Report Name: pt_trend_cve_combined2024 report
Generated: 2025-01-17 00:24:54

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
GitLab0.911GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application
Windows Kernel0.9213Windows Kernel
Windows NTLM0.911A suite of security protocols to authenticate users' identity and protect the integrity and confidentiality of their activity
nftables0.911nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames
Juniper JunOS0.811Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices
Microsoft Exchange0.8112Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
PHP0.811PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
Windows Ancillary Function Driver for WinSock0.811Windows component
Windows CSC Service0.811Windows component
Windows Common Log File System Driver0.8112Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs
Windows DWM Core Library0.811Windows component
Windows Error Reporting Service0.811Windows component
Windows Installer0.811Windows component
Windows Kernel-Mode Driver0.811Windows component
Windows MSHTML Platform0.8235Windows component
Windows Mark of the Web0.822Windows component
Windows Power Dependency Coordinator0.811Windows component
Windows Print Spooler0.811Windows component
Windows Remote Desktop Licensing Service0.811Windows component
Windows SmartScreen0.811SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge
Windows Task Scheduler0.811Windows component
Apache Struts0.711Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin architecture, and ships with plugins to support REST, AJAX and JSON
Atlassian Confluence0.7112Confluence is a web-based corporate wiki
Ivanti Connect Secure0.733Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
TeamCity0.711TeamCity is a build management and continuous integration server from JetBrains
VMware vCenter0.7224VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
XWiki Platform0.711XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm
Zyxel firewall0.711Firewalls manufactured by Zyxel
needrestart0.711Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot
Hunk Companion WordPress plugin0.611Hunk Companion is a WordPress plugin designed to complement and enhance the functionality of themes developed by ThemeHunk, a provider of customizable WordPress themes
Jenkins0.611Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery.
LiteSpeed Cache WordPress plugin0.611WordPress plugin
MOVEit Transfer0.611Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems.
Microsoft Outlook0.6123Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
PaperCut NG0.611PaperCut NG is a comprehensive print management system designed to seamlessly monitor and control your resources with easy to use administrative and user tools that can be securely accessed from anywhere on the network though a web browser
Roundcube0.611Roundcube is a web-based IMAP email client
SugarCRM0.611SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams
The Events Calendar plugin for WordPress0.611The Events Calendar is a plugin for creating an events listing website
Acronis Cyber Infrastructure0.511A hyperconverged solution providing storage, compute, and network resources for businesses and service provider
Barracuda Email Security Gateway0.511The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks
Fluent Bit0.511Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces
FortiClientEMS0.511FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client)
FortiManager0.511FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances
FortiOS0.5112FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
Internet Shortcut Files0.511Internet Shortcut Files
Kernel Streaming WOW Thunk Service Driver0.511Kernel Streaming WOW Thunk Service Driver
Microsoft Streaming Service0.511Microsoft Streaming Service
PAN-OS0.533PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
Proxy Driver0.511Proxy Driver
SmartScreen Prompt0.511SmartScreen Prompt
Veeam Backup & Replication0.5112Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
cloudguard_network_security0.511Product detected by a:checkpoint:cloudguard_network_security (does NOT exist in CPE dict)
Artifex Ghostscript0.311Artifex Ghostscript is an interpreter for the PostScript® language and PDF files


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.0126422
Authentication Bypass0.98819
Code Injection0.97112
Command Injection0.9722
Security Feature Bypass0.9538
Elevation of Privilege0.85126321
Information Disclosure0.83112
Cross Site Scripting0.811
Path Traversal0.711
Spoofing0.4516


Vulnerabilities

Urgent (42)

1. Authentication Bypass - GitLab (CVE-2023-7028) - Urgent [979]

Description: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.vicarius.io, Vulners:PublicExploit:EDB-ID:51889, Vulners:PublicExploit:1337DAY-ID-39456, Vulners:PublicExploit:GitHub:FA-RREL:CVE-2023-7028, Vulners:PublicExploit:GitHub:SOLTANALI0:CVE-2023-7028, Vulners:PublicExploit:GitHub:HACKEREMMEN:GITLAB-EXPLOIT, Vulners:PublicExploit:GitHub:MOCHAMMADRAFI:CVE-2023-7028, Vulners:PublicExploit:GitHub:THANHLAM-ATTT:CVE-2023-7028, Vulners:PublicExploit:GitHub:VOZEC:CVE-2023-7028, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-7028, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-7028, Vulners:PublicExploit:GitHub:RANDOMROBBIEBF:CVE-2023-7028, Vulners:PublicExploit:GitHub:SHIMON03:CVE-2023-7028-ACCOUNT-TAKE-OVER-GITLAB, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:180882, Vulners:PublicExploit:PACKETSTORM:177587, Vulners:PublicExploit:MSF:AUXILIARY-ADMIN-HTTP-GITLAB_PASSWORD_RESET_ACCOUNT_TAKEOVER-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.914GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.9262, EPSS Percentile is 0.99244

