XE Group Shifts From Card Skimming to Supply Chain Attacks

XE Group Shifts From Card Skimming to Supply Chain Attacks Source: HakanGider via ShutterstockA cybercrime group long associated with credit card theft has expanded into targeted information stealing from supply chain organizations in the manufacturing and di … Read more Published Date: Feb 10, 2025 (2 hours, 42 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-1156 – Pix Software Vivaz SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1156 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]

CVE-2025-1157 – Allims lab.online Model File Processing SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]

CVE-2025-1002 – MicroDicom DICOM Viewer TLS Certificate Verification Bypass

The following table lists the changes that have been made to the CVE-2025-1002 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]

CVE-2025-24016 – Wazuh DistributedAPI Remote Code Execution Vulnerability

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages to inject […]

CVE-2025-1155 – Webkul QloApps Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2025-1155 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 10, 2025 Action Type […]

CVE-2025-1154 – Xxyopen Novel SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1154 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]

CVE-2024-57178 – Apache Stock-Forecaster SQL Injection

The following table lists the changes that have been made to the CVE-2024-57178 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 10, 2025 Action […]

CVE-2024-57177 – “Couch-Auth Host Header Injection SSTI Vulnerability”

The following table lists the changes that have been made to the CVE-2024-57177 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0 Feb. 10, 2025 Action Type […]

Apple waarschuwt voor iOS-lek gebruikt bij ‘zeer geraffineerde aanval’

Apple waarschuwt voor iOS-lek gebruikt bij ‘zeer geraffineerde aanval’ Apple waarschuwt voor een kwetsbaarheid in iOS en iPadOS die volgens het techbedrijf bij een ‘zeer geraffineerde aanval’ tegen bepaalde specifieke personen is gebruikt. Het beveiligingslek (CVE-2025-2 … Read more Published Date: Feb 10, 2025 (2 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-24200