Threat Intelligence Report Archives | Cloud-Based Platform AIONCLOUD

[2025.02 Vulnerability Report] Delta Electronics DIAEnergie SQL Injection(CVE-2024-4547)

CVE-2024-4547 is a SQL injection vulnerability affecting Delta Electronics DIAEnergie v1.10.1.8610 and earlier. The issue lies in the CEBC.exe component that processes the ‘RecalculateScript’ message, which contains four fields separated by the ‘~’ character. An unauthenticated remote attacker could exploit this vulnerability by manipulating the fourth field to inject malicious SQL statements, which could lead Read more about [2025.02 Vulnerability Report] Delta Electronics DIAEnergie SQL Injection(CVE-2024-4547)[…]

[2025.02 Vulnerability Report] Apache OFbiz Pre-Auth Remote Code Execution

The vulnerability is a pre-authentication RCE vulnerability in Apache OFBiz, which allows an attacker to execute malicious code without an authentication process by exploiting an incorrect authentication process when processing a request for a particular URL. The vulnerability was patched in version 18.12.15 of Apache OFBiz, and AIWAF responds through the 2228: Apache OFBiz Remote Read more about [2025.02 Vulnerability Report] Apache OFbiz Pre-Auth Remote Code Execution[…]

[2025.01 Vulnerability Report] Ivanti Connect Secure & Policy Secure, ZTA Gateways Vulnerability

The vulnerability is a pre-authenticated RCE vulnerability in Ivanti’s Connect Secure, Policy Secure, and ZTA Gateway products, which attempts to exploit Buffer Overflow during IF-T/TLS protocol communication. The vulnerability is patched in 22.7R2.5 for Ivanti Connect Secure and Ivanti ZTA Gateway products, and AIWAF is continuously monitoring related vulnerabilities. 1. Overview Ivanti’s Connect Secure, Policy Read more about [2025.01 Vulnerability Report] Ivanti Connect Secure & Policy Secure, ZTA Gateways Vulnerability[…]

[2025.01 Vulnerability Report] WordPress CleanTalk Plugin Authentication Bypass Vulnerability (CVE-2024-10542, CVE-2024-10781)

The WordPress CleanTalk plugin currently has a serious authentication bypass vulnerability, identified as CVE-2024-10542 and CVE-2024-10781, which allows an unauthenticated attacker to bypass security measures and perform actions that would normally require valid authentication. In particular, an attacker could install and activate arbitrary plugins on a vulnerable site, potentially leading to remote code execution and Read more about [2025.01 Vulnerability Report] WordPress CleanTalk Plugin Authentication Bypass Vulnerability (CVE-2024-10542, CVE-2024-10781)[…]

[2024.12 Vulnerability Report] Critical RCE Vulnerability in jsonpath-plus (CVE-2024-21534)

Vulnerability report written by the TA team by analyzing “Critical RCE Vulnerability in jsonpath-plus (CVE-2024-21534)” CVE-2024-21534 is a remote code execution (RCE) vulnerability in the jsonpath-plus package due to improper input sanitization. This vulnerability can cause serious security threats to the system by allowing a malicious user to execute arbitrary code through input. Systems with Read more about [2024.12 Vulnerability Report] Critical RCE Vulnerability in jsonpath-plus (CVE-2024-21534)[…]

[2024.12 Vulnerability Report] Cleo Harmony, VLTrader and LexiCom File Read/Write Vulnerability

Vulnerability report written by the TA team by analyzing “Cleo Harmony, VLTrader and LexiCom File Read/Write Vulnerability” The vulnerability is a file read/write vulnerability in the software provided by Cleo that attempts to access or upload malicious files in the service using the software through a manipulated VLSync header. The vulnerabilities were patched in Harmony, Read more about [2024.12 Vulnerability Report] Cleo Harmony, VLTrader and LexiCom File Read/Write Vulnerability[…]

[2024.11 Vulnerability Report] Joomla! CMS Security Bypass (CVE-2023-23752)

Vulnerability report written by the TA team by analyzing “Joomla! CMS Security Bypass (CVE-2023-23752)” CVE-2023-23752 is a vulnerability found in Joomla! versions 4.0.0 through 4.2.7 that allows unauthorized access to web service endpoints due to incorrect access validation. This can lead to a risk that a malicious user can access the system without authentication or Read more about [2024.11 Vulnerability Report] Joomla! CMS Security Bypass (CVE-2023-23752)[…]

Scroll Up