Clone2Leak attacks exploit Git flaws to steal credentials
Clone2Leak attacks exploit Git flaws to steal credentials A set of three distinct but related attacks, dubbed ‘Clone2Leak,’ can leak credentials by exploiting how Git and its credential helpers handle authentication requests. The attack can compromise passwo … Read more Published Date: Jan 27, 2025 (3 hours, 24 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2024-45598 – Cacti Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2024-45598 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2024-38325 – IBM Storage Defender Information Disclosure
The following table lists the changes that have been made to the CVE-2024-38325 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2024-38320 – IBM Storage Protect Weak Cryptography Vulnerability
The following table lists the changes that have been made to the CVE-2024-38320 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2024-37527 – IBM OpenPages with Watson Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-37527 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2024-22316 – IBM Sterling File Gateway Unauthorized Access Vulnerability
The following table lists the changes that have been made to the CVE-2024-22316 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2023-52292 – IBM Sterling File Gateway Stored Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2023-52292 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2023-47159 – IBM Sterling File Gateway Authenticated User Username Enumeration
The following table lists the changes that have been made to the CVE-2023-47159 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]
CVE-2025-24783 – Apache Cocoon Pseudo-Random Number Generator (PRNG) Unpredictable Seed Guessability vulnerability.
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon. This issue affects Apache Cocoon: all versions. When a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have […]
CVE-2025-24747 – Houzez.co Houzez Missing Authorization Vulnerability
The following table lists the changes that have been made to the CVE-2025-24747 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 27, 2025 Action […]