Threat Actors Exploit a Critical Ivanti RCE Bug, Again
Threat Actors Exploit a Critical Ivanti RCE Bug, Again Source: Lobro via Alamy Stock PhotoA Chinese threat actor is once again exploiting Ivanti remote access devices at large.If you had a nickel for every high-profile vulnerability affecting Ivanti appli … Read more Published Date: Jan 10, 2025 (21 hours, 33 minutes ago) Vulnerabilities has been mentioned in […]
China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again
China’s UNC5337 Exploits a Critical Ivanti RCE Bug, Again Source: Lobro via Alamy Stock PhotoA Chinese threat actor is once again exploiting Ivanti remote access devices at large.If you had a nickel for every high-profile vulnerability affecting Ivanti appli … Read more Published Date: Jan 10, 2025 (1 hour, 41 minutes ago) Vulnerabilities has been mentioned in […]
CVE-2025-23113 – REDCap CSRF Logout Vulnerability
The following table lists the changes that have been made to the CVE-2025-23113 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2025-23112 – REDCap XSS Stored Injection
The following table lists the changes that have been made to the CVE-2025-23112 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2025-23111 – REDCap HTML Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-23111 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2025-23110 – REDCap Reflected Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-23110 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2024-9188 – Oracle WebLogic SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-9188 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2024-9134 – Apache Reporting SQL Injection Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2024-9134 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2024-9132 – “FortiOS Path Traversal”
The following table lists the changes that have been made to the CVE-2024-9132 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]
CVE-2024-47518 – Apache ETM SQL Injection
The following table lists the changes that have been made to the CVE-2024-47518 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 10, 2025 Action […]