Report Name: pt_trend_cve_combined2024 report
Generated: 2024-12-04 18:21:31

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
GitLab0.911GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application
Windows Kernel0.9213Windows Kernel
nftables0.911nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames
Juniper JunOS0.811Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices
Microsoft Exchange0.8112Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
PHP0.811PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
Windows Ancillary Function Driver for WinSock0.811Windows component
Windows CSC Service0.811Windows component
Windows Common Log File System Driver0.811Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs
Windows DWM Core Library0.811Windows component
Windows Error Reporting Service0.811Windows component
Windows Installer0.811Windows component
Windows Kernel-Mode Driver0.811Windows component
Windows MSHTML Platform0.8235Windows component
Windows Mark of the Web0.822Windows component
Windows Power Dependency Coordinator0.811Windows component
Windows Print Spooler0.811Windows component
Windows Remote Desktop Licensing Service0.811Windows component
Windows SmartScreen0.811SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge
Windows Task Scheduler0.811Windows component
Atlassian Confluence0.7112Confluence is a web-based corporate wiki
Ivanti Connect Secure0.733Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
TeamCity0.711TeamCity is a build management and continuous integration server from JetBrains
VMware vCenter0.7224VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
XWiki Platform0.711XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm
Zyxel firewall0.711Firewalls manufactured by Zyxel
needrestart0.711Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot
Jenkins0.611Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery.
LiteSpeed Cache WordPress plugin0.611WordPress plugin
MOVEit Transfer0.611Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems.
Microsoft Outlook0.6123Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
PaperCut NG0.611PaperCut NG is a comprehensive print management system designed to seamlessly monitor and control your resources with easy to use administrative and user tools that can be securely accessed from anywhere on the network though a web browser
Roundcube0.611Roundcube is a web-based IMAP email client
SugarCRM0.611SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams
The Events Calendar plugin for WordPress0.611The Events Calendar is a plugin for creating an events listing website
Acronis Cyber Infrastructure0.511A hyperconverged solution providing storage, compute, and network resources for businesses and service provider
Barracuda Email Security Gateway0.511The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks
Check Point Security Gateway0.511The Check Point Security Gateway is a core component of Check Point’s cybersecurity architecture, designed to protect networks and data by providing a range of security functions
Fluent Bit0.511Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces
FortiClientEMS0.511FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client)
FortiManager0.511FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances
FortiOS0.5112FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
Internet Shortcut Files0.511Internet Shortcut Files
Microsoft Streaming Service0.511Microsoft Streaming Service
NTLM Hash Disclosure0.511NTLM Hash Disclosure
PAN-OS0.533PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
Proxy Driver0.511Proxy Driver
SmartScreen Prompt0.511SmartScreen Prompt
Veeam Backup & Replication0.5112Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
Artifex Ghostscript0.311Artifex Ghostscript is an interpreter for the PostScript® language and PDF files


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.0126321
Authentication Bypass0.98718
Code Injection0.97112
Command Injection0.9722
Security Feature Bypass0.9527
Elevation of Privilege0.8595519
Information Disclosure0.83112
Cross Site Scripting0.811
Path Traversal0.711
Memory Corruption0.511
Spoofing0.4516


Vulnerabilities

Urgent (38)

1. Authentication Bypass - GitLab (CVE-2023-7028) - Urgent [979]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:MOCHAMMADRAFI:CVE-2023-7028, Vulners:PublicExploit:GitHub:SOLTANALI0:CVE-2023-7028, Vulners:PublicExploit:GitHub:HACKEREMMEN:GITLAB-EXPLOIT, Vulners:PublicExploit:GitHub:FA-RREL:CVE-2023-7028, Vulners:PublicExploit:GitHub:VOZEC:CVE-2023-7028, Vulners:PublicExploit:GitHub:THANHLAM-ATTT:CVE-2023-7028, Vulners:PublicExploit:GitHub:RANDOMROBBIEBF:CVE-2023-7028, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-7028, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-7028, Vulners:PublicExploit:GitHub:SHIMON03:CVE-2023-7028-ACCOUNT-TAKE-OVER-GITLAB, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:180882, Vulners:PublicExploit:PACKETSTORM:177587, Vulners:PublicExploit:EDB-ID:51889, Vulners:PublicExploit:1337DAY-ID-39456, Vulners:PublicExploit:MSF:AUXILIARY-ADMIN-HTTP-GITLAB_PASSWORD_RESET_ACCOUNT_TAKEOVER-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.914GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.95803, EPSS Percentile is 0.99519

