Vulnerabilities (CVE)

Filtered by vendor Phpipam Subscribe
Filtered by product Phpipam
Total 32 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-16695 1 Phpipam 1 Phpipam 2023-12-10 7.5 HIGH 9.8 CRITICAL
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/filter.php table parameter when action=add is used.
CVE-2019-16694 1 Phpipam 1 Phpipam 2023-12-10 7.5 HIGH 9.8 CRITICAL
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit-result.php table parameter when action=add is used.
CVE-2019-16696 1 Phpipam 1 Phpipam 2023-12-10 7.5 HIGH 9.8 CRITICAL
phpIPAM 1.4 allows SQL injection via the app/admin/custom-fields/edit.php table parameter when action=add is used.
CVE-2020-7988 1 Phpipam 1 Phpipam 2023-12-10 6.8 MEDIUM 8.8 HIGH
An issue was discovered in tools/pass-change/result.php in phpIPAM 1.4. CSRF can be used to change the password of any user/admin, to escalate privileges, and to gain access to more data and functionality. This issue exists due to the lack of a requirement to provide the old password, and the lack of security tokens.
CVE-2018-1000870 1 Phpipam 1 Phpipam 2023-12-10 3.5 LOW 5.4 MEDIUM
PHPipam version 1.3.2 and earlier contains a CWE-79 vulnerability in /app/admin/users/print-user.php that can result in Execute code in the victims browser. This attack appear to be exploitable via Attacker change theme parameter in user settings. Admin(Victim) views user in admin-panel and gets exploited.. This vulnerability appears to have been fixed in 1.4.
CVE-2018-1000869 1 Phpipam 1 Phpipam 2023-12-10 7.5 HIGH 9.8 CRITICAL
phpIPAM version 1.3.2 contains a CWE-89 vulnerability in /app/admin/nat/item-add-submit.php that can result in SQL Injection.. This attack appear to be exploitable via Rough user, exploiting the vulnerability to access information he/she does not have access to.. This vulnerability appears to have been fixed in 1.4.
CVE-2018-1000860 1 Phpipam 1 Phpipam 2023-12-10 2.6 LOW 4.7 MEDIUM
phpipam version 1.3.2 and earlier contains a Cross Site Scripting (XSS) vulnerability in The value of the phpipamredirect cookie is copied into an HTML tag on the login page encapsulated in single quotes. Editing the value of the cookie to r5zkh'><script>alert(1)</script>quqtl exploits an XSS vulnerability. that can result in Arbitrary code executes in victims browser.. This attack appear to be exploitable via Needs to be chained with another exploit that allows an attacker to set or modify a cookie for the phpIPAM instance's domain..
CVE-2019-1000010 1 Phpipam 1 Phpipam 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
phpIPAM version 1.3.2 and earlier contains a Cross Site Scripting (XSS) vulnerability in subnet-scan-telnet.php that can result in executing code in victims browser. This attack appears to be exploitable via victim visits link crafted by an attacker. This vulnerability appears to have been fixed in 1.4.
CVE-2017-15640 1 Phpipam 1 Phpipam 2023-12-10 3.5 LOW 5.4 MEDIUM
app/sections/user-menu.php in phpIPAM before 1.3.1 has XSS via the ip parameter.
CVE-2018-10329 1 Phpipam 1 Phpipam 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
app/tools/mac-lookup/index.php in phpIPAM 1.3.1 has Reflected XSS on /tools/mac-lookup/ via the mac parameter.
CVE-2017-6481 1 Phpipam 1 Phpipam 2023-12-10 4.3 MEDIUM 6.1 MEDIUM
Multiple Cross-Site Scripting (XSS) issues were discovered in phpipam 1.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (instructions in app/admin/instructions/preview.php; subnetId in app/admin/powerDNS/refresh-ptr-records.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVE-2015-6529 1 Phpipam 1 Phpipam 2023-12-10 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in phpipam 1.1.010 allow remote attackers to inject arbitrary web script or HTML via the (1) section parameter to site/error.php or (2) ip parameter to site/tools/searchResults.php.