Overview
Description
An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
Description
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
- Fortinet
- FortiClientEMS
06 Feb 2026
Published
31 Mar 2026
Updated
CVSS v3.1
CRITICAL (9.1)
EPSS
0.07%
KEV
Description
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
Statistics
- 1 Post
Last activity: 9 hours ago
Bluesky
Overview
- Grafana
- Grafana Enterprise
27 Mar 2026
Published
02 Apr 2026
Updated
CVSS v3.1
CRITICAL (9.1)
EPSS
0.10%
KEV
Description
A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path.
Only instances with the sqlExpressions feature toggle enabled are vulnerable.
Only instances in the following version ranges are affected:
- 11.6.0 (inclusive) to 11.6.14 (exclusive): 11.6.14 has the fix. 11.5 and below are not affected.
- 12.0.0 (inclusive) to 12.1.10 (exclusive): 12.1.10 has the fix. 12.0 did not receive an update, as it is end-of-life.
- 12.2.0 (inclusive) to 12.2.8 (exclusive): 12.2.8 has the fix.
- 12.3.0 (inclusive) to 12.3.6 (exclusive): 12.3.6 has the fix.
- 12.4.0 (inclusive) to 12.4.2 (exclusive): 12.4.2 has the fix. 13.0.0 and above also have the fix: no v13 release is affected.
Statistics
- 1 Post
Last activity: 18 hours ago
Overview
Description
A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MFT allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.
Statistics
- 1 Post
Last activity: 4 hours ago
Overview
- IBM
- WebSphere Application Server
08 Dec 2025
Published
09 Dec 2025
Updated
CVSS v3.1
MEDIUM (5.4)
EPSS
0.04%
KEV
Description
IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 25.0.0.12 are affected by cross-site scripting due to improper validation of user-supplied input. An attacker could exploit this vulnerability by using a specially crafted URL to redirect the user to a malicious site.
Statistics
- 2 Posts
Last activity: 11 hours ago
Fediverse
[RSS] Security Bulletin: IBM i is Affected by Use of Hard-coded Cryptographic Key, Cross-site Scripting, and Prototype Pollution Vulnerabilities in IBM WebSphere Application Server Liberty [CVE-2025-14923, CVE-2025-12635, CVE-2026-29063]
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...
Overview
- IBM
- WebSphere Application Server - Liberty
03 Mar 2026
Published
04 Mar 2026
Updated
CVSS v3.1
MEDIUM (4.7)
EPSS
0.03%
KEV
Description
IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.2 IBM WebSphere Application Server Liberty could provide weaker than expected security when using the Security Utility when administering security settings.
Statistics
- 2 Posts
Last activity: 11 hours ago
Fediverse
[RSS] Security Bulletin: IBM i is Affected by Use of Hard-coded Cryptographic Key, Cross-site Scripting, and Prototype Pollution Vulnerabilities in IBM WebSphere Application Server Liberty [CVE-2025-14923, CVE-2025-12635, CVE-2026-29063]
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...
Overview
- immutable-js
- immutable-js
06 Mar 2026
Published
06 Mar 2026
Updated
CVSS v4.0
HIGH (8.7)
EPSS
0.06%
KEV
Description
Immutable.js provides many Persistent Immutable data structures. Prior to versions 3.8.3, 4.3.7, and 5.1.5, Prototype Pollution is possible in immutable via the mergeDeep(), mergeDeepWith(), merge(), Map.toJS(), and Map.toObject() APIs. This issue has been patched in versions 3.8.3, 4.3.7, and 5.1.5.
Statistics
- 2 Posts
Last activity: 11 hours ago
Fediverse
[RSS] Security Bulletin: IBM i is Affected by Use of Hard-coded Cryptographic Key, Cross-site Scripting, and Prototype Pollution Vulnerabilities in IBM WebSphere Application Server Liberty [CVE-2025-14923, CVE-2025-12635, CVE-2026-29063]
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...
https://www.ibm.com/support/pages/node/7268448?myns=swgother&mynp=OCSSTS2D&mynp=OCSWG60&mynp=OCSSKWKM&mynp=OCSSB23CE&mynp=OCSS9QQS&mynp=OCSSC5L9&mync=A&cm_sp=swgother-_-OCSSTS2D-OCSWG60-OCSSKWKM-OCSSB23CE-OCSS9QQS-OCSSC5L9-_-A
That hard-coded key shouldn%27t be hard to find...