2. Remote Code Execution - PHP (CVE-2024-4577) - Urgent [966]

Description: In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:AADDMIN1122345:CVE-2024-4577-POC, Vulners:PublicExploit:GitHub:A-ROSHBAIK:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:WANLICHANGCHENGWANLICHANG:CVE-2024-4577-RCE-EXP, Vulners:PublicExploit:GitHub:XCANWIN:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-4577-POC, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:NEMU1K5MA:CVE-2024-4577, Vulners:PublicExploit:GitHub:JAKABAKOS:CVE-2024-4577-PHP-CGI-ARGUMENT-INJECTION-RCE, Vulners:PublicExploit:GitHub:YWCHEN-NTUST:PHP-CGI-RCE-SCANNER, Vulners:PublicExploit:GitHub:MANUELKY08:CVE-2024-4577---RR, Vulners:PublicExploit:GitHub:L0N3M4N:CVE-2024-4577-RCE, Vulners:PublicExploit:GitHub:ATDANNY:CVE-2024-4577, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:CVE-2024-4577, Vulners:PublicExploit:GitHub:MANUELINFOSEC:CVE-2024-4577, Vulners:PublicExploit:GitHub:FA-RREL:CVE-2024-4577-RCE, Vulners:PublicExploit:GitHub:JCCCCCX:CVE-2024-4577, Vulners:PublicExploit:GitHub:CYBERSAGOR:CVE-2024-4577, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-4577, Vulners:PublicExploit:GitHub:TAM-K592:CVE-2024-4577, Vulners:PublicExploit:GitHub:AADDMIN1122345:CVE-2024-4577, Vulners:PublicExploit:GitHub:JUNP0:CVE-2024-4577, Vulners:PublicExploit:GitHub:SH0CKFR:CVE-2024-4577, Vulners:PublicExploit:GitHub:BUGHUNTAR:CVE-2024-4577, Vulners:PublicExploit:GitHub:IT-T4MPAN:CHECK_CVE_2024_4577.SH, Vulners:PublicExploit:GitHub:BIBO318:CVE-2024-4577-RCE-ATTACK, Vulners:PublicExploit:GitHub:WAIVED:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:11WHOAMI99:CVE-2024-4577, Vulners:PublicExploit:GitHub:YUKIIOZ:CVE-2024-4577, Vulners:PublicExploit:GitHub:LONGHOANGTH18:CVE-2024-4577, Vulners:PublicExploit:GitHub:AHMETRAMAZANK:CVE-2024-4577, Vulners:PublicExploit:GitHub:GOTR00T0DAY:CVE-2024-4577, Vulners:PublicExploit:GitHub:PIZZABOIBESTLEGITS:CVE-2024-4577, Vulners:PublicExploit:GitHub:AMANDINEVDW:CVE-2024-4577, Vulners:PublicExploit:GitHub:JENINSUTRADHAR:CVE-2024-4577-CHECKER, Vulners:PublicExploit:GitHub:PHIROJSHAH:CVE-2024-4577, Vulners:PublicExploit:GitHub:K3YSTR0K3R:CVE-2024-4577-EXPLOIT, Vulners:PublicExploit:GitHub:SUG4R-WR41TH:CVE-2024-4577, Vulners:PublicExploit:GitHub:ENTROPT:CVE-2024-4577_ANALYSIS, Vulners:PublicExploit:GitHub:BTTEA:CVE-2024-4577-RCE-POC, Vulners:PublicExploit:GitHub:ZOMASEC:CVE-2024-4577, Vulners:PublicExploit:GitHub:BL4CKSKU11:CVE-2024-4577, Vulners:PublicExploit:GitHub:CHARIS3306:CVE-2024-4577, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:PACKETSTORM:179140, Vulners:PublicExploit:PACKETSTORM:179085, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-PHP_CGI_ARG_INJECTION_RCE_CVE_2024_4577-, Vulners:PublicExploit:EDB-ID:52047, Vulners:PublicExploit:1337DAY-ID-39659, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.9632, EPSS Percentile is 0.99608

3. Remote Code Execution - Atlassian Confluence (CVE-2023-22527) - Urgent [950]

Description: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-ATLASSIAN_CONFLUENCE_RCE_CVE_2023_22527-, Vulners:PublicExploit:GitHub:MANH130902:CVE-2023-22527-POC, Vulners:PublicExploit:GitHub:AVENTO:CVE-2023-22527_CONFLUENCE_RCE, Vulners:PublicExploit:GitHub:YONGYE-SECURITY:CVE-2023-22527, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2023-22527, Vulners:PublicExploit:GitHub:VNCERT-CC:CVE-2023-22527-CONFLUENCE, Vulners:PublicExploit:GitHub:KH4SH3I:CVE-2023-22527, Vulners:PublicExploit:GitHub:ADMINLOVE520:CVE-2023-22527, Vulners:PublicExploit:GitHub:PRIVIA-SECURITY:CVE-2023-22527, Vulners:PublicExploit:GitHub:BOOGIPOP:CVE-2023-22527-GODZILLA-MEMSHELL, Vulners:PublicExploit:GitHub:VULNCHECK-OSS:CVE-2023-22527, Vulners:PublicExploit:GitHub:THANHLAM-ATTT:CVE-2023-22527, Vulners:PublicExploit:GitHub:AXTHONYV:CVE-2023-22527, Vulners:PublicExploit:GitHub:VOZEC:CVE-2023-22527, Vulners:PublicExploit:GitHub:NIUWOO:CVE-2023-22527, Vulners:PublicExploit:GitHub:TTATE10:CVE-2023-22527, Vulners:PublicExploit:GitHub:TTATE10:REF2924, Vulners:PublicExploit:GitHub:MAANVADER:CVE-2023-22527-POC, Vulners:PublicExploit:GitHub:M0UNTAINSHLEY:CVE-2023-22527-MEMSHELL, Vulners:PublicExploit:GitHub:C1PH3RX13:CVE-2023-22527, Vulners:PublicExploit:GitHub:SANJAI-AK47:CVE-2023-22527, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-22527, Vulners:PublicExploit:GitHub:BBD-YZZ:CONFLUENCE-RCE, Vulners:PublicExploit:PACKETSTORM:177643, Vulners:PublicExploit:PACKETSTORM:176789, Vulners:PublicExploit:1337DAY-ID-39469, Vulners:PublicExploit:1337DAY-ID-39278, Vulners:PublicExploit:EDB-ID:51904, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Confluence is a web-based corporate wiki
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96968, EPSS Percentile is 0.99784

4. Authentication Bypass - TeamCity (CVE-2024-27198) - Urgent [946]

Description: In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:K3YSTR0K3R:CVE-2024-27198-EXPLOIT, Vulners:PublicExploit:GitHub:GENIUSZLYY:CVE-2024-27198, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-27198, Vulners:PublicExploit:GitHub:CHARONDEFALT:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:YORYIO:CVE-2024-27198, Vulners:PublicExploit:GitHub:STUUB:RCITY-CVE-2024-27199, Vulners:PublicExploit:GitHub:STUUB:RCITY-CVE-2024-27198, Vulners:PublicExploit:GitHub:RAMPANTSPARK:CVE-2024-27198, Vulners:PublicExploit:GitHub:JRBH4CK:CVE-2024-27198, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:PASSWA11:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:CHEBUYA:CVE-2024-30851-JASMIN-RANSOMWARE-PATH-TRAVERSAL-POC, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-JETBRAINS_TEAMCITY_RCE_CVE_2024_27198-, Vulners:PublicExploit:PACKETSTORM:177601 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714TeamCity is a build management and continuous integration server from JetBrains
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.97238, EPSS Percentile is 0.9988

