CVE-2026-22619
- EPSS 0.01%
- Veröffentlicht 16.04.2026 05:26:48
- Zuletzt bearbeitet 17.04.2026 15:38:09
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest versi...
CVE-2026-22618
- EPSS 0.01%
- Veröffentlicht 16.04.2026 05:11:06
- Zuletzt bearbeitet 17.04.2026 15:38:09
A security misconfiguration was identified in Eaton Intelligent Power Protector (IPP), where an HTTP response header was set with an insecure attribute, potentially exposing users to web‑based attacks. This security issue has been fixed in the latest...
CVE-2026-22617
- EPSS 0.01%
- Veröffentlicht 16.04.2026 05:02:07
- Zuletzt bearbeitet 17.04.2026 15:38:09
Eaton Intelligent Power Protector (IPP) uses an insecure cookie configuration, which could allow a network‑based attacker to intercept the cookie and exploit it through a man‑in‑the‑middle attack. This security issue has been fixed in the latest vers...
CVE-2026-22616
- EPSS 0.05%
- Veröffentlicht 16.04.2026 04:54:48
- Zuletzt bearbeitet 17.04.2026 15:38:09
Eaton Intelligent Power Protector (IPP) software allows repeated authentication attempts against the web interface login page due to insufficient rate‑limiting controls. This security issue has been fixed in the latest version of Eaton IPP which is a...
CVE-2022-33861
- EPSS 0.04%
- Veröffentlicht 25.11.2024 09:15:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a way that causes it to accept invalid data.
CVE-2022-33862
- EPSS 0.03%
- Veröffentlicht 25.11.2024 09:15:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems.
CVE-2021-23283
- EPSS 0.2%
- Veröffentlicht 19.04.2022 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:51:29
Eaton Intelligent Power Protector (IPP) prior to version 1.69 is vulnerable to stored Cross Site Scripting. The vulnerability exists due to insufficient validation of user input and improper encoding of the output for certain resources within the IPP...
CVE-2021-23288
- EPSS 0.07%
- Veröffentlicht 01.04.2022 23:15:08
- Zuletzt bearbeitet 21.11.2024 05:51:30
The vulnerability exists due to insufficient validation of input from certain resources by the IPP software. The attacker would need access to the local Subnet and an administrator interaction to compromise the system. This issue affects: Intelligent...
CVE-2021-23276
- EPSS 0.1%
- Veröffentlicht 13.04.2021 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:51:29
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to ...
- EPSS 0.43%
- Veröffentlicht 13.04.2021 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:51:29
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scri...