Clone2Leak attacks exploit Git flaws to steal credentials

Clone2Leak attacks exploit Git flaws to steal credentials A set of three distinct but related attacks, dubbed ‘Clone2Leak,’ can leak credentials by exploiting how Git and its credential helpers handle authentication requests. The attack can compromise passwo … Read more Published Date: Jan 27, 2025 (3 hours, 24 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2024-45598 – Cacti Authentication Bypass Vulnerability

The following table lists the changes that have been made to the CVE-2024-45598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2024-38325 – IBM Storage Defender Information Disclosure

The following table lists the changes that have been made to the CVE-2024-38325 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2024-38320 – IBM Storage Protect Weak Cryptography Vulnerability

The following table lists the changes that have been made to the CVE-2024-38320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2024-37527 – IBM OpenPages with Watson Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2024-37527 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2024-22316 – IBM Sterling File Gateway Unauthorized Access Vulnerability

The following table lists the changes that have been made to the CVE-2024-22316 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2023-52292 – IBM Sterling File Gateway Stored Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2023-52292 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2023-47159 – IBM Sterling File Gateway Authenticated User Username Enumeration

The following table lists the changes that have been made to the CVE-2023-47159 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]

CVE-2025-24747 – Houzez.co Houzez Missing Authorization Vulnerability

The following table lists the changes that have been made to the CVE-2025-24747 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]