5. Remote Code Execution - PaperCut NG (CVE-2023-27350) - Urgent [933]

Description: This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:1337DAY-ID-38767, Vulners:PublicExploit:1337DAY-ID-38704, Vulners:PublicExploit:1337DAY-ID-38623, Vulners:PublicExploit:EDB-ID:51452, Vulners:PublicExploit:EDB-ID:51391, Vulners:PublicExploit:PACKETSTORM:172780, Vulners:PublicExploit:PACKETSTORM:172512, Vulners:PublicExploit:PACKETSTORM:172022, Vulners:PublicExploit:GitHub:WHUTW00T:CVE-2023-27350, Vulners:PublicExploit:GitHub:GETDRIVE:PAPERCUT, Vulners:PublicExploit:GitHub:IMANCYBERSECURITY:CVE-2023-27350-POC, Vulners:PublicExploit:GitHub:MAANVADER:CVE-2023-27350-POC, Vulners:PublicExploit:GitHub:PARI-MALAM:CVE-2023-27350, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-27350, Vulners:PublicExploit:GitHub:ADHIKARA13:CVE-2023-27350, Vulners:PublicExploit:GitHub:JENDERAL92:CVE-2023-27350, Vulners:PublicExploit:GitHub:TAMINGSARIMY:CVE-2023-27350-POC, Vulners:PublicExploit:SAINT:648936FBB2CAC7D3895D33C618D275A9, Vulners:PublicExploit:SAINT:265661B74BC72F0361AE7BB83EAC4EA3, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-PAPERCUT_NG_AUTH_BYPASS-, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614PaperCut NG is a comprehensive print management system designed to seamlessly monitor and control your resources with easy to use administrative and user tools that can be securely accessed from anywhere on the network though a web browser
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96862, EPSS Percentile is 0.99753

6. Command Injection - Ivanti Connect Secure (CVE-2024-21887) - Urgent [932]

Description: A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21887, Vulners:PublicExploit:GitHub:TUCOMMENCEAPOUSSER:CVE-2024-21887, Vulners:PublicExploit:GitHub:RAMINKARIMKHANI1996:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805_CVE-2024-21887_SCANNER, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21893-TO-CVE-2024-21887, Vulners:PublicExploit:GitHub:MICKDEC:CVE-2023-46805_CVE-2024-21887_SCAN_GROUPED, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:1337DAY-ID-39263, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2023_46805-, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:PACKETSTORM:176668, Vulners:PublicExploit:PACKETSTORM:177229, Vulners:PublicExploit:SAINT:CBB2F1CA8B177BA96AECA3D1FB0C7611, Vulners:PublicExploit:SAINT:60BDA75642503EC398357486212FA6C7, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.910CVSS Base Score is 9.1. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96757, EPSS Percentile is 0.99726

7. Authentication Bypass - Jenkins (CVE-2024-23897) - Urgent [929]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ATHULYA666:CVE-2024-23897, Vulners:PublicExploit:GitHub:MIL4NE:CVE-2024-23897-JENKINS-4.441, Vulners:PublicExploit:GitHub:CKEVENS:CVE-2024-23897, Vulners:PublicExploit:GitHub:IFCONFIG-ME:CVE-2024-23897, Vulners:PublicExploit:GitHub:NEBIAN:CVE-2024-23897, Vulners:PublicExploit:GitHub:ANASTASIASTILL:CVE-2024-23897, Vulners:PublicExploit:GitHub:PULENTOSKI:CVE-2024-23897-SCANER, Vulners:PublicExploit:GitHub:XAITAX:CVE-2024-23897, Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-23897, Vulners:PublicExploit:GitHub:MAALFER:CVE-2024-23897, Vulners:PublicExploit:GitHub:VMTYAN:POC-CVE-2024-23897, Vulners:PublicExploit:GitHub:WJLIN0:CVE-2024-23897, Vulners:PublicExploit:GitHub:YORYIO:CVE-2024-23897, Vulners:PublicExploit:GitHub:VOZEC:CVE-2024-23897, Vulners:PublicExploit:GitHub:RAHEEL0X01:CVE-2024-23897, Vulners:PublicExploit:GitHub:JOPRAVEEN:CVE-2024-23897, Vulners:PublicExploit:GitHub:B4CK4TT4CK:CVE-2024-23897, Vulners:PublicExploit:GitHub:ABRAXA5:JENKINS-CVE-2024-23897, Vulners:PublicExploit:GitHub:SAFEER-ACCUKNOX:JENKINS-ARGS4J-CVE-2024-23897-POC, Vulners:PublicExploit:GitHub:ABO5:CVE-2024-23897, Vulners:PublicExploit:GitHub:ZGIMSZHD61:CVE-2024-23897-POC, Vulners:PublicExploit:GitHub:CC3305:CVE-2024-23897, Vulners:PublicExploit:GitHub:VERYLAZYTECH:CVE-2024-23897, Vulners:PublicExploit:GitHub:VISZSEC:CVE-2024-23897, Vulners:PublicExploit:GitHub:THATNOTEASY:CVE-2024-23897, Vulners:PublicExploit:GitHub:PULENTOSKI:CVE-2024-23897-ARBITRARY-FILE-READ, Vulners:PublicExploit:GitHub:BINGANAO:CVE-2024-23897, Vulners:PublicExploit:GitHub:PRAISON001:CVE-2024-23897-JENKINS-ARBITRARY-READ-FILE-VULNERABILITY, Vulners:PublicExploit:GitHub:GODYLOCKZ:CVE-2024-23897, Vulners:PublicExploit:GitHub:JENKINSCI-CERT:SECURITY-3314-3315, Vulners:PublicExploit:GitHub:I-100-USER:CVE-2024-25897, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:176840, Vulners:PublicExploit:PACKETSTORM:180621, Vulners:PublicExploit:PACKETSTORM:178047, Vulners:PublicExploit:EDB-ID:51993, Vulners:PublicExploit:1337DAY-ID-39274, Vulners:PublicExploit:MSF:AUXILIARY-GATHER-JENKINS_CLI_AMPERSAND_ARBITRARY_FILE_READ-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.614Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96943, EPSS Percentile is 0.99774

8. Code Injection - MOVEit Transfer (CVE-2023-34362) - Urgent [927]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:GLEN-PEARSON:MOVEIT-CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-34362, Vulners:PublicExploit:GitHub:DEEPINSTINCT:MOVEIT_CVE-2023-34362_IOCS, Vulners:PublicExploit:GitHub:GLEN-PEARSON:CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:SFEWER-R7:CVE-2023-34362, Vulners:PublicExploit:GitHub:MALWAREMAN007:CVE-2023-34362, Vulners:PublicExploit:GitHub:ERRORFIATHCK:MOVEIT-EXPLOIT, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-26067, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:173110, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-MOVEIT_CVE_2023_34362-, Vulners:PublicExploit:1337DAY-ID-38820, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems.
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.9702, EPSS Percentile is 0.99805

