Логотип exploitDog
bind:CVE-2024-10727
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10727

Количество 3

Количество 3

nvd логотип

CVE-2024-10727

11 месяцев назад

A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2024-10727

11 месяцев назад

A reflected cross-site scripting (XSS) vulnerability exists in phpipam ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-6pvw-p9fg-rwxj

11 месяцев назад

A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.

CVSS3: 3.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10727

A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.

CVSS3: 6.1
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-10727

A reflected cross-site scripting (XSS) vulnerability exists in phpipam ...

CVSS3: 6.1
0%
Низкий
11 месяцев назад
github логотип
GHSA-6pvw-p9fg-rwxj

A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.

CVSS3: 3.5
0%
Низкий
11 месяцев назад

Уязвимостей на страницу