LIVE THREAT FEED

Security Advisory Pulse

Real-time monitoring of global vulnerabilities, zero-day exploits, and infrastructure-wide threat intelligence.

Network Status: Scanning
Vulnerability ID
CVE-2024-21413
Severity Score
9.8Critical

Microsoft Outlook Remote Code Execution (Moniker Link)

A critical vulnerability in Microsoft Outlook allows an attacker to bypass security features and execute arbitrary code via a malicious "Moniker Link".

Recommended Mitigation

Update Microsoft Office to the latest version immediately. Disable the parsing of Moniker Links in Outlook via registry keys.

Vulnerability ID
CVE-2024-21410
Severity Score
9.8Critical

Microsoft Exchange Server Privilege Escalation

An elevation of privilege vulnerability in Microsoft Exchange Server that could allow an attacker to perform NTLM relay attacks.

Recommended Mitigation

Apply the Microsoft Exchange Server February 2024 Security Update. Ensure Extended Protection for Authentication is enabled.

Vulnerability ID
CVE-2024-21351
Severity Score
7.6High

Windows SmartScreen Security Feature Bypass

A vulnerability in Windows SmartScreen allows an attacker to bypass security warnings when opening malicious files.

Recommended Mitigation

Apply the Windows February 2024 Security Updates.

Vulnerability ID
CVE-2023-4863
Severity Score
8.8Critical

Heap Buffer Overflow in libwebp

A critical heap buffer overflow in the libwebp library affects many browsers and applications using the WebP image format.

Recommended Mitigation

Update all browsers (Chrome, Firefox, Edge) and applications using libwebp to their latest versions.