9. Authentication Bypass - Ivanti Connect Secure (CVE-2023-46805) - Urgent [922]

Description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2023-46805, Vulners:PublicExploit:GitHub:W2XIM3:CVE-2023-46805, Vulners:PublicExploit:GitHub:CBEEK-R7:CVE-2023-46805, Vulners:PublicExploit:GitHub:CAPPRICIO-SECURITIES:CVE-2023-46805, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2023-21887, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805_CVE-2024-21887_SCANNER, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:RAMINKARIMKHANI1996:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805, Vulners:PublicExploit:GitHub:MICKDEC:CVE-2023-46805_CVE-2024-21887_SCAN_GROUPED, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:1337DAY-ID-39263, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2023_46805-, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:PACKETSTORM:176668, Vulners:PublicExploit:PACKETSTORM:177229, Vulners:PublicExploit:SAINT:CBB2F1CA8B177BA96AECA3D1FB0C7611, Vulners:PublicExploit:SAINT:60BDA75642503EC398357486212FA6C7, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.810CVSS Base Score is 8.2. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.95782, EPSS Percentile is 0.99513

10. Authentication Bypass - Ivanti Connect Secure (CVE-2024-21893) - Urgent [922]

Description: A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-21893.PY, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21893-TO-CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:PACKETSTORM:177229 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.810CVSS Base Score is 8.2. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.95989, EPSS Percentile is 0.99547

11. Remote Code Execution - Windows MSHTML Platform (CVE-2023-35628) - Urgent [919]

Description: Windows MSHTML Platform Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on GitHub website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00993, EPSS Percentile is 0.84193

12. Remote Code Execution - FortiClientEMS (CVE-2023-48788) - Urgent [916]

Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-48788, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-FORTICLIENT_EMS_FCTID_SQLI-, Vulners:PublicExploit:1337DAY-ID-39585, Vulners:PublicExploit:PACKETSTORM:178230 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client)
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.71085, EPSS Percentile is 0.9816

13. Remote Code Execution - FortiManager (CVE-2024-47575) - Urgent [916]

Description: A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-47575-EXP, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:FORTIJUMP-EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:GitHub:SKYALLIANCE:EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-MISC-FORTIMANAGER_RCE_CVE_2024_47575-, Vulners:PublicExploit:PACKETSTORM:182936 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.88627, EPSS Percentile is 0.98827

14. Remote Code Execution - PAN-OS (CVE-2024-3400) - Urgent [916]

Description: A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:1337DAY-ID-39582, Vulners:PublicExploit:1337DAY-ID-39566, Vulners:PublicExploit:1337DAY-ID-39564, Vulners:PublicExploit:PACKETSTORM:178220, Vulners:PublicExploit:PACKETSTORM:178099, Vulners:PublicExploit:PACKETSTORM:178216, Vulners:PublicExploit:GitHub:SWAYBS:CVE-2024-3400, Vulners:PublicExploit:GitHub:ANDRELIA-HACKS:CVE-2024-3400, Vulners:PublicExploit:GitHub:MARCONESLER:CVE-2024-3400, Vulners:PublicExploit:GitHub:ZAM89:CVE-2024-3400-POT, Vulners:PublicExploit:GitHub:HACKINGLZ:PANRAPIDCHECK, Vulners:PublicExploit:GitHub:YUVVI01:CVE-2024-3400, Vulners:PublicExploit:GitHub:FOXYPROXYS:CVE-2024-3400, Vulners:PublicExploit:GitHub:CODEBLUEPRINT:CVE-2024-3400, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-3400-CANARY, Vulners:PublicExploit:GitHub:MURRAYR0123:CVE-2024-3400_COMPROMISE_CHECKER, Vulners:PublicExploit:GitHub:TERMINALJUNKI3:CVE-2024-3400-CHECKER, Vulners:PublicExploit:GitHub:ADMI-N:CVE-2024-3400-RCE-COPY, Vulners:PublicExploit:GitHub:KR0FF:CVE-2024-3400, Vulners:PublicExploit:GitHub:DREWSKYDEV:CVE-2024-3400, Vulners:PublicExploit:GitHub:MRR0B0T19:CVE-2024-3400, Vulners:PublicExploit:GitHub:SCHOOLDROPOUT1337:CVE-2024-3400, Vulners:PublicExploit:GitHub:MOMIKA233:CVE-2024-3400, Vulners:PublicExploit:GitHub:CERTUSHACK:CVE-2024-3400-POC, Vulners:PublicExploit:GitHub:PWNJ0HN:CVE-2024-3400, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400-RCE-SCAN, Vulners:PublicExploit:GitHub:ADANIKAMAL:CVE-2024-3400, Vulners:PublicExploit:GitHub:SXYRXYY:CVE-2024-3400-CHECK, Vulners:PublicExploit:GitHub:INDEX2014:CVE-2024-3400-CHECKER, Vulners:PublicExploit:GitHub:MURRAYR0123:CVE-2024-3400-COMPROMISE-CHECKER, Vulners:PublicExploit:GitHub:AK1T4:CVE-2024-3400, Vulners:PublicExploit:GitHub:SHAMO0:CVE-2024-3400, Vulners:PublicExploit:GitHub:RETKOUSSA:CVE-2024-3400, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-3400, Vulners:PublicExploit:GitHub:CONDITIONBLACK:CVE-2024-3400-POC, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400-RCE, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400, Vulners:PublicExploit:GitHub:LOANVITOR:CVE-2024-3400-, Vulners:PublicExploit:GitHub:0X0D3AD:CVE-2024-3400, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:EDB-ID:51996, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-PANOS_TELEMETRY_CMD_EXEC-, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96476, EPSS Percentile is 0.99644

15. Remote Code Execution - Veeam Backup & Replication (CVE-2024-40711) - Urgent [916]

Description: A deserialization of untrusted data vulnerability in Veeam Backup & Replication can allow an unauthenticated remote code execution (RCE).

