Threat Actors Exploit a Critical Ivanti RCE Bug, Again

Threat Actors Exploit a Critical Ivanti RCE Bug, Again Source: Lobro via Alamy Stock PhotoA Chinese threat actor is once again exploiting Ivanti remote access devices at large.If you had a nickel for every high-profile vulnerability affecting Ivanti appli … Read more Published Date: Jan 10, 2025 (21 hours, 33 minutes ago) Vulnerabilities has been mentioned in […]

China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again

China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again Source: Lobro via Alamy Stock PhotoA Chinese threat actor is once again exploiting Ivanti remote access devices at large.If you had a nickel for every high-profile vulnerability affecting Ivanti appli … Read more Published Date: Jan 10, 2025 (1 hour, 41 minutes ago) Vulnerabilities has been mentioned in […]

CVE-2025-23113 – REDCap CSRF Logout Vulnerability

The following table lists the changes that have been made to the CVE-2025-23113 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2025-23112 – REDCap XSS Stored Injection

The following table lists the changes that have been made to the CVE-2025-23112 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2025-23111 – REDCap HTML Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-23111 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2025-23110 – REDCap Reflected Cross-Site Scripting

The following table lists the changes that have been made to the CVE-2025-23110 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2024-9188 – Oracle WebLogic SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2024-9188 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2024-9134 – Apache Reporting SQL Injection Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2024-9134 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2024-9132 – “FortiOS Path Traversal”

The following table lists the changes that have been made to the CVE-2024-9132 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]

CVE-2024-47518 – Apache ETM SQL Injection

The following table lists the changes that have been made to the CVE-2024-47518 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]