CVE-2025-24969 – iTop Information Disclosure
The following table lists the changes that have been made to the CVE-2025-24969 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-24785 – iTop PHP Error Remote Crash Vulnerability
The following table lists the changes that have been made to the CVE-2025-24785 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-24026 – iTop Regular Expression Denial of Service (ReDoS) Vulnerability
The following table lists the changes that have been made to the CVE-2025-24026 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-24021 – iTop Unauthenticated Object Field Modification Vulnerability
The following table lists the changes that have been made to the CVE-2025-24021 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-24022 – iTop Server Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-24022 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-56157 – iTop Cross-Site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-56157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-52601 – iTop Unauthenticated Information Disclosure Vulnerability
The following table lists the changes that have been made to the CVE-2024-52601 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-10865 – OpenText Advance Authentication Cross-site Scripting Vulnerability
The following table lists the changes that have been made to the CVE-2024-10865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2024-10864 – OpenText Advance Authentication SQL Injection
The following table lists the changes that have been made to the CVE-2024-10864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]
CVE-2025-47436 – Apache ORC Heap-based Buffer Overflow Vulnerability
Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, […]