|
You are here |
www.thezdi.com | ||
| | | | |
www.zerodayinitiative.com
|
|
| | | | | [AI summary] A critical remote code execution vulnerability in SolarWinds Access Rights Manager allows attackers to execute arbitrary code with service account privileges if proper data validation is not enforced. | |
| | | | |
machevalia.blog
|
|
| | | | | [AI summary] A blog post discusses a remote code execution vulnerability in Ivanti's Endpoint Manager Cloud Appliance, detailing its exploitation and the author's bounty hunting activities. | |
| | | | |
www.cybereason.com
|
|
| | | | | A critical, unauthenticated remote code execution vulnerability, tracked as CVE-2025-32433, have been discovered in Erlang/OTP's SSH implementation. | |
| | | | |
blog.hrncirik.net
|
|
| | | CVE-2023-46214 is a Remote Code Execution (RCE) vulnerability found in Splunk Enterprise which was disclosed on November 16, 2023 in the Splunk security advisory SVD-2023-1104. The description of the vulnerability essentially states that Splunk Enterprise versions below 9.0.7 and 9.1.2 are not safely sanitizing user supplied extensible stylesheet language transformations (XSLT). | ||