2. Remote Code Execution - PHP (CVE-2024-4577) - Urgent [966]

Description: In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.vicarius.io, Vulners:PublicExploit:GitHub:YWCHEN-NTUST:PHP-CGI-RCE-SCANNER, Vulners:PublicExploit:GitHub:A-ROSHBAIK:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:NEMU1K5MA:CVE-2024-4577, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-4577-POC, Vulners:PublicExploit:GitHub:AADDMIN1122345:CVE-2024-4577-POC, Vulners:PublicExploit:GitHub:WANLICHANGCHENGWANLICHANG:CVE-2024-4577-RCE-EXP, Vulners:PublicExploit:GitHub:JAKABAKOS:CVE-2024-4577-PHP-CGI-ARGUMENT-INJECTION-RCE, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:XCANWIN:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:ATDANNY:CVE-2024-4577, Vulners:PublicExploit:GitHub:FA-RREL:CVE-2024-4577-RCE, Vulners:PublicExploit:GitHub:L0N3M4N:CVE-2024-4577-RCE, Vulners:PublicExploit:GitHub:MANUELKY08:CVE-2024-4577---RR, Vulners:PublicExploit:GitHub:MANUELINFOSEC:CVE-2024-4577, Vulners:PublicExploit:GitHub:JCCCCCX:CVE-2024-4577, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:CVE-2024-4577, Vulners:PublicExploit:GitHub:SUG4R-WR41TH:CVE-2024-4577, Vulners:PublicExploit:GitHub:ENTROPT:CVE-2024-4577_ANALYSIS, Vulners:PublicExploit:GitHub:AMANDINEVDW:CVE-2024-4577, Vulners:PublicExploit:GitHub:K3YSTR0K3R:CVE-2024-4577-EXPLOIT, Vulners:PublicExploit:GitHub:PIZZABOIBESTLEGITS:CVE-2024-4577, Vulners:PublicExploit:GitHub:JENINSUTRADHAR:CVE-2024-4577-CHECKER, Vulners:PublicExploit:GitHub:PHIROJSHAH:CVE-2024-4577, Vulners:PublicExploit:GitHub:YUKIIOZ:CVE-2024-4577, Vulners:PublicExploit:GitHub:GOTR00T0DAY:CVE-2024-4577, Vulners:PublicExploit:GitHub:WAIVED:CVE-2024-4577-PHP-RCE, Vulners:PublicExploit:GitHub:AHMETRAMAZANK:CVE-2024-4577, Vulners:PublicExploit:GitHub:BIBO318:CVE-2024-4577-RCE-ATTACK, Vulners:PublicExploit:GitHub:LONGHOANGTH18:CVE-2024-4577, Vulners:PublicExploit:GitHub:11WHOAMI99:CVE-2024-4577, Vulners:PublicExploit:GitHub:IT-T4MPAN:CHECK_CVE_2024_4577.SH, Vulners:PublicExploit:GitHub:AADDMIN1122345:CVE-2024-4577, Vulners:PublicExploit:GitHub:JUNP0:CVE-2024-4577, Vulners:PublicExploit:GitHub:SH0CKFR:CVE-2024-4577, Vulners:PublicExploit:GitHub:BUGHUNTAR:CVE-2024-4577, Vulners:PublicExploit:GitHub:TAM-K592:CVE-2024-4577, Vulners:PublicExploit:GitHub:CYBERSAGOR:CVE-2024-4577, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-4577, Vulners:PublicExploit:GitHub:BTTEA:CVE-2024-4577-RCE-POC, Vulners:PublicExploit:GitHub:ZOMASEC:CVE-2024-4577, Vulners:PublicExploit:GitHub:BL4CKSKU11:CVE-2024-4577, Vulners:PublicExploit:GitHub:CHARIS3306:CVE-2024-4577, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:1337DAY-ID-39659, Vulners:PublicExploit:EDB-ID:52047, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-PHP_CGI_ARG_INJECTION_RCE_CVE_2024_4577-, Vulners:PublicExploit:PACKETSTORM:179140, Vulners:PublicExploit:PACKETSTORM:179085, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995.
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.95529, EPSS Percentile is 0.99558

3. Remote Code Execution - Atlassian Confluence (CVE-2023-22527) - Urgent [950]

Description: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:GitHub:ADMINLOVE520:CVE-2023-22527, Vulners:PublicExploit:GitHub:PRIVIA-SECURITY:CVE-2023-22527, Vulners:PublicExploit:GitHub:BOOGIPOP:CVE-2023-22527-GODZILLA-MEMSHELL, Vulners:PublicExploit:GitHub:KH4SH3I:CVE-2023-22527, Vulners:PublicExploit:GitHub:VULNCHECK-OSS:CVE-2023-22527, Vulners:PublicExploit:GitHub:MANH130902:CVE-2023-22527-POC, Vulners:PublicExploit:GitHub:AVENTO:CVE-2023-22527_CONFLUENCE_RCE, Vulners:PublicExploit:GitHub:VNCERT-CC:CVE-2023-22527-CONFLUENCE, Vulners:PublicExploit:GitHub:YONGYE-SECURITY:CVE-2023-22527, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2023-22527, Vulners:PublicExploit:GitHub:AXTHONYV:CVE-2023-22527, Vulners:PublicExploit:GitHub:NIUWOO:CVE-2023-22527, Vulners:PublicExploit:GitHub:VOZEC:CVE-2023-22527, Vulners:PublicExploit:GitHub:THANHLAM-ATTT:CVE-2023-22527, Vulners:PublicExploit:GitHub:TTATE10:REF2924, Vulners:PublicExploit:GitHub:M0UNTAINSHLEY:CVE-2023-22527-MEMSHELL, Vulners:PublicExploit:GitHub:C1PH3RX13:CVE-2023-22527, Vulners:PublicExploit:GitHub:MAANVADER:CVE-2023-22527-POC, Vulners:PublicExploit:GitHub:TTATE10:CVE-2023-22527, Vulners:PublicExploit:GitHub:SANJAI-AK47:CVE-2023-22527, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-22527, Vulners:PublicExploit:GitHub:BBD-YZZ:CONFLUENCE-RCE, Vulners:PublicExploit:1337DAY-ID-39469, Vulners:PublicExploit:1337DAY-ID-39278, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-ATLASSIAN_CONFLUENCE_RCE_CVE_2023_22527-, Vulners:PublicExploit:PACKETSTORM:177643, Vulners:PublicExploit:PACKETSTORM:176789, Vulners:PublicExploit:EDB-ID:51904, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Confluence is a web-based corporate wiki
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.97229, EPSS Percentile is 0.99918

4. Remote Code Execution - VMware vCenter (CVE-2023-34048) - Urgent [950]

Description: vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.vicarius.io, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.43862, EPSS Percentile is 0.97462

5. Authentication Bypass - TeamCity (CVE-2024-27198) - Urgent [946]

Description: In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:GENIUSZLYY:CVE-2024-27198, Vulners:PublicExploit:GitHub:K3YSTR0K3R:CVE-2024-27198-EXPLOIT, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-27198, Vulners:PublicExploit:GitHub:STUUB:RCITY-CVE-2024-27198, Vulners:PublicExploit:GitHub:RAMPANTSPARK:CVE-2024-27198, Vulners:PublicExploit:GitHub:JRBH4CK:CVE-2024-27198, Vulners:PublicExploit:GitHub:YORYIO:CVE-2024-27198, Vulners:PublicExploit:GitHub:CHARONDEFALT:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:STUUB:RCITY-CVE-2024-27199, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:PASSWA11:CVE-2024-27198-RCE, Vulners:PublicExploit:GitHub:CHEBUYA:CVE-2024-30851-JASMIN-RANSOMWARE-PATH-TRAVERSAL-POC, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-JETBRAINS_TEAMCITY_RCE_CVE_2024_27198-, Vulners:PublicExploit:PACKETSTORM:177601 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714TeamCity is a build management and continuous integration server from JetBrains
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.96954, EPSS Percentile is 0.99838

