Filtered by vendor Phpipam
Subscribe
Total
35 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-6481 | 1 Phpipam | 1 Phpipam | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Multiple Cross-Site Scripting (XSS) issues were discovered in phpipam 1.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (instructions in app/admin/instructions/preview.php; subnetId in app/admin/powerDNS/refresh-ptr-records.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. | |||||
CVE-2015-6529 | 1 Phpipam | 1 Phpipam | 2024-11-21 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in phpipam 1.1.010 allow remote attackers to inject arbitrary web script or HTML via the (1) section parameter to site/error.php or (2) ip parameter to site/tools/searchResults.php. | |||||
CVE-2024-0787 | 1 Phpipam | 1 Phpipam | 2024-11-19 | N/A | 5.9 MEDIUM |
phpIPAM version 1.5.1 contains a vulnerability where an attacker can bypass the IP block mechanism to brute force passwords for users by using the 'X-Forwarded-For' header. The issue lies in the 'get_user_ip()' function in 'class.Common.php' at lines 1044 and 1045, where the presence of the 'X-Forwarded-For' header is checked and used instead of 'REMOTE_ADDR'. This vulnerability allows attackers to perform brute force attacks on user accounts, including the admin account. The issue is fixed in version 1.7.0. | |||||
CVE-2022-1226 | 1 Phpipam | 1 Phpipam | 2024-11-19 | N/A | 4.8 MEDIUM |
A Cross-Site Scripting (XSS) vulnerability in phpipam/phpipam versions prior to 1.4.7 allows attackers to execute arbitrary JavaScript code in the browser of a victim. This vulnerability affects the import Data set feature via a spreadsheet file upload. The affected endpoints include import-vlan-preview.php, import-subnets-preview.php, import-vrf-preview.php, import-ipaddr-preview.php, import-devtype-preview.php, import-devices-preview.php, and import-l2dom-preview.php. The vulnerability can be exploited by uploading a specially crafted spreadsheet file containing malicious JavaScript payloads, which are then executed in the context of the victim's browser. This can lead to defacement of websites, execution of malicious JavaScript code, stealing of user cookies, and unauthorized access to user accounts. | |||||
CVE-2024-41358 | 1 Phpipam | 1 Phpipam | 2024-09-04 | N/A | 6.1 MEDIUM |
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via app\admin\import-export\import-load-data.php. | |||||
CVE-2023-4965 | 1 Phpipam | 1 Phpipam | 2024-05-17 | 3.3 LOW | 4.8 MEDIUM |
A vulnerability was found in phpipam 1.5.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Header Handler. The manipulation of the argument X-Forwarded-Host leads to open redirect. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239732. | |||||
CVE-2023-41580 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 7.5 HIGH |
Phpipam before v1.5.2 was discovered to contain a LDAP injection vulnerability via the dname parameter at /users/ad-search-result.php. This vulnerability allows attackers to enumerate arbitrary fields in the LDAP server and access sensitive data via a crafted POST request. | |||||
CVE-2023-24657 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 6.1 MEDIUM |
phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php. | |||||
CVE-2023-1211 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 7.2 HIGH |
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2. | |||||
CVE-2023-1212 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 4.8 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2. | |||||
CVE-2023-0676 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1. | |||||
CVE-2023-0677 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1. | |||||
CVE-2023-0678 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 5.3 MEDIUM |
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1. | |||||
CVE-2022-3845 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 6.1 MEDIUM |
A vulnerability has been found in phpipam and classified as problematic. Affected by this vulnerability is an unknown functionality of the file app/admin/import-export/import-load-data.php of the component Import Preview Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 22c797c3583001211fe7d31bccd3f1d4aeeb3bbc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-212863. | |||||
CVE-2022-41443 | 1 Phpipam | 1 Phpipam | 2024-02-28 | N/A | 9.8 CRITICAL |
phpipam v1.5.0 was discovered to contain a header injection vulnerability via the component /admin/subnets/ripe-query.php. | |||||
CVE-2022-1224 | 1 Phpipam | 1 Phpipam | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. | |||||
CVE-2021-46426 | 1 Phpipam | 1 Phpipam | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
phpIPAM 1.4.4 allows Reflected XSS and CSRF via app/admin/subnets/find_free_section_subnets.php of the subnets functionality. | |||||
CVE-2022-1225 | 1 Phpipam | 1 Phpipam | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Incorrect Privilege Assignment in GitHub repository phpipam/phpipam prior to 1.4.6. | |||||
CVE-2022-1223 | 1 Phpipam | 1 Phpipam | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6. | |||||
CVE-2022-23046 | 1 Phpipam | 1 Phpipam | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php |