Telemessage
by Smarsh
Standard maintenance is sufficient
Telemessage has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
25.0%
Public exploit code available
0.0%
Based on 8 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2025-48928 | 4.0 | 8.3% | Yes |
| CVE-2025-48927 | 5.3 | 7.6% | Yes |
| CVE-2025-48926 | 4.3 | 0.3% | — |
| CVE-2025-47730 | 4.8 | 0.2% | — |
| CVE-2025-48929 | 4.0 | 0.1% | — |
| CVE-2025-48925 | 4.3 | 0.1% | — |
| CVE-2025-48930 | 2.8 | 0.1% | — |
| CVE-2025-48931 | 3.2 | 0.0% | — |
11
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
11/50 · Low
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.