CVE-2024-13176 – “Apache ECDSA Timing Key Disclosure Attack”

The following table lists the changes that have been made to the CVE-2024-13176 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]

CVE-2025-0479 – CP Plus Router Cookie Flag Insecure Handling Remote Information Disclosure

The following table lists the changes that have been made to the CVE-2025-0479 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January] As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware an … Read more Published Date: Jan 20, 2025 (56 minutes ago) Vulnerabilities has been […]

Yubico Warns of 2FA Security Flaw in pam-u2f for Linux and macOS Users

Yubico Warns of 2FA Security Flaw in pam-u2f for Linux and macOS Users Yubico has released a security advisory, YSA-2025-01, which highlighted a vulnerability within the software module that supports two-factor authentication (2FA) for Linux and macOS platforms. This iss … Read more Published Date: Jan 20, 2025 (1 hour, 33 minutes ago) Vulnerabilities has been mentioned […]

CVE-2025-0590 – Vulnerability in Carlcare (Mobile App) Information Disclosure

The following table lists the changes that have been made to the CVE-2025-0590 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 907edf6c-bf03-423e-ab1a-8da27e1aa1ea Jan. 20, 2025 Action […]

CVE-2025-0586 – Enrich Technology a+HRD Insecure Deserialization Vulnerability

The following table lists the changes that have been made to the CVE-2025-0586 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]

CVE-2025-0584 – aEnrich Technology aHRD Server-Side Request Forgery (SSRF)

The following table lists the changes that have been made to the CVE-2025-0584 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]

CVE-2025-0585 – aEnrich Technology a+HRD SQL Injection

The following table lists the changes that have been made to the CVE-2025-0585 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]

CVE-2025-0582 – iSourcecode Farm Management System PHP Unrestricted File Upload Vulnerability

The following table lists the changes that have been made to the CVE-2025-0582 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 20, 2025 Action […]