Rancher Releases Patch for CVE-2024-22031 Privilege Escalation Vulnerability
Rancher Releases Patch for CVE-2024-22031 Privilege Escalation Vulnerability The SUSE Rancher Security Team has issued a security advisory regarding a newly disclosed vulnerability affecting multiple versions of Rancher, the popular open-source container management platform. T … Read more Published Date: Apr 30, 2025 (1 hour, 25 minutes ago) Vulnerabilities has been mentioned in this article.
CVE-2025-46552 – GitHub KHC-INVITATION-AUTOMATION Unauthenticated User Data Disclosure
The following table lists the changes that have been made to the CVE-2025-46552 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 29, 2025 Action […]
CVE-2025-3358 – CVE-2022-36337 Oracle WebLogic Server Cross-Site Scripting
The following table lists the changes that have been made to the CVE-2025-3358 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 29, 2025 Action Type […]
CVE-2025-29906 – Finit TTY Authentication Bypass Vulnerability
The following table lists the changes that have been made to the CVE-2025-29906 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Apr. 29, 2025 Action […]
CVE-2023-4377 – Apache Struts Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2023-4377 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. CVE Rejected by [email protected] Apr. 29, 2025 Action Type […]