Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 06 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gestioip
Gestioip gestioip |
|
| CPEs | cpe:2.3:a:gestioip:gestioip:3.5.7:*:*:*:*:*:*:* | |
| Vendors & Products |
Gestioip
Gestioip gestioip |
Wed, 15 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Tue, 14 Jan 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ip_import_acl_csv request in GestiolP v3.5.7 is vulnerable to Reflected XSS. When a user uploads an improperly formatted file, the content may be reflected in the HTML response, allowing the attacker to execute malicious scripts or exfiltrate data. | The ip_import_acl_csv request in GestioIP v3.5.7 is vulnerable to Reflected XSS. When a user uploads an improperly formatted file, the content may be reflected in the HTML response, allowing the attacker to execute malicious scripts or exfiltrate data. |
Tue, 14 Jan 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ip_import_acl_csv request in GestiolP v3.5.7 is vulnerable to Reflected XSS. When a user uploads an improperly formatted file, the content may be reflected in the HTML response, allowing the attacker to execute malicious scripts or exfiltrate data. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-15T19:11:06.155Z
Reserved: 2024-10-28T00:00:00.000Z
Link: CVE-2024-50859
Updated: 2025-01-15T19:11:00.733Z
Status : Analyzed
Published: 2025-01-14T22:15:27.453
Modified: 2025-06-06T15:40:42.347
Link: CVE-2024-50859
No data.
OpenCVE Enrichment
No data.