6. Remote Code Execution - PaperCut NG (CVE-2023-27350) - Urgent [933]

Description: This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:EDB-ID:51452, Vulners:PublicExploit:EDB-ID:51391, Vulners:PublicExploit:1337DAY-ID-38767, Vulners:PublicExploit:1337DAY-ID-38704, Vulners:PublicExploit:1337DAY-ID-38623, Vulners:PublicExploit:PACKETSTORM:172512, Vulners:PublicExploit:PACKETSTORM:172780, Vulners:PublicExploit:PACKETSTORM:172022, Vulners:PublicExploit:GitHub:IMANCYBERSECURITY:CVE-2023-27350-POC, Vulners:PublicExploit:GitHub:GETDRIVE:PAPERCUT, Vulners:PublicExploit:GitHub:WHUTW00T:CVE-2023-27350, Vulners:PublicExploit:GitHub:MAANVADER:CVE-2023-27350-POC, Vulners:PublicExploit:GitHub:ADHIKARA13:CVE-2023-27350, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-27350, Vulners:PublicExploit:GitHub:TAMINGSARIMY:CVE-2023-27350-POC, Vulners:PublicExploit:GitHub:PARI-MALAM:CVE-2023-27350, Vulners:PublicExploit:GitHub:JENDERAL92:CVE-2023-27350, Vulners:PublicExploit:SAINT:648936FBB2CAC7D3895D33C618D275A9, Vulners:PublicExploit:SAINT:265661B74BC72F0361AE7BB83EAC4EA3, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-PAPERCUT_NG_AUTH_BYPASS-, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614PaperCut NG is a comprehensive print management system designed to seamlessly monitor and control your resources with easy to use administrative and user tools that can be securely accessed from anywhere on the network though a web browser
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.9687, EPSS Percentile is 0.99818

7. Command Injection - Ivanti Connect Secure (CVE-2024-21887) - Urgent [932]

Description: A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21887, Vulners:PublicExploit:GitHub:TUCOMMENCEAPOUSSER:CVE-2024-21887, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:RAMINKARIMKHANI1996:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805_CVE-2024-21887_SCANNER, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21893-TO-CVE-2024-21887, Vulners:PublicExploit:GitHub:MICKDEC:CVE-2023-46805_CVE-2024-21887_SCAN_GROUPED, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805, Vulners:PublicExploit:GitHub:RXWX:PULSE-METER, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2023_46805-, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:1337DAY-ID-39263, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:SAINT:CBB2F1CA8B177BA96AECA3D1FB0C7611, Vulners:PublicExploit:SAINT:60BDA75642503EC398357486212FA6C7, Vulners:PublicExploit:PACKETSTORM:176668, Vulners:PublicExploit:PACKETSTORM:177229, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.910CVSS Base Score is 9.1. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.97108, EPSS Percentile is 0.99884

8. Authentication Bypass - Jenkins (CVE-2024-23897) - Urgent [929]

Description: {'nvd_cve_data_all': 'Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.vicarius.io, Vulners:PublicExploit:PACKETSTORM:180621, Vulners:PublicExploit:PACKETSTORM:176840, Vulners:PublicExploit:PACKETSTORM:178047, Vulners:PublicExploit:EDB-ID:51993, Vulners:PublicExploit:GitHub:SAFEER-ACCUKNOX:JENKINS-ARGS4J-CVE-2024-23897-POC, Vulners:PublicExploit:GitHub:VERYLAZYTECH:CVE-2024-23897, Vulners:PublicExploit:GitHub:ZGIMSZHD61:CVE-2024-23897-POC, Vulners:PublicExploit:GitHub:VISZSEC:CVE-2024-23897, Vulners:PublicExploit:GitHub:CC3305:CVE-2024-23897, Vulners:PublicExploit:GitHub:ABO5:CVE-2024-23897, Vulners:PublicExploit:GitHub:THATNOTEASY:CVE-2024-23897, Vulners:PublicExploit:GitHub:MIL4NE:CVE-2024-23897-JENKINS-4.441, Vulners:PublicExploit:GitHub:NEBIAN:CVE-2024-23897, Vulners:PublicExploit:GitHub:CKEVENS:CVE-2024-23897, Vulners:PublicExploit:GitHub:IFCONFIG-ME:CVE-2024-23897, Vulners:PublicExploit:GitHub:D1SE0:CVE-2024-23897-VULNERABILIDAD-JENKINS, Vulners:PublicExploit:GitHub:ATHULYA666:CVE-2024-23897, Vulners:PublicExploit:GitHub:PULENTOSKI:CVE-2024-23897-SCANER, Vulners:PublicExploit:GitHub:MAALFER:CVE-2024-23897, Vulners:PublicExploit:GitHub:VMTYAN:POC-CVE-2024-23897, Vulners:PublicExploit:GitHub:XAITAX:CVE-2024-23897, Vulners:PublicExploit:GitHub:WJLIN0:CVE-2024-23897, Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-23897, Vulners:PublicExploit:GitHub:ANASTASIASTILL:CVE-2024-23897, Vulners:PublicExploit:GitHub:YORYIO:CVE-2024-23897, Vulners:PublicExploit:GitHub:ABRAXA5:JENKINS-CVE-2024-23897, Vulners:PublicExploit:GitHub:RAHEEL0X01:CVE-2024-23897, Vulners:PublicExploit:GitHub:VOZEC:CVE-2024-23897, Vulners:PublicExploit:GitHub:B4CK4TT4CK:CVE-2024-23897, Vulners:PublicExploit:GitHub:JOPRAVEEN:CVE-2024-23897, Vulners:PublicExploit:GitHub:BINGANAO:CVE-2024-23897, Vulners:PublicExploit:GitHub:PRAISON001:CVE-2024-23897-JENKINS-ARBITRARY-READ-FILE-VULNERABILITY, Vulners:PublicExploit:GitHub:PULENTOSKI:CVE-2024-23897-ARBITRARY-FILE-READ, Vulners:PublicExploit:GitHub:GODYLOCKZ:CVE-2024-23897, Vulners:PublicExploit:GitHub:JENKINSCI-CERT:SECURITY-3314-3315, Vulners:PublicExploit:GitHub:I-100-USER:CVE-2024-25897, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:MSF:AUXILIARY-GATHER-JENKINS_CLI_AMPERSAND_ARBITRARY_FILE_READ-, Vulners:PublicExploit:1337DAY-ID-39274, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.614Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery.
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.9733, EPSS Percentile is 0.99952