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:WATCHTOWRLABS:CVE-2024-40711, Vulners:PublicExploit:GitHub:REALSTATUS:CVE-2024-40711-EXP, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.96695, EPSS Percentile is 0.99702

16. Remote Code Execution - VMware vCenter (CVE-2024-38812) - Urgent [914]

Description: The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.710EPSS Probability is 0.00416, EPSS Percentile is 0.7485

17. Authentication Bypass - Acronis Cyber Infrastructure (CVE-2023-45249) - Urgent [913]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181993, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-ACRONIS_CYBER_INFRA_CVE_2023_45249-, Vulners:PublicExploit:1337DAY-ID-39768 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514A hyperconverged solution providing storage, compute, and network resources for businesses and service provider
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.88105, EPSS Percentile is 0.98796

18. Authentication Bypass - PAN-OS (CVE-2024-0012) - Urgent [913]

Description: An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:VEGETABLELASAGNE:CVE-2024-0012, Vulners:PublicExploit:GitHub:0XJESSIE21:CVE-2024-0012, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.97192, EPSS Percentile is 0.99861

19. Elevation of Privilege - Windows Task Scheduler (CVE-2024-49039) - Urgent [904]

Description: Windows Task Scheduler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JE5442804:WPTASKSCHEDULER_CVE-2024-49039, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00677, EPSS Percentile is 0.80556

20. Remote Code Execution - FortiOS (CVE-2024-21762) - Urgent [904]

Description: A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:C0D3B3AF:CVE-2024-21762-EXPLOIT, Vulners:PublicExploit:GitHub:RDOIX:CVE-2024-21762-CHECKER, Vulners:PublicExploit:GitHub:CLEVERG0D:CVE-2024-21762-CHECKER, Vulners:PublicExploit:GitHub:BISHOPFOX:CVE-2024-21762-CHECK, Vulners:PublicExploit:GitHub:R4P3C4:CVE-2024-21762-EXPLOIT-POC-FORTINET-SSL-VPN-CHECK, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-21762-POC, Vulners:PublicExploit:GitHub:THEREDDEVIL1:CVE-2024-21762, Vulners:PublicExploit:GitHub:ZZCENTURY:FORTIGATE-CVE-2024-21762, Vulners:PublicExploit:GitHub:D0RB:CVE-2024-21762, Vulners:PublicExploit:GitHub:CODEB3AF:CVE-2024-21762-, Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-21762, Vulners:PublicExploit:GitHub:DISSEMINATOR:POC_CVE-2024-38856, Vulners:PublicExploit:PACKETSTORM:177602 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.910EPSS Probability is 0.01842, EPSS Percentile is 0.88769

21. Security Feature Bypass - SugarCRM (CVE-2023-22952) - Urgent [903]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:171320, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-SUGARCRM_WEBSHELL_CVE_2023_22952-, Vulners:PublicExploit:1337DAY-ID-38255, BDU:PublicExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.56829, EPSS Percentile is 0.97806

22. Command Injection - Barracuda Email Security Gateway (CVE-2023-2868) - Urgent [899]

Description: A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CFIELDING-R7:POC-CVE-2023-2868, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.514The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.910EPSS Probability is 0.07757, EPSS Percentile is 0.94457

23. Elevation of Privilege - nftables (CVE-2024-1086) - Urgent [897]

Description: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:PL0XE:CVE-2024-1086, Vulners:PublicExploit:GitHub:CCIEVOICE2009:CVE-2024-1086, Vulners:PublicExploit:GitHub:KEVCOOPER:CVE-2024-1086-CHECKER, Vulners:PublicExploit:GitHub:XZX482:CVE-2024-1086, Vulners:PublicExploit:GitHub:NOTSELWYN:CVE-2024-1086, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.710EPSS Probability is 0.00291, EPSS Percentile is 0.69833

24. Information Disclosure - Check Point Security Gateway (CVE-2024-24919) - Urgent [874]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:180654, Vulners:PublicExploit:PACKETSTORM:178872, Vulners:PublicExploit:GitHub:PEWC0:CVE-2024-24919, Vulners:PublicExploit:GitHub:JSEBASTIANHERRERA:CVE-2024-24919, Vulners:PublicExploit:GitHub:PRAISON001:CVE-2024-24919-CHECK-POINT-REMOTE-ACCESS-VPN, Vulners:PublicExploit:GitHub:MR-KASIM-MEHAR:CVE-2024-24919, Vulners:PublicExploit:GitHub:MR-KASIM-MEHAR:CVE-2024-24919-EXPLOIT, Vulners:PublicExploit:GitHub:SATCHHACKER:CVE-2024-24919, Vulners:PublicExploit:GitHub:GENIUSZLYY:CVE-2024-24919, Vulners:PublicExploit:GitHub:IFCONFIG-ME:CVE-2024-24919-BULK-SCANNER, Vulners:PublicExploit:GitHub:UN9NPLAYER:CVE-2024-24919, Vulners:PublicExploit:GitHub:GOATSECURITY:CVE-2024-24919, Vulners:PublicExploit:GitHub:REVOLTSECURITIES:CVE-2024-24919, Vulners:PublicExploit:GitHub:ZAM89:CVE-2024-24919, Vulners:PublicExploit:GitHub:YN1337:CVE-2024-24919, Vulners:PublicExploit:GitHub:B1NARYO:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:J4F9S5D2Q7:CVE-2024-24919, Vulners:PublicExploit:GitHub:STARLOX0:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:VULNPIRE:CVE-2024-24919, Vulners:PublicExploit:GitHub:GLOBALSECUREACADEMY:CVE-2024-24919, Vulners:PublicExploit:GitHub:BIGB0X:CVE-2024-24919-SNIPER, Vulners:PublicExploit:GitHub:TIM-HOEKSTRA:CVE-2024-24919, Vulners:PublicExploit:GitHub:0XANS:CVE-2024-24919, Vulners:PublicExploit:GitHub:GUAYOYOCYBER:CVE-2024-24919, Vulners:PublicExploit:GitHub:RUG4LO:CVE-2024-24919-EXPLOIT, Vulners:PublicExploit:GitHub:J4F9S5D2Q7:CVE-2024-24919-CHECKPOINT, Vulners:PublicExploit:GitHub:SEED1337:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:EMANUELDOSREIS:CVE-2024-24919, Vulners:PublicExploit:GitHub:LUCASKATASHI:CVE-2024-24919, Vulners:PublicExploit:GitHub:FERNANDOBORTOTTI:CVE-2024-24919, Vulners:PublicExploit:GitHub:CAPPRICIO-SECURITIES:CVE-2024-24919, Vulners:PublicExploit:GitHub:0X3F3C:CVE-2024-24919, Vulners:PublicExploit:GitHub:0NIN0HANZ0:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:PROTONNEGATIVO:CVE-2024-24919, Vulners:PublicExploit:GitHub:3UR:CVE-2024-24919, Vulners:PublicExploit:GitHub:VERYLAZYTECH:CVE-2024-24919, Vulners:PublicExploit:GitHub:BYTENULL00:CVE-2024-24919, Vulners:PublicExploit:GitHub:SATRIARIZKA:CVE-2024-24919, Vulners:PublicExploit:GitHub:GURUDATTCH:CVE-2024-24919, Vulners:PublicExploit:GitHub:R4P3C4:CVE-2024-24919-EXPLOIT-POC-CHECKPOINT-FIREWALL-VPN, Vulners:PublicExploit:GitHub:SKYROWALKER:CVE-2024-24919, Vulners:PublicExploit:GitHub:MOHAMEDWAGDY7:CVE-2024-24919, Vulners:PublicExploit:MSF:AUXILIARY-GATHER-CHECKPOINT_GATEWAY_FILEREAD_CVE_2024_24919-, Vulners:PublicExploit:EDB-ID:52029 websites
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514The Check Point Security Gateway is a core component of Check Point’s cybersecurity architecture, designed to protect networks and data by providing a range of security functions
CVSS Base Score0.910CVSS Base Score is 8.6. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.95241, EPSS Percentile is 0.99425

