Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2022-33862
Disclosure Date: November 25, 2024 (last updated January 05, 2025)
IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could
lead attackers to identify and access vulnerable systems.
0
Attacker Value
Unknown
CVE-2022-33861
Disclosure Date: November 25, 2024 (last updated January 05, 2025)
IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a
way that causes it to accept invalid data.
0
Attacker Value
Unknown
CVE-2021-23283
Disclosure Date: March 01, 2022 (last updated February 23, 2025)
Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP software.
0
Attacker Value
Unknown
CVE-2021-23288
Disclosure Date: February 08, 2022 (last updated February 23, 2025)
The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent Power Protector versions prior to 1.69.
0
Attacker Value
Unknown
CVE-2021-23276
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.
0
Attacker Value
Unknown
CVE-2021-23278
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
0
Attacker Value
Unknown
CVE-2021-23280
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
0
Attacker Value
Unknown
CVE-2021-23277
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
0
Attacker Value
Unknown
CVE-2021-23279
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
0