9. Code Injection - MOVEit Transfer (CVE-2023-34362) - Urgent [927]

Description: In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-34362, Vulners:PublicExploit:GitHub:GLEN-PEARSON:MOVEIT-CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:DEEPINSTINCT:MOVEIT_CVE-2023-34362_IOCS, Vulners:PublicExploit:GitHub:SFEWER-R7:CVE-2023-34362, Vulners:PublicExploit:GitHub:GLEN-PEARSON:CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:MALWAREMAN007:CVE-2023-34362, Vulners:PublicExploit:GitHub:ERRORFIATHCK:MOVEIT-EXPLOIT, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-26067, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:173110, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-MOVEIT_CVE_2023_34362-, Vulners:PublicExploit:1337DAY-ID-38820, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems.
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.97131, EPSS Percentile is 0.9989

10. Authentication Bypass - Ivanti Connect Secure (CVE-2023-46805) - Urgent [922]

Description: An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:GitHub:CBEEK-R7:CVE-2023-46805, Vulners:PublicExploit:GitHub:CAPPRICIO-SECURITIES:CVE-2023-46805, Vulners:PublicExploit:GitHub:W2XIM3:CVE-2023-46805, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2023-46805, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805_CVE-2024-21887_SCANNER, Vulners:PublicExploit:GitHub:MICKDEC:CVE-2023-46805_CVE-2024-21887_SCAN_GROUPED, Vulners:PublicExploit:GitHub:YORYIO:CVE-2023-46805, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2023-21887, Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:RAMINKARIMKHANI1996:CVE-2023-46805_CVE-2024-21887, Vulners:PublicExploit:GitHub:ZWXXB:CVE-2024-21887, Vulners:PublicExploit:GitHub:RXWX:PULSE-METER, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:SAINT:CBB2F1CA8B177BA96AECA3D1FB0C7611, Vulners:PublicExploit:SAINT:60BDA75642503EC398357486212FA6C7, Vulners:PublicExploit:PACKETSTORM:176668, Vulners:PublicExploit:PACKETSTORM:177229, Vulners:PublicExploit:1337DAY-ID-39263, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2023_46805-, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.810CVSS Base Score is 8.2. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.96405, EPSS Percentile is 0.99708

11. Authentication Bypass - Ivanti Connect Secure (CVE-2024-21893) - Urgent [922]

Description: A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-21893.PY, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21893-TO-CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:PACKETSTORM:177229 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.714Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources
CVSS Base Score0.810CVSS Base Score is 8.2. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.95981, EPSS Percentile is 0.99627

12. Remote Code Execution - FortiClientEMS (CVE-2023-48788) - Urgent [916]

Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-48788, Vulners:PublicExploit:1337DAY-ID-39585, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-FORTICLIENT_EMS_FCTID_SQLI-, Vulners:PublicExploit:PACKETSTORM:178230 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client)
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.96791, EPSS Percentile is 0.99795

13. Remote Code Execution - FortiManager (CVE-2024-47575) - Urgent [916]

Description: A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:fortiguard.fortinet.com, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-47575-EXP, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:FORTIJUMP-EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:GitHub:SKYALLIANCE:EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-MISC-FORTIMANAGER_RCE_CVE_2024_47575-, Vulners:PublicExploit:PACKETSTORM:182936, Vulners:PublicExploit:1337DAY-ID-39826, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.87146, EPSS Percentile is 0.98897

14. Remote Code Execution - PAN-OS (CVE-2024-3400) - Urgent [916]

Description: A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.volexity.com, Vulners:PublicExploit:GitHub:MURRAYR0123:CVE-2024-3400_COMPROMISE_CHECKER, Vulners:PublicExploit:GitHub:TERMINALJUNKI3:CVE-2024-3400-CHECKER, Vulners:PublicExploit:GitHub:ADMI-N:CVE-2024-3400-RCE-COPY, Vulners:PublicExploit:GitHub:KR0FF:CVE-2024-3400, Vulners:PublicExploit:GitHub:CODEBLUEPRINT:CVE-2024-3400, Vulners:PublicExploit:GitHub:ZEPHRFISH:CVE-2024-3400-CANARY, Vulners:PublicExploit:GitHub:FOXYPROXYS:CVE-2024-3400, Vulners:PublicExploit:GitHub:ZAM89:CVE-2024-3400-POT, Vulners:PublicExploit:GitHub:HACKINGLZ:PANRAPIDCHECK, Vulners:PublicExploit:GitHub:ANDRELIA-HACKS:CVE-2024-3400, Vulners:PublicExploit:GitHub:SWAYBS:CVE-2024-3400, Vulners:PublicExploit:GitHub:MARCONESLER:CVE-2024-3400, Vulners:PublicExploit:GitHub:YUVVI01:CVE-2024-3400, Vulners:PublicExploit:GitHub:0X0D3AD:CVE-2024-3400, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400, Vulners:PublicExploit:GitHub:CONDITIONBLACK:CVE-2024-3400-POC, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-3400, Vulners:PublicExploit:GitHub:LOANVITOR:CVE-2024-3400-, Vulners:PublicExploit:GitHub:SHAMO0:CVE-2024-3400, Vulners:PublicExploit:GitHub:RETKOUSSA:CVE-2024-3400, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400-RCE, Vulners:PublicExploit:GitHub:MRR0B0T19:CVE-2024-3400, Vulners:PublicExploit:GitHub:DREWSKYDEV:CVE-2024-3400, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-3400-RCE-SCAN, Vulners:PublicExploit:GitHub:SCHOOLDROPOUT1337:CVE-2024-3400, Vulners:PublicExploit:GitHub:SXYRXYY:CVE-2024-3400-CHECK, Vulners:PublicExploit:GitHub:ADANIKAMAL:CVE-2024-3400, Vulners:PublicExploit:GitHub:MOMIKA233:CVE-2024-3400, Vulners:PublicExploit:GitHub:CERTUSHACK:CVE-2024-3400-POC, Vulners:PublicExploit:GitHub:PWNJ0HN:CVE-2024-3400, Vulners:PublicExploit:GitHub:AK1T4:CVE-2024-3400, Vulners:PublicExploit:GitHub:MURRAYR0123:CVE-2024-3400-COMPROMISE-CHECKER, Vulners:PublicExploit:GitHub:INDEX2014:CVE-2024-3400-CHECKER, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:178220, Vulners:PublicExploit:PACKETSTORM:178216, Vulners:PublicExploit:PACKETSTORM:178099, Vulners:PublicExploit:1337DAY-ID-39582, Vulners:PublicExploit:1337DAY-ID-39566, Vulners:PublicExploit:1337DAY-ID-39564, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-PANOS_TELEMETRY_CMD_EXEC-, Vulners:PublicExploit:EDB-ID:51996, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score1.010CVSS Base Score is 10.0. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.96392, EPSS Percentile is 0.99704

15. Remote Code Execution - Veeam Backup & Replication (CVE-2024-40711) - Urgent [916]

Description: A deserialization of untrusted data vulnerability in Veeam Backup & Replication can allow an unauthenticated remote code execution (RCE).