25. Elevation of Privilege - Windows Kernel (CVE-2024-30088) - Urgent [861]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:EXPLOITS-FORSALE:COLLATERAL-DAMAGE, Vulners:PublicExploit:GitHub:TYKAWAII98:CVE-2024-30088, Vulners:PublicExploit:GitHub:ADMIN9961:CVE-2024-30088, Vulners:PublicExploit:GitHub:ZOMBIE-KAISER:CVE-2024-30088-WINDOWS-POC, Vulners:PublicExploit:GitHub:NEXTGENPENTESTERS:CVE-2024-30088-, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:PACKETSTORM:181593, Vulners:PublicExploit:1337DAY-ID-39753, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-LOCAL-CVE_2024_30088_AUTHZ_BASEP-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.510EPSS Probability is 0.00148, EPSS Percentile is 0.52083

26. Elevation of Privilege - PAN-OS (CVE-2024-9474) - Urgent [854]

Description: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score0.710CVSS Base Score is 7.2. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.97513, EPSS Percentile is 0.99989

27. Security Feature Bypass - Internet Shortcut Files (CVE-2024-21412) - Urgent [851]

Description: Internet Shortcut Files Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:WR00T:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:LSR00TER:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT, BDU:PublicExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Internet Shortcut Files
CVSS Base Score0.810CVSS Base Score is 8.1. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00573, EPSS Percentile is 0.78591

28. Security Feature Bypass - SmartScreen Prompt (CVE-2024-29988) - Urgent [851]

Description: SmartScreen Prompt Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514SmartScreen Prompt
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.710EPSS Probability is 0.00337, EPSS Percentile is 0.72086

29. Elevation of Privilege - Windows Kernel (CVE-2024-21338) - Urgent [849]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:177869, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-21338, Vulners:PublicExploit:GitHub:TYKAWAII98:CVE-2024-21338_POC, Vulners:PublicExploit:GitHub:HAKAIOFFSEC:CVE-2024-21338, Vulners:PublicExploit:GitHub:UMU618:CVE-2024-21338, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:1337DAY-ID-39515, Vulners:PublicExploit:EDB-ID:51946, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.0007, EPSS Percentile is 0.32288

30. Elevation of Privilege - Windows DWM Core Library (CVE-2024-30051) - Urgent [844]

Description: Windows DWM Core Library Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:FORTRA:CVE-2024-30051, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00085, EPSS Percentile is 0.37761

31. Elevation of Privilege - Windows Installer (CVE-2024-38014) - Urgent [844]

Description: Windows Installer Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181954, Vulners:PublicExploit:PACKETSTORM:182142 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00078, EPSS Percentile is 0.35012

32. Cross Site Scripting - Roundcube (CVE-2024-37383) - Urgent [838]

Description: Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:AMIRZARGHAM:CVE-2024-37383-EXPLOIT, Vulners:PublicExploit:GitHub:BARTFROKLAGE:CVE-2024-37383-POC, BDU:PublicExploit websites
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.610CVSS Base Score is 6.1. According to Vulners data source
EPSS Percentile0.910EPSS Probability is 0.03646, EPSS Percentile is 0.92025

33. Elevation of Privilege - Microsoft Exchange (CVE-2024-21410) - Urgent [838]

Description: Microsoft Exchange Server Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile1.010EPSS Probability is 0.10456, EPSS Percentile is 0.95242

34. Remote Code Execution - Microsoft Outlook (CVE-2024-21378) - Urgent [838]

Description: Microsoft Outlook Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JOHNHORMOND:CVE-2024-21378, Vulners:PublicExploit:GitHub:D0RB:CVE-2024-21378, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.310EPSS Probability is 0.00056, EPSS Percentile is 0.25096

35. Remote Code Execution - VMware vCenter (CVE-2023-34048) - Urgent [836]

Description: vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.910EPSS Probability is 0.05166, EPSS Percentile is 0.93259

36. Elevation of Privilege - Windows Ancillary Function Driver for WinSock (CVE-2024-38193) - Urgent [820]

Description: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NEPHSTER:CVE-2024-38193 website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00054, EPSS Percentile is 0.24466

37. Security Feature Bypass - Windows MSHTML Platform (CVE-2024-30040) - Urgent [811]

Description: Windows MSHTML Platform Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00563, EPSS Percentile is 0.7842

38. Security Feature Bypass - Windows SmartScreen (CVE-2024-21351) - Urgent [811]

Description: Windows SmartScreen Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge
CVSS Base Score0.810CVSS Base Score is 7.6. According to Microsoft data source
EPSS Percentile0.910EPSS Probability is 0.05284, EPSS Percentile is 0.9333

Critical (21)

39. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38213) - Critical [764]

