224 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.5 Medium |
Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. | ||||
CVE-2022-1223 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.5 Medium |
Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. | ||||
CVE-2022-1225 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.5 Medium |
Incorrect Privilege Assignment in GitHub repository phpipam/phpipam prior to 1.4.6. | ||||
CVE-2023-24657 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.1 Medium |
phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php. | ||||
CVE-2023-4965 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 2.7 Low |
A vulnerability was found in phpipam 1.5.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Header Handler. The manipulation of the argument X-Forwarded-Host leads to open redirect. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239732. | ||||
CVE-2023-1212 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 4.8 Medium |
Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2. | ||||
CVE-2023-1211 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 7.2 High |
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2. | ||||
CVE-2023-0676 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.1 Medium |
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1. | ||||
CVE-2023-0678 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 5.3 Medium |
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1. | ||||
CVE-2023-0677 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.1 Medium |
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1. | ||||
CVE-2024-41355 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 6.5 Medium |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/tools/request-ip/index.php. | ||||
CVE-2024-41354 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 7.1 High |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/widgets/edit.php | ||||
CVE-2024-41357 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 7.1 High |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/admin/powerDNS/record-edit.php. | ||||
CVE-2024-41353 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 7.1 High |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\groups\edit-group.php | ||||
CVE-2024-41356 | 1 Phpipam | 1 Phpipam | 2024-08-02 | 4.7 Medium |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\firewall-zones\zones-edit-network.php. |