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:labs.watchtowr.com, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:CVE-2024-40711, Vulners:PublicExploit:GitHub:REALSTATUS:CVE-2024-40711-EXP, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.96449, EPSS Percentile is 0.99718

16. Remote Code Execution - VMware vCenter (CVE-2024-38812) - Urgent [914]

Description: The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00416, EPSS Percentile is 0.7398

17. Authentication Bypass - Acronis Cyber Infrastructure (CVE-2023-45249) - Urgent [913]

Description: Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181993, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-ACRONIS_CYBER_INFRA_CVE_2023_45249-, Vulners:PublicExploit:1337DAY-ID-39768 websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514A hyperconverged solution providing storage, compute, and network resources for businesses and service provider
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.88965, EPSS Percentile is 0.9899

18. Authentication Bypass - PAN-OS (CVE-2024-0012) - Urgent [913]

Description: An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:labs.watchtowr.com, Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:TALATUMLABS:CVE-2024-0012_CVE-2024-9474_POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:0XJESSIE21:CVE-2024-0012, Vulners:PublicExploit:GitHub:VEGETABLELASAGNE:CVE-2024-0012, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-PANOS_MANAGEMENT_UNAUTH_RCE-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.97042, EPSS Percentile is 0.99865

19. Elevation of Privilege - Windows Task Scheduler (CVE-2024-49039) - Urgent [904]

Description: Windows Task Scheduler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JE5442804:WPTASKSCHEDULER_CVE-2024-49039, Vulners:PublicExploit:GitHub:ALEXANDR-BIT253:CVE-2024-49039, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00677, EPSS Percentile is 0.79919

20. Remote Code Execution - FortiOS (CVE-2024-21762) - Urgent [904]

Description: A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-21762-POC, Vulners:PublicExploit:GitHub:R4P3C4:CVE-2024-21762-EXPLOIT-POC-FORTINET-SSL-VPN-CHECK, Vulners:PublicExploit:GitHub:RDOIX:CVE-2024-21762-CHECKER, Vulners:PublicExploit:GitHub:C0D3B3AF:CVE-2024-21762-EXPLOIT, Vulners:PublicExploit:GitHub:BISHOPFOX:CVE-2024-21762-CHECK, Vulners:PublicExploit:GitHub:CLEVERG0D:CVE-2024-21762-CHECKER, Vulners:PublicExploit:GitHub:THEREDDEVIL1:CVE-2024-21762, Vulners:PublicExploit:GitHub:ZZCENTURY:FORTIGATE-CVE-2024-21762, Vulners:PublicExploit:GitHub:CODEB3AF:CVE-2024-21762-, Vulners:PublicExploit:GitHub:D0RB:CVE-2024-21762, Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-21762, Vulners:PublicExploit:GitHub:DISSEMINATOR:POC_CVE-2024-38856, Vulners:PublicExploit:PACKETSTORM:177602 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02071, EPSS Percentile is 0.88797

21. Security Feature Bypass - SugarCRM (CVE-2023-22952) - Urgent [903]

Description: In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:packetstormsecurity.com, Vulners:PublicExploit:1337DAY-ID-38255, Vulners:PublicExploit:PACKETSTORM:171320, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-SUGARCRM_WEBSHELL_CVE_2023_22952-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.614SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.61314, EPSS Percentile is 0.97974

22. Command Injection - Barracuda Email Security Gateway (CVE-2023-2868) - Urgent [899]

Description: A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product effecting versions 5.1.3.001-9.2.0.006. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). The vulnerability stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product. This issue was fixed as part of BNSF-36456 patch. This patch was automatically applied to all customer appliances.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CFIELDING-R7:POC-CVE-2023-2868, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common0.514The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.07893, EPSS Percentile is 0.94255

23. Elevation of Privilege - Windows Kernel (CVE-2024-30088) - Urgent [897]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:EXPLOITS-FORSALE:COLLATERAL-DAMAGE, Vulners:PublicExploit:GitHub:ZOMBIE-KAISER:CVE-2024-30088-WINDOWS-POC, Vulners:PublicExploit:GitHub:ADMIN9961:CVE-2024-30088, Vulners:PublicExploit:GitHub:NEXTGENPENTESTERS:CVE-2024-30088-, Vulners:PublicExploit:GitHub:TYKAWAII98:CVE-2024-30088, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:PACKETSTORM:181593, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-LOCAL-CVE_2024_30088_AUTHZ_BASEP-, Vulners:PublicExploit:1337DAY-ID-39753, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00654, EPSS Percentile is 0.79535

24. Elevation of Privilege - nftables (CVE-2024-1086) - Urgent [897]

Description: A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:pwning.tech, Vulners:PublicExploit:GitHub:PL0XE:CVE-2024-1086, Vulners:PublicExploit:GitHub:CCIEVOICE2009:CVE-2024-1086, Vulners:PublicExploit:GitHub:LLFAM:CVE-2024-1086, Vulners:PublicExploit:GitHub:KEVCOOPER:CVE-2024-1086-CHECKER, Vulners:PublicExploit:GitHub:NOTSELWYN:CVE-2024-1086, Vulners:PublicExploit:GitHub:XZX482:CVE-2024-1086, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00413, EPSS Percentile is 0.7388

25. Remote Code Execution - Windows MSHTML Platform (CVE-2023-35628) - Urgent [895]

Description: Windows MSHTML Platform Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on GitHub website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00223, EPSS Percentile is 0.60433

26. Elevation of Privilege - Windows Installer (CVE-2024-38014) - Urgent [892]

Description: Windows Installer Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181954, Vulners:PublicExploit:PACKETSTORM:182142 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00796, EPSS Percentile is 0.81546

27. Elevation of Privilege - Windows Kernel (CVE-2024-21338) - Urgent [885]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:decoded.avast.io, Vulners:PublicExploit:1337DAY-ID-39515, Vulners:PublicExploit:EDB-ID:51946, Vulners:PublicExploit:GitHub:UMU618:CVE-2024-21338, Vulners:PublicExploit:GitHub:HAKAIOFFSEC:CVE-2024-21338, Vulners:PublicExploit:GitHub:TYKAWAII98:CVE-2024-21338_POC, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-21338, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:177869, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00176, EPSS Percentile is 0.55258

