6.9
CVE-2025-21095 - Keysight Ixia Vision Product Family Path Traversal
Path traversal may lead to arbitrary file download. The score without least privilege principle violation is as calculated below. In combination with other issues it may facilitate further compromise of the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
6.9
CVE-2025-24521 - Keysight Ixia Vision Product Family Improper Restriction of XML External Entity Reference
External XML entity injection allows arbitrary download of files. The score without least privilege principle violation is as calculated below. In combination with other issues it may facilitate further compromise of the device. Remediation in Version 6.8.0, release date: 01-Mar-25.
2.7
CVE-2025-22212 - Extension - tassos.gr - SQL injection in Convert Forms component version 1.0.0-1.0.0 - 4.4.9 for Joβ¦
A SQL injection vulnerability in the Convert Forms component versions 1.0.0-1.0.0 - 4.4.9 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the submission management area in backend.
8.6
CVE-2025-24494 - Keysight Ixia Vision Product Family Path Traversal
Path traversal may allow remote code execution using privileged account (requires device admin account, cannot be performed by a regular user). In combination with the 'Upload' functionality this could be used to execute an arbitrary script or possibly an uploaded binary. Remediation in Versionβ¦
6.9
CVE-2025-1714 - Username Enumeration in Gliffy
Lack of Rate Limiting in Sign-up workflow in Perforce Gliffy prior to version 4.14.0-7Β on Gliffy online allows attacker to enumerate valid user emails and potentially DOS the server
10
CVE-2024-12799 - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in OpenText Identity Manager Advanced Edition on Windows, Linux, 64 bit allows Privilege Abuse. This vulnerability could allow an authenticated user to obtain higher privileged userβs sensitive information via crafted payload. This issue affects Iβ¦
9.8
CVE-2024-13147 - SQLi in Merkur Software's B2B Login Panel
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Merkur Software B2B Login Panel allows SQL Injection.This issue affects B2B Login Panel: before 15.01.2025.
9.8
CVE-2024-12097 - SQLi in Boceksoft Informatics' E-Travel
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Boceksoft Informatics E-Travel allows SQL Injection.This issue affects E-Travel: before 15.12.2024.
7.6
CVE-2024-11216 - Broken Access Control in PozitifIK's Pik Online
Authorization Bypass Through User-Controlled Key, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in PozitifIK Pik Online allows Account Footprinting, Session Hijacking.This issue affects Pik Online: before 3.1.5.
5.4
CVE-2024-12650 - Wago: Vulnerability in libwagosnmp
An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.