cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2025-0282,https://securityvulnerability.io/vulnerability/CVE-2025-0282,Stack-Based Buffer Overflow in Ivanti Connect Secure and Policy Secure,"A stack-based buffer overflow vulnerability exists in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways, prior to designated versions. This flaw allows a remote unauthenticated attacker to execute arbitrary code on the affected systems, posing significant risks to security and data integrity. Users are advised to upgrade to the latest versions of these products to mitigate potential exploitation.",Ivanti,"Connect Secure,Policy Secure,Neurons For Zta Gateways",9,CRITICAL,0.019460000097751617,true,true,true,true,true,true,true,2025-01-08T22:15:09.386Z,27535 CVE-2024-49415,https://securityvulnerability.io/vulnerability/CVE-2024-49415,Remote Arbitrary Code Execution Vulnerability in libSaped.so Prior to SMR Dec-2024 Release 1,"The libsaped.so component in Samsung mobile devices contains an out-of-bound write vulnerability that enables remote attackers to exploit the issue and execute arbitrary code on affected systems. This vulnerability, which impacts versions prior to the SMR Dec-2024 Release 1, poses a significant security risk, necessitating immediate attention from users and administrators to mitigate potential threats.",Samsung,Samsung Devices,8.1,HIGH,0.0004299999854993075,false,false,false,false,,true,false,2024-12-03T05:47:58.657Z,4264 CVE-2024-41713,https://securityvulnerability.io/vulnerability/CVE-2024-41713,Mitel NuPoint Unified Messaging (NPM) Vulnerability: Path Traversal Attack,"A vulnerability exists within the NuPoint Unified Messaging component of Mitel MiCollab, where insufficient input validation may result in a path traversal attack. An unauthenticated attacker who successfully exploits this vulnerability could gain unauthorized access, potentially allowing them to view, corrupt, or delete sensitive user data and critical system configurations. Organizations using affected versions should prioritize securing their systems against potential exploits to mitigate the risk of data breaches.",Mitel,Micollab,9.1,CRITICAL,0.9515299797058105,true,true,false,true,,true,false,2024-10-21T21:15:00.000Z,3566 CVE-2024-8474,https://securityvulnerability.io/vulnerability/CVE-2024-8474,Profile Configuration Exposure in OpenVPN Connect,"An issue in OpenVPN Connect prior to version 3.5.0 allows the storage of the private key in clear text within the application logs. This exposure poses a significant risk, as an unauthorized actor gaining access to these logs could potentially decrypt VPN traffic, undermining the confidentiality and integrity of the communications. It is crucial for users to ensure they are using the latest version of the software to mitigate this risk.",Openvpn,Openvpn Connect,,,0.0004299999854993075,false,false,false,false,false,true,false,2025-01-06T14:33:26.129Z,3422 CVE-2024-49113,https://securityvulnerability.io/vulnerability/CVE-2024-49113,Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability,"The Windows Lightweight Directory Access Protocol (LDAP) Denial of Service vulnerability can cause significant disruptions in the availability of directory services. This issue arises from insufficient handling of certain types of LDAP requests, leading to scenarios where a targeted denial of service attack may disrupt normal operations. Organizations utilizing affected versions of Windows Server and Windows operating systems should be aware of the potential impact on their directory services operations and consider implementing recommended security updates to mitigate risks.",Microsoft,"Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows Server 2022,Windows 10 Version 21h2,Windows 11 Version 22h2,Windows 10 Version 22h2,Windows Server 2025 (server Core Installation),Windows 11 Version 22h3,Windows 11 Version 23h2,Windows Server 2022, 23h2 Edition (server Core Installation),Windows 11 Version 24h2,Windows Server 2025,Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.5,HIGH,0.0004600000102072954,false,false,false,false,,true,false,2024-12-12T02:04:00.000Z,5680 CVE-2024-7014,https://securityvulnerability.io/vulnerability/CVE-2024-7014,Malicious Apps Disguised as Videos Attack Telegram for Android,"The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications disguised as video files. This exploit primarily affects Telegram versions 10.14.4 and earlier, posing a significant risk to users. When these deceptive videos are opened, they can execute harmful actions, potentially compromising user data and device integrity. It is crucial for users of affected versions to update their applications to the latest release to mitigate this security risk.",Android,Telegram For Android,,,0.0004299999854993075,false,false,false,false,,true,false,2024-07-23T09:55:42.837Z,2074