28. Elevation of Privilege - Windows DWM Core Library (CVE-2024-30051) - Urgent [880]

Description: Windows DWM Core Library Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:FORTRA:CVE-2024-30051, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00379, EPSS Percentile is 0.72772

29. Security Feature Bypass - SmartScreen Prompt (CVE-2024-29988) - Urgent [875]

Description: SmartScreen Prompt Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514SmartScreen Prompt
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02206, EPSS Percentile is 0.89152

30. Information Disclosure - cloudguard_network_security (CVE-2024-24919) - Urgent [874]

Description: Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:GLOBALSECUREACADEMY:CVE-2024-24919, Vulners:PublicExploit:GitHub:GUAYOYOCYBER:CVE-2024-24919, Vulners:PublicExploit:GitHub:RUG4LO:CVE-2024-24919-EXPLOIT, Vulners:PublicExploit:GitHub:VULNPIRE:CVE-2024-24919, Vulners:PublicExploit:GitHub:BIGB0X:CVE-2024-24919-SNIPER, Vulners:PublicExploit:GitHub:0XANS:CVE-2024-24919, Vulners:PublicExploit:GitHub:TIM-HOEKSTRA:CVE-2024-24919, Vulners:PublicExploit:GitHub:B1NARYO:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:STARLOX0:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:REVOLTSECURITIES:CVE-2024-24919, Vulners:PublicExploit:GitHub:J4F9S5D2Q7:CVE-2024-24919, Vulners:PublicExploit:GitHub:ZAM89:CVE-2024-24919, Vulners:PublicExploit:GitHub:UN9NPLAYER:CVE-2024-24919, Vulners:PublicExploit:GitHub:IFCONFIG-ME:CVE-2024-24919-BULK-SCANNER, Vulners:PublicExploit:GitHub:GENIUSZLYY:CVE-2024-24919, Vulners:PublicExploit:GitHub:YN1337:CVE-2024-24919, Vulners:PublicExploit:GitHub:GOATSECURITY:CVE-2024-24919, Vulners:PublicExploit:GitHub:PEWC0:CVE-2024-24919, Vulners:PublicExploit:GitHub:JSEBASTIANHERRERA:CVE-2024-24919, Vulners:PublicExploit:GitHub:PRAISON001:CVE-2024-24919-CHECK-POINT-REMOTE-ACCESS-VPN, Vulners:PublicExploit:GitHub:SATCHHACKER:CVE-2024-24919, Vulners:PublicExploit:GitHub:MR-KASIM-MEHAR:CVE-2024-24919-EXPLOIT, Vulners:PublicExploit:GitHub:MR-KASIM-MEHAR:CVE-2024-24919, Vulners:PublicExploit:GitHub:VERYLAZYTECH:CVE-2024-24919, Vulners:PublicExploit:GitHub:R4P3C4:CVE-2024-24919-EXPLOIT-POC-CHECKPOINT-FIREWALL-VPN, Vulners:PublicExploit:GitHub:GURUDATTCH:CVE-2024-24919, Vulners:PublicExploit:GitHub:MOHAMEDWAGDY7:CVE-2024-24919, Vulners:PublicExploit:GitHub:SATRIARIZKA:CVE-2024-24919, Vulners:PublicExploit:GitHub:SKYROWALKER:CVE-2024-24919, Vulners:PublicExploit:GitHub:3UR:CVE-2024-24919, Vulners:PublicExploit:GitHub:BYTENULL00:CVE-2024-24919, Vulners:PublicExploit:GitHub:PROTONNEGATIVO:CVE-2024-24919, Vulners:PublicExploit:GitHub:FERNANDOBORTOTTI:CVE-2024-24919, Vulners:PublicExploit:GitHub:SEED1337:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:NINGXIN2002:CHECK-POINT_POC, Vulners:PublicExploit:GitHub:0X3F3C:CVE-2024-24919, Vulners:PublicExploit:GitHub:EMANUELDOSREIS:CVE-2024-24919, Vulners:PublicExploit:GitHub:J4F9S5D2Q7:CVE-2024-24919-CHECKPOINT, Vulners:PublicExploit:GitHub:0NIN0HANZ0:CVE-2024-24919-POC, Vulners:PublicExploit:GitHub:LUCASKATASHI:CVE-2024-24919, Vulners:PublicExploit:GitHub:CAPPRICIO-SECURITIES:CVE-2024-24919, Vulners:PublicExploit:PACKETSTORM:180654, Vulners:PublicExploit:PACKETSTORM:178872, Vulners:PublicExploit:EDB-ID:52029, Vulners:PublicExploit:MSF:AUXILIARY-GATHER-CHECKPOINT_GATEWAY_FILEREAD_CVE_2024_24919- websites
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.514Product detected by a:checkpoint:cloudguard_network_security (does NOT exist in CPE dict)
CVSS Base Score0.910CVSS Base Score is 8.6. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.95818, EPSS Percentile is 0.99601

31. Security Feature Bypass - Internet Shortcut Files (CVE-2024-21412) - Urgent [863]

Description: Internet Shortcut Files Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:WR00T:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:LSR00TER:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT, BDU:PublicExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.514Internet Shortcut Files
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02838, EPSS Percentile is 0.90513

32. Elevation of Privilege - Windows Kernel-Mode Driver (CVE-2024-35250) - Urgent [856]

Description: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:YINSEL:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:0XJIEFENG:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-35250, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-LOCAL-CVE_2024_35250_KS_DRIVER-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.510EPSS Probability is 0.00115, EPSS Percentile is 0.46236

33. Elevation of Privilege - PAN-OS (CVE-2024-9474) - Urgent [854]

Description: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:labs.watchtowr.com, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:TALATUMLABS:CVE-2024-0012_CVE-2024-9474_POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-PANOS_MANAGEMENT_UNAUTH_RCE-, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls
CVSS Base Score0.710CVSS Base Score is 7.2. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.9749, EPSS Percentile is 0.99988

34. Cross Site Scripting - Roundcube (CVE-2024-37383) - Urgent [838]

Description: Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:1337DAY-ID-39822, Vulners:PublicExploit:GitHub:BARTFROKLAGE:CVE-2024-37383-POC, Vulners:PublicExploit:GitHub:AMIRZARGHAM:CVE-2024-37383-EXPLOIT, BDU:PublicExploit websites
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.03322, EPSS Percentile is 0.91244