Description: Windows Mark of the Web Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00221, EPSS Percentile is 0.61016

40. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38217) - Critical [740]

Description: Windows Mark of the Web Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.510CVSS Base Score is 5.4. According to Microsoft data source
EPSS Percentile0.610EPSS Probability is 0.00226, EPSS Percentile is 0.61636

41. Spoofing - Windows MSHTML Platform (CVE-2024-38112) - Critical [734]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile1.010EPSS Probability is 0.70086, EPSS Percentile is 0.98132

42. Spoofing - Windows MSHTML Platform (CVE-2024-43461) - Critical [734]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to Microsoft data source
EPSS Percentile0.910EPSS Probability is 0.02933, EPSS Percentile is 0.91166

43. Remote Code Execution - Juniper JunOS (CVE-2024-21591) - Critical [728]

Description: An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS), or Remote Code Execution (RCE) and obtain root privileges on the device. This issue is caused by use of an insecure function allowing an attacker to overwrite arbitrary memory. This issue affects Juniper Networks Junos OS SRX Series and EX Series: * Junos OS versions earlier than 20.4R3-S9; * Junos OS 21.2 versions earlier than 21.2R3-S7; * Junos OS 21.3 versions earlier than 21.3R3-S5; * Junos OS 21.4 versions earlier than 21.4R3-S5; * Junos OS 22.1 versions earlier than 22.1R3-S4; * Junos OS 22.2 versions earlier than 22.2R3-S3; * Junos OS 22.3 versions earlier than 22.3R3-S2; * Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.810EPSS Probability is 0.0048, EPSS Percentile is 0.76605

44. Remote Code Execution - Atlassian Confluence (CVE-2024-21683) - Critical [723]

Description: This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-ATLASSIAN_CONFLUENCE_RCE_CVE_2024_21683-, Vulners:PublicExploit:GitHub:PHUCRIO:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:XH4VM:CVE-2024-21683, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-21683-RCE, Vulners:PublicExploit:PACKETSTORM:179507, Vulners:PublicExploit:1337DAY-ID-39681 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Confluence is a web-based corporate wiki
CVSS Base Score0.910CVSS Base Score is 8.8. According to Vulners data source
EPSS Percentile1.010EPSS Probability is 0.94107, EPSS Percentile is 0.99275

45. Memory Corruption - Artifex Ghostscript (CVE-2024-29510) - Critical [722]

Description: Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:1337DAY-ID-39687, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-FILEFORMAT-GHOSTSCRIPT_FORMAT_STRING_CVE_2024_29510-, Vulners:PublicExploit:PACKETSTORM:179645, Vulners:PublicExploit:GitHub:SWSMITH2391:CVE-2024-29510, BDU:PublicExploit websites
Criticality of Vulnerability Type0.515Memory Corruption
Vulnerable Product is Common0.314Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
CVSS Base Score0.610CVSS Base Score is 6.3. According to Vulners data source
EPSS Percentile0.810EPSS Probability is 0.00722, EPSS Percentile is 0.81228

46. Elevation of Privilege - Windows Error Reporting Service (CVE-2024-26169) - Critical [719]

Description: Windows Error Reporting Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.22138

47. Elevation of Privilege - Windows Print Spooler (CVE-2022-38028) - Critical [719]

Description: Windows Print Spooler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.210EPSS Probability is 0.00051, EPSS Percentile is 0.21534

48. Elevation of Privilege - Windows Kernel (CVE-2024-38106) - Critical [712]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11026

49. Elevation of Privilege - Windows Power Dependency Coordinator (CVE-2024-38107) - Critical [707]

Description: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11026

50. Spoofing - Windows MSHTML Platform (CVE-2024-43573) - Critical [698]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.01063, EPSS Percentile is 0.84777

51. Remote Code Execution - Windows Remote Desktop Licensing Service (CVE-2024-38077) - Critical [680]

Description: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:MRMTWOJ:CVE-2024-38077, Vulners:PublicExploit:GitHub:DESTINY0991:CHECK_38077, Vulners:PublicExploit:GitHub:PSL-B:CVE-2024-38077-CHECK, Vulners:PublicExploit:GitHub:BBD-YZZ:FYNE-GUI, Vulners:PublicExploit:GitHub:ZHUXI1965:CVE-2024-38077-RDLCHECK, Vulners:PublicExploit:GitHub:MURPHYSECURITY:RDL-DETECT, Vulners:PublicExploit:GitHub:QI4L:CVE-2024-38077, Vulners:PublicExploit:GitHub:ATLASSION:CVE-2024-38077-CHECK, Vulners:PublicExploit:GitHub:CLOUDCROWSEC001:CVE-2024-38077-POC, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00088, EPSS Percentile is 0.39175

52. Elevation of Privilege - Windows Common Log File System Driver (CVE-2023-36424) - Critical [677]

Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NASSIM-ASRIR:CVE-2023-36424 website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00789, EPSS Percentile is 0.8216

53. Remote Code Execution - XWiki Platform (CVE-2024-31982) - Critical [652]

Description: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TH3GOKUL:CVE-2024-31982, Vulners:PublicExploit:GitHub:BIGB0X:CVE-2024-31982, Vulners:PublicExploit:GitHub:K3LPI3B4NSH33:CVE-2024-31982, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm
CVSS Base Score1.010CVSS Base Score is 10.0. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.28532

54. Spoofing - NTLM Hash Disclosure (CVE-2024-43451) - Critical [648]

Description: NTLM Hash Disclosure Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.514NTLM Hash Disclosure
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.00469, EPSS Percentile is 0.76307

55. Remote Code Execution - Microsoft Outlook (CVE-2024-21413) - Critical [647]

Description: Microsoft Outlook Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HYZ3K:CVE-2024-21413, Vulners:PublicExploit:GitHub:LABESTEROCT:CVE-2024-21413, Vulners:PublicExploit:GitHub:MDUSMANDASTHAHEER:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:THEMEHACKERS:CVE-2024-21413, Vulners:PublicExploit:GitHub:AHMETKARAKAYAOFFICAL:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:TH3HELLION:CVE-2024-21413, Vulners:PublicExploit:GitHub:XAITAX:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:MSEYMEND:CVE-2024-21413, Vulners:PublicExploit:GitHub:CMNATIC:CVE-2024-21413, Vulners:PublicExploit:GitHub:DEVAKABARI:CVE-2024-21413, Vulners:PublicExploit:GitHub:R00TB1T:CVE-2024-21413-POC, Vulners:PublicExploit:GitHub:DUY-31:CVE-2024-21413, Vulners:PublicExploit:GitHub:DSHABANI96:CVE-2024-21413, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.001, EPSS Percentile is 0.42818

