{"uuid": "b8688e2c-31ea-45a7-82de-e569a16a5a14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10727", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8222", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10727\n\ud83d\udd25 CVSS Score: 3.5 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.\n\ud83d\udccf Published: 2025-03-20T10:10:58.253Z\n\ud83d\udccf Modified: 2025-03-20T15:53:17.600Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/259eed22-4d6f-4229-92e5-04674f302d5d\n2. https://github.com/phpipam/phpipam/commit/c1697bb6c4e4a6403d69c0868e1eb1040f98b731", "creation_timestamp": "2025-03-20T16:18:10.000000Z"}