CVE-2025-24969 – iTop Information Disclosure

The following table lists the changes that have been made to the CVE-2025-24969 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-24785 – iTop PHP Error Remote Crash Vulnerability

The following table lists the changes that have been made to the CVE-2025-24785 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-24026 – iTop Regular Expression Denial of Service (ReDoS) Vulnerability

The following table lists the changes that have been made to the CVE-2025-24026 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-24021 – iTop Unauthenticated Object Field Modification Vulnerability

The following table lists the changes that have been made to the CVE-2025-24021 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-24022 – iTop Server Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-24022 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2024-56157 – iTop Cross-Site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2024-56157 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2024-52601 – iTop Unauthenticated Information Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2024-52601 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2024-10865 – OpenText Advance Authentication Cross-site Scripting Vulnerability

The following table lists the changes that have been made to the CVE-2024-10865 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2024-10864 – OpenText Advance Authentication SQL Injection

The following table lists the changes that have been made to the CVE-2024-10864 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] May. 14, 2025 Action […]

CVE-2025-47436 – Apache ORC Heap-based Buffer Overflow Vulnerability

Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, […]