PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)

PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159) A proof-of-concept (PoC) exploit for four critical Ivanti Endpoint Manager vulnerabilities has been released by Horizon3.ai researchers. The vulnerabilities – CVE-2024-10811, CVE-2024-13161, CVE-2024- … Read more Published Date: Feb 24, 2025 (2 hours, 13 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-13161 CVE-2024-13160 CVE-2024-13159 CVE-2024-10811 CVE-2024-29847 […]

CVE-2025-1488 – Microsoft 365 Graph Mailer Open Redirect Vulnerability in WPO365

The following table lists the changes that have been made to the CVE-2025-1488 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]

CVE-2023-52926 – Linux Kernel IORING Op Read Use-After-Free

The following table lists the changes that have been made to the CVE-2023-52926 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67 Feb. 24, 2025 Action […]

Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack

Wireshark 4.4.4 Released With Fix for Vulnerability That Triggers DoS Attack The Wireshark Foundation has released version 4.4.4 of its widely used network protocol analyzer, addressing a high-severity vulnerability that could allow attackers to trigger denial-of-service (DoS) … Read more Published Date: Feb 24, 2025 (1 hour, 26 minutes ago) Vulnerabilities has been mentioned in this article. […]

Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware

Hackers Exploited Confluence Server Vulnerability To Deploy LockBit Ransomware A sophisticated ransomware attack leveraging a critical Atlassian Confluence vulnerability (CVE-2023-22527, CVSS 10.0) has been uncovered, culminating in the deployment of LockBit Black ransomware acr … Read more Published Date: Feb 24, 2025 (1 hour, 37 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-22527

CVE-2025-25279 – Mattermost File Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-25279 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]

CVE-2025-24526 – Mattermost Channel Export Access Control Vulnerability

The following table lists the changes that have been made to the CVE-2025-24526 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]

CVE-2025-20051 – Mattermost File Disclosure Vulnerability

The following table lists the changes that have been made to the CVE-2025-20051 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]

CVE-2025-24490 – Mattermost SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-24490 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Feb. 24, 2025 Action […]