56. Spoofing - Microsoft Exchange (CVE-2024-49040) - Critical [642]

Description: Microsoft Exchange Server Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Kaspersky website
Exploit Exists0.417The existence of a private exploit is mentioned on Microsoft:PrivateExploit:PoC website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
CVSS Base Score0.810CVSS Base Score is 7.5. According to Microsoft data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.40618

57. Code Injection - The Events Calendar plugin for WordPress (CVE-2024-8275) - Critical [630]

Description: The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:P33D:CVE-2024-8275, Vulners:PublicExploit:GitHub:WHITEROSE7777:CVE-2024-8275 websites
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614The Events Calendar is a plugin for creating an events listing website
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.310EPSS Probability is 0.00065, EPSS Percentile is 0.3042

58. Remote Code Execution - FortiOS (CVE-2023-42789) - Critical [630]

Description: A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CRIMBIT:CVE-2023-42789-POC, Vulners:PublicExploit:GitHub:JHONNYBONNY:CVE-2023-42789 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.405

59. Information Disclosure - Microsoft Outlook (CVE-2023-35636) - Critical [629]

Description: Microsoft Outlook Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-35636 website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score0.710CVSS Base Score is 6.5. According to Microsoft data source
EPSS Percentile0.810EPSS Probability is 0.0049, EPSS Percentile is 0.7682

High (11)

60. Remote Code Execution - Fluent Bit (CVE-2024-4323) - High [595]

Description: A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:D0RB:CVE-2024-4323, Vulners:PublicExploit:GitHub:SKILFOY:CVE-2024-4323-EXPLOIT-POC, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.10511

61. Elevation of Privilege - Windows CSC Service (CVE-2024-26229) - High [594]

Description: Windows CSC Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TEAM-MINEDEV:CVE-2024-26229, Vulners:PublicExploit:GitHub:NVISOSECURITY:CVE-2024-26229-BOF, Vulners:PublicExploit:GitHub:MQXMM:CVE-2024-26229, Vulners:PublicExploit:GitHub:CRACKED5PIDER:EOP24-26229, Vulners:PublicExploit:GitHub:0XJ175:DRIVE, Vulners:PublicExploit:GitHub:RALFHACKER:CVE-2024-26229-EXPLOIT, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-26229, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.10511

62. Elevation of Privilege - Windows Kernel-Mode Driver (CVE-2024-35250) - High [594]

Description: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:0XJIEFENG:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:YINSEL:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-35250, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11228

63. Authentication Bypass - Veeam Backup & Replication (CVE-2024-29849) - High [591]

Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SINSINOLOGY:CVE-2024-29849 website
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.10511

64. Elevation of Privilege - needrestart (CVE-2024-48990) - High [589]

Description: Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ALLY-PETITT:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:CYB3RFR0G:CVE-2024-48990-POC, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:PENTESTFUNCTIONS:CVE-2024-48990-POC-TESTING, Vulners:PublicExploit:GitHub:NS989:CVE-2024-48990, Vulners:PublicExploit:GitHub:MAKUGA01:CVE-2024-48990-POC, Vulners:PublicExploit:PACKETSTORM:182765, Vulners:PublicExploit:1337DAY-ID-39817 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.714Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot
CVSS Base Score0.810CVSS Base Score is 7.8. According to Vulners data source
EPSS Percentile0.210EPSS Probability is 0.00045, EPSS Percentile is 0.17402

65. Elevation of Privilege - LiteSpeed Cache WordPress plugin (CVE-2024-28000) - High [585]

Description: Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ARCH1M3D:CVE-2024-28000, Vulners:PublicExploit:GitHub:SSSSUPERX:CVE-2024-28000, Vulners:PublicExploit:GitHub:ALUCARD0X1:CVE-2024-28000, Vulners:PublicExploit:GitHub:JOHNDOEANONITA:CVE-2024-28000, Vulners:PublicExploit:GitHub:EBRASHA:CVE-2024-28000 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.614WordPress plugin
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11252

66. Spoofing - Proxy Driver (CVE-2024-26234) - High [565]

Description: Proxy Driver Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Microsoft, BDU websites
Exploit Exists0.517The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.514Proxy Driver
CVSS Base Score0.710CVSS Base Score is 6.7. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.10511

67. Path Traversal - Zyxel firewall (CVE-2024-11667) - High [563]

Description: A directory traversal vulnerability in the web management interface of Zyxel firewall firmware could allow an attacker to download or upload files via a crafted URL.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB, sekoia.io: Helldown Ransomware websites
Exploit Exists017The existence of publicly available or private exploit is NOT mentioned in available Data Sources
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.714Firewalls manufactured by Zyxel
CVSS Base Score0.810CVSS Base Score is 7.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.10511

68. Elevation of Privilege - Microsoft Streaming Service (CVE-2024-30090) - High [532]

Description: Microsoft Streaming Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DOR00TKIT:CVE-2024-30090, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Microsoft Streaming Service
CVSS Base Score0.710CVSS Base Score is 7.0. According to Microsoft data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11237

69. Remote Code Execution - VMware vCenter (CVE-2024-37079) - High [461]

Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists017The existence of publicly available or private exploit is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.41263

70. Remote Code Execution - VMware vCenter (CVE-2024-37080) - High [461]

Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists017The existence of publicly available or private exploit is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to Vulners data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.41263

Medium (0)

Low (0)

Exploitation in the wild detected (52)

Authentication Bypass (7)

Remote Code Execution (12)

Command Injection (2)

Code Injection (1)

Elevation of Privilege (13)

Security Feature Bypass (7)

Information Disclosure (1)

Cross Site Scripting (1)

Spoofing (6)

Memory Corruption (1)

Path Traversal (1)

Public exploit exists, but exploitation in the wild is NOT detected (16)

Remote Code Execution (7)

Elevation of Privilege (6)

Code Injection (1)

Information Disclosure (1)

Authentication Bypass (1)

Other Vulnerabilities (2)

Remote Code Execution (2)