35. Remote Code Execution - Microsoft Outlook (CVE-2024-21378) - Urgent [838]

Description: Microsoft Outlook Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:D0RB:CVE-2024-21378, Vulners:PublicExploit:GitHub:JOHNHORMOND:CVE-2024-21378, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00068, EPSS Percentile is 0.3199

36. Elevation of Privilege - Windows Common Log File System Driver (CVE-2024-49138) - Urgent [832]

Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on GitHub:MrAle98:CVE-2024-49138-POC website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00054, EPSS Percentile is 0.25505

37. Elevation of Privilege - Microsoft Exchange (CVE-2024-21410) - Urgent [826]

Description: Microsoft Exchange Server Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.03416, EPSS Percentile is 0.9136

38. Authentication Bypass - Hunk Companion WordPress plugin (CVE-2024-11972) - Urgent [822]

Description: The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on WPScan website
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JUNTAKEMURA:EXPLOIT-CVE-2024-11972, BDU:PublicExploit websites
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.614Hunk Companion is a WordPress plugin designed to complement and enhance the functionality of themes developed by ThemeHunk, a provider of customizable WordPress themes
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11287

39. Security Feature Bypass - Windows MSHTML Platform (CVE-2024-30040) - Urgent [811]

Description: Windows MSHTML Platform Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0066, EPSS Percentile is 0.79643

40. Elevation of Privilege - Windows Ancillary Function Driver for WinSock (CVE-2024-38193) - Urgent [808]

Description: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NEPHSTER:CVE-2024-38193, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11391

41. Elevation of Privilege - Windows Print Spooler (CVE-2022-38028) - Urgent [802]

Description: Windows Print Spooler Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.01233, EPSS Percentile is 0.85283

42. Security Feature Bypass - Windows SmartScreen (CVE-2024-21351) - Urgent [800]

Description: Windows SmartScreen Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge
CVSS Base Score0.810CVSS Base Score is 7.6. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0066, EPSS Percentile is 0.79643

Critical (23)

43. Path Traversal - Zyxel firewall (CVE-2024-11667) - Critical [795]

Description: A directory traversal vulnerability in the web management interface of Zyxel firewall firmware could allow an attacker to download or upload files via a crafted URL.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU, sekoia.io: Helldown Ransomware websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.715Path Traversal
Vulnerable Product is Common0.714Firewalls manufactured by Zyxel
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.18846, EPSS Percentile is 0.96262

44. Security Feature Bypass - Artifex Ghostscript (CVE-2024-29510) - Critical [794]

Description: Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:MSF:EXPLOIT-MULTI-FILEFORMAT-GHOSTSCRIPT_FORMAT_STRING_CVE_2024_29510-, Vulners:PublicExploit:1337DAY-ID-39687, Vulners:PublicExploit:PACKETSTORM:179645, Vulners:PublicExploit:GitHub:SWSMITH2391:CVE-2024-29510, BDU:PublicExploit websites
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.314Artifex Ghostscript is an interpreter for the PostScript® language and PDF files
CVSS Base Score0.610CVSS Base Score is 6.3. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00722, EPSS Percentile is 0.80571

45. Elevation of Privilege - Windows Error Reporting Service (CVE-2024-26169) - Critical [791]

Description: Windows Error Reporting Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0067, EPSS Percentile is 0.79777

46. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38213) - Critical [776]

Description: Windows Mark of the Web Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.710EPSS Probability is 0.00311, EPSS Percentile is 0.69872

47. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38217) - Critical [764]

Description: Windows Mark of the Web Security Feature Bypass Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.915Security Feature Bypass
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.510CVSS Base Score is 5.4. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.0056, EPSS Percentile is 0.77674

48. Spoofing - Windows MSHTML Platform (CVE-2024-43461) - Critical [734]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.910EPSS Probability is 0.02523, EPSS Percentile is 0.89881

49. Remote Code Execution - Juniper JunOS (CVE-2024-21591) - Critical [728]

Description: An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS), or Remote Code Execution (RCE) and obtain root privileges on the device. This issue is caused by use of an insecure function allowing an attacker to overwrite arbitrary memory. This issue affects Juniper Networks Junos OS SRX Series and EX Series: * Junos OS versions earlier than 20.4R3-S9; * Junos OS 21.2 versions earlier than 21.2R3-S7; * Junos OS 21.3 versions earlier than 21.3R3-S5; * Junos OS 21.4 versions earlier than 21.4R3-S5; * Junos OS 22.1 versions earlier than 22.1R3-S4; * Junos OS 22.2 versions earlier than 22.2R3-S3; * Junos OS 22.3 versions earlier than 22.3R3-S2; * Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:curesec.com, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00452, EPSS Percentile is 0.75074

50. Spoofing - Windows NTLM (CVE-2024-43451) - Critical [715]

Description: NTLM Hash Disclosure Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.914A suite of security protocols to authenticate users' identity and protect the integrity and confidentiality of their activity
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00939, EPSS Percentile is 0.82993

51. Elevation of Privilege - Windows Kernel (CVE-2024-38106) - Critical [712]

Description: Windows Kernel Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11391

52. Spoofing - Windows MSHTML Platform (CVE-2024-38112) - Critical [710]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00562, EPSS Percentile is 0.77704

53. Spoofing - Windows MSHTML Platform (CVE-2024-43573) - Critical [710]

Description: Windows MSHTML Platform Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 8.1. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.01109, EPSS Percentile is 0.84405

54. Elevation of Privilege - Windows Power Dependency Coordinator (CVE-2024-38107) - Critical [707]

Description: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11391

55. Remote Code Execution - Windows Remote Desktop Licensing Service (CVE-2024-38077) - Critical [657]

Description: Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DESTINY0991:CHECK_38077, Vulners:PublicExploit:GitHub:MRMTWOJ:CVE-2024-38077, Vulners:PublicExploit:GitHub:BBD-YZZ:FYNE-GUI, Vulners:PublicExploit:GitHub:ZHUXI1965:CVE-2024-38077-RDLCHECK, Vulners:PublicExploit:GitHub:PSL-B:CVE-2024-38077-CHECK, Vulners:PublicExploit:GitHub:CLOUDCROWSEC001:CVE-2024-38077-POC, Vulners:PublicExploit:GitHub:MURPHYSECURITY:RDL-DETECT, Vulners:PublicExploit:GitHub:ATLASSION:CVE-2024-38077-CHECK, Vulners:PublicExploit:GitHub:QI4L:CVE-2024-38077, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Windows component
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00053, EPSS Percentile is 0.23584

