Show filters
203 Total Results
Displaying 111-120 of 203
Sort by:
Attacker Value
Unknown

CVE-2022-1224

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
Improper Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.
Attacker Value
Unknown

CVE-2022-1223

Disclosure Date: April 04, 2022 (last updated February 23, 2025)
Incorrect Authorization in GitHub repository phpipam/phpipam prior to 1.4.6.
Attacker Value
Unknown

CVE-2021-46426

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
phpIPAM 1.4.4 allows Reflected XSS and CSRF via app/admin/subnets/find_free_section_subnets.php of the subnets functionality.
Attacker Value
Unknown

CVE-2022-23046

Disclosure Date: January 19, 2022 (last updated February 23, 2025)
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
Attacker Value
Unknown

CVE-2022-23045

Disclosure Date: January 19, 2022 (last updated February 23, 2025)
PhpIPAM v1.4.4 allows an authenticated admin user to inject persistent JavaScript code inside the "Site title" parameter while updating the site settings. The "Site title" setting is injected in several locations which triggers the XSS.
Attacker Value
Unknown

CVE-2021-46142

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.
Attacker Value
Unknown

CVE-2021-46141

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.
Attacker Value
Unknown

CVE-2021-44043

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
An issue was discovered in UiPath App Studio 21.4.4. There is a persistent XSS vulnerability in the file-upload functionality for uploading icons when attempting to create new Apps. An attacker with minimal privileges in the application can build their own App and upload a malicious file containing an XSS payload, by uploading an arbitrary file and modifying the MIME type in a subsequent HTTP request. This then allows the file to be stored and retrieved from the server by other users in the same organization.
Attacker Value
Unknown

CVE-2021-44042

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
An issue was discovered in UiPath Assistant 21.4.4. User-controlled data supplied to the --process-start argument of the URI handler for uipath-assistant:// is not correctly encoded, resulting in attacker-controlled content being injected into the error message displayed (when the injected content does not match an existing process). A determined attacker could leverage this to execute JavaScript in the context of the Electron application.
Attacker Value
Unknown

CVE-2021-44041

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.