Lucene search

K
GestioipGestioip

5 matches found

CVE
CVE
added 2025/01/14 10:15 p.m.56 views

CVE-2024-48760

An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.

9.8CVSS7.8AI score0.02185EPSS
CVE
CVE
added 2025/01/14 10:15 p.m.44 views

CVE-2024-50857

The ip_do_job request in GestioIP v3.5.7 is vulnerable to Cross-Site Scripting (XSS). It allows data exfiltration and enables CSRF attacks. The vulnerability requires specific user permissions within the application to exploit successfully.

4.8CVSS6AI score0.00182EPSS
CVE
CVE
added 2025/01/14 10:15 p.m.39 views

CVE-2024-50861

The ip_mod_dns_key_form.cgi request in GestioIP v3.5.7 is vulnerable to Stored XSS. An attacker can inject malicious code into the "TSIG Key" field, which is saved in the database and triggers XSS when viewed, enabling data exfiltration and CSRF attacks.

6.1CVSS5.8AI score0.00225EPSS
CVE
CVE
added 2025/01/14 10:15 p.m.38 views

CVE-2024-50859

The ip_import_acl_csv request in GestioIP v3.5.7 is vulnerable to Reflected XSS. When a user uploads an improperly formatted file, the content may be reflected in the HTML response, allowing the attacker to execute malicious scripts or exfiltrate data.

4.8CVSS6.5AI score0.00213EPSS
CVE
CVE
added 2025/01/14 10:15 p.m.36 views

CVE-2024-50858

Multiple endpoints in GestioIP v3.5.7 are vulnerable to Cross-Site Request Forgery (CSRF). An attacker can execute actions via the admin's browser by hosting a malicious URL, leading to data modification, deletion, or exfiltration.

8.8CVSS6.7AI score0.00106EPSS