Search
News & Updates
A Shift From Browsers to Enterprise Targets: 2024 Zero-Day Exploitation Analysis
Google’s Threat Intelligence Group (GTIG) released its annual analysis of zero-day exploitation, detailing how 2024 saw attackers increasingly target enterprise software and infrastructure over tradit …
Read more
Published Date:
Apr 30, 2025 (9 hours, 15 minutes ago)
Vulnerabilities has been mentioned in this article.
CVE-2024-44309
CVE-2024-44308
CVE-2024-49039
CVE ID : CVE-2025-46557
Published : April 30, 2025, 7:15 p.m. | 3 hours, 53 minutes ago
Description : XWiki is a generic wiki platform. In versions starting from 15.3-rc-1 to before 15.10.14, from 16.0.0-rc-1 to before 16.4.6, and from 16.5.0-rc-1 to before 16.10.0-rc-1, a user who can access pages located in the XWiki space (by default, anyone) can access the page XWiki.Authentication.Administration and (unless an authenticator is set in xwiki.cfg) switch to another installed authenticator. Note that, by default, there is only one authenticator available (Standard XWiki Authenticator). So, if no authenticator extension was installed, it’s not really possible to do anything for an attacker. Also, in most cases, if an SSO authenticator is installed and utilized (like OIDC or LDAP for example), the worst an attacker can do is break authentication by switching back to the standard authenticator (that’s because it’s impossible to login to a user which does not have a stored password, and that’s usually what SSO authenticator produce). This issue has been patched in versions 15.10.14, 16.4.6, and 16.10.0-rc-1.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2024-13943
Published : April 30, 2025, 8:15 p.m. | 2 hours, 54 minutes ago
Description : Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the QCMAP_ConnectionManager component. An attacker can abuse the service to assign LAN addresses to the WWAN. An attacker can leverage this vulnerability to access network services that were only intended to be exposed to the internal LAN. Was ZDI-CAN-23199.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
CVE ID : CVE-2024-6029
Published : April 30, 2025, 8:15 p.m. | 2 hours, 54 minutes ago
Description : Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more…
Artificial Intelligence
MIT Professor Markus J. Buehler has been named the recipient of the 2025 Washington Award, one…
Our 201st episode with a summary and discussion of last week’s big AI news!Recorded on…
For over 30 years, science photographer Felice Frankel has helped MIT professors, researchers, and students…
Imagine that a robot is helping you clean the dishes. You ask it to grab…