该文章介绍了一个针对Ivanti Endpoint Manager Mobile 12.5.0.0的漏洞利用脚本,涉及两个关键漏洞:CVE-2025-4427(表达式注入导致RCE)和CVE-2025-4428(认证绕过)。脚本支持检测漏洞、执行命令以及绕过管理员权限,适用于版本低于2025.1的系统。
Internet intelligence firm GreyNoise reports that it has recorded a significant spike in scanning activity consisting of nearly 1,971 IP addresses probing Microsoft Remote Desktop Web Access and RDP Web Client authentication portals in unison, suggesting a coordinated reconnaissance campaign. [...]
A vulnerability was found in Trend Micro Apex One and Apex One as a Service. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the component LogServer. Performing manipulation results in link following.
This vulnerability is known as CVE-2024-52050. Attacking locally is a requirement. No exploit is available.
Upgrading the affected component is advised.
A vulnerability categorized as critical has been discovered in Trend Micro Apex One and Apex One as a Service. Affected by this issue is some unknown functionality of the component Engine. Executing manipulation can lead to link following.
This vulnerability is handled as CVE-2024-55631. It is possible to launch the attack on the local host. There is not any exploit available.
It is advisable to upgrade the affected component.
A vulnerability identified as critical has been detected in Trend Micro Apex One and Apex One as a Service. This affects an unknown part. The manipulation leads to origin validation error.
This vulnerability is uniquely identified as CVE-2024-55917. Local access is required to approach this attack. No exploit exists.
You should upgrade the affected component.