phpIPAM version 1.6 is vulnerable to reflected cross-site scripting (XSS) due to improper sanitization of user-supplied data in the 'closeClass' parameter of the 'popup.php' script. An attacker can exploit this by injecting malicious scripts into the parameter, leading to script execution in the context of the victim's browser.
The Intelight X-1L Traffic controller Maxtime 1.9.6 allows remote attackers to bypass authentication to gain full control of traffic controllers, modify traffic light sequences, trigger denial of service, and cause traffic congestion. This vulnerability exists in the web-based UI of Traffic Controllers running version 1.9.x firmware due to lack of authentication before allowing access to critical functionality.
The OpenPanel version 0.3.4 is vulnerable to directory traversal. By exploiting this vulnerability, an attacker can traverse the directories outside the intended location and gain unauthorized access to sensitive files. This vulnerability has been assigned CVE-2024-53537.
The exploit allows an attacker to enumerate valid usernames on Webmin Usermin version 2.100. By sending requests to the password change endpoint with different usernames, the attacker can identify existing user accounts based on the server's responses.
The MagnusSolution magnusbilling 7.3.0 software is vulnerable to command injection. An attacker can exploit this vulnerability by injecting malicious commands through a specific URL, potentially leading to unauthorized command execution.
Drupal 11.x-dev Full Path Disclosure Vulnerability: core/authorize.php allows Full Path Disclosure even when error logging is None if the value of hash_salt is file_get_contents of a file that does not exist.
The WordPress plugin 'Backup and Staging by WP Time Capsule' up to version 1.21.16 allows unauthenticated attackers to upload arbitrary files via the upload.php endpoint, potentially leading to remote code execution by uploading and executing a PHP file directly from a specific directory.
The Ivanti Connect Secure version 22.7R2.5 is vulnerable to remote code execution. By crafting a specific payload, an attacker can exploit this vulnerability to execute arbitrary commands on the target system. This vulnerability has been assigned the CVE-2025-0282.
The CodeCanyon RISE CRM 3.7.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending crafted SQL queries to the target system, potentially gaining unauthorized access to the database.
The GestioIP version 3.5.7 is vulnerable to remote command execution. An attacker can exploit this vulnerability to execute arbitrary commands on the target server. This exploit is identified by CVE-2024-48760.