56. Remote Code Execution - XWiki Platform (CVE-2024-31982) - Critical [652]

Description: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TH3GOKUL:CVE-2024-31982, Vulners:PublicExploit:GitHub:BIGB0X:CVE-2024-31982, Vulners:PublicExploit:GitHub:K3LPI3B4NSH33:CVE-2024-31982, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm
CVSS Base Score1.010CVSS Base Score is 10.0. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.29317

57. Spoofing - Microsoft Exchange (CVE-2024-49040) - Critical [651]

Description: Microsoft Exchange Server Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU, Kaspersky websites
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.814Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft
CVSS Base Score0.810CVSS Base Score is 7.5. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00073, EPSS Percentile is 0.34022

58. Elevation of Privilege - needrestart (CVE-2024-48990) - Critical [637]

Description: Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CYB3RFR0G:CVE-2024-48990-POC, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990, Vulners:PublicExploit:GitHub:ALLY-PETITT:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:NULLBYTE-7W7:CVE-2024-48990, Vulners:PublicExploit:GitHub:NS989:CVE-2024-48990, Vulners:PublicExploit:GitHub:PENTESTFUNCTIONS:CVE-2024-48990-POC-TESTING, Vulners:PublicExploit:GitHub:MAKUGA01:CVE-2024-48990-POC, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-LOCAL-UBUNTU_NEEDRESTART_LPE-, Vulners:PublicExploit:1337DAY-ID-39817, Vulners:PublicExploit:PACKETSTORM:182765 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.714Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.610EPSS Probability is 0.00253, EPSS Percentile is 0.64541

59. Remote Code Execution - Microsoft Outlook (CVE-2024-21413) - Critical [635]

Description: Microsoft Outlook Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HYZ3K:CVE-2024-21413, Vulners:PublicExploit:GitHub:THEMEHACKERS:CVE-2024-21413, Vulners:PublicExploit:GitHub:MDUSMANDASTHAHEER:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:LABESTEROCT:CVE-2024-21413, Vulners:PublicExploit:GitHub:AHMETKARAKAYAOFFICAL:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:CMNATIC:CVE-2024-21413, Vulners:PublicExploit:GitHub:TH3HELLION:CVE-2024-21413, Vulners:PublicExploit:GitHub:XAITAX:CVE-2024-21413-MICROSOFT-OUTLOOK-REMOTE-CODE-EXECUTION-VULNERABILITY, Vulners:PublicExploit:GitHub:D1SE0:CVE-2024-21413-VULNERABILIDAD-OUTLOOK-LAB, Vulners:PublicExploit:GitHub:MSEYMEND:CVE-2024-21413, Vulners:PublicExploit:GitHub:DEVAKABARI:CVE-2024-21413, Vulners:PublicExploit:GitHub:DUY-31:CVE-2024-21413, Vulners:PublicExploit:GitHub:R00TB1T:CVE-2024-21413-POC, Vulners:PublicExploit:GitHub:DSHABANI96:CVE-2024-21413, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00063, EPSS Percentile is 0.29196

60. Code Injection - The Events Calendar plugin for WordPress (CVE-2024-8275) - Critical [630]

Description: The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:P33D:CVE-2024-8275, Vulners:PublicExploit:GitHub:WHITEROSE7777:CVE-2024-8275 websites
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614The Events Calendar is a plugin for creating an events listing website
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00065, EPSS Percentile is 0.30817

61. Remote Code Execution - FortiOS (CVE-2023-42789) - Critical [630]

Description: A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CRIMBIT:CVE-2023-42789-POC, Vulners:PublicExploit:GitHub:JHONNYBONNY:CVE-2023-42789 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00091, EPSS Percentile is 0.40508

62. Information Disclosure - Microsoft Outlook (CVE-2023-35636) - Critical [629]

Description: Microsoft Outlook Information Disclosure Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-35636 website
Criticality of Vulnerability Type0.8315Information Disclosure
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score0.710CVSS Base Score is 6.5. According to NVD data source
EPSS Percentile0.810EPSS Probability is 0.00731, EPSS Percentile is 0.80698

63. Elevation of Privilege - Windows Common Log File System Driver (CVE-2023-36424) - Critical [618]

Description: Windows Common Log File System Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NASSIM-ASRIR:CVE-2023-36424, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.310EPSS Probability is 0.00061, EPSS Percentile is 0.28173

64. Remote Code Execution - Apache Struts (CVE-2024-53677) - Critical [616]

Description: File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on FileuploadInterceptor your application is safe. You can find more details in  https://cwiki.apache.org/confluence/display/WW/S2-067

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TAM-K592:CVE-2024-53677-S2-067, Vulners:PublicExploit:GitHub:DUSTBLESSNOTDUST:CVE-2024-53677-S2-067-THREAD, Vulners:PublicExploit:GitHub:0XDEVINER:CVE-2024-53677, Vulners:PublicExploit:GitHub:CLOUDWAFS:S2-067-CVE-2024-53677, Vulners:PublicExploit:GitHub:YANGYANGLO:CVE-2024-53677, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-53677-S2-067, Vulners:PublicExploit:GitHub:C4OOCO:CVE-2024-53677-DOCKER websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. It favors convention over configuration, is extensible using a plugin architecture, and ships with plugins to support REST, AJAX and JSON
CVSS Base Score0.910CVSS Base Score is 9.5. According to Vulners data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11287

65. Elevation of Privilege - Windows CSC Service (CVE-2024-26229) - Critical [606]

Description: Windows CSC Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CRACKED5PIDER:EOP24-26229, Vulners:PublicExploit:GitHub:NVISOSECURITY:CVE-2024-26229-BOF, Vulners:PublicExploit:GitHub:MQXMM:CVE-2024-26229, Vulners:PublicExploit:GitHub:TEAM-MINEDEV:CVE-2024-26229, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-26229, Vulners:PublicExploit:GitHub:0XJ175:DRIVE, Vulners:PublicExploit:GitHub:RALFHACKER:CVE-2024-26229-EXPLOIT, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.814Windows component
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.23248

High (9)

66. Remote Code Execution - Fluent Bit (CVE-2024-4323) - High [595]

Description: A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:D0RB:CVE-2024-4323, Vulners:PublicExploit:GitHub:SKILFOY:CVE-2024-4323-EXPLOIT-POC, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.514Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11287

67. Elevation of Privilege - Kernel Streaming WOW Thunk Service Driver (CVE-2024-38144) - High [592]

Description: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on BDU:PublicExploit, SSD Secure Disclosure websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Kernel Streaming WOW Thunk Service Driver
CVSS Base Score0.910CVSS Base Score is 8.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00084, EPSS Percentile is 0.38007

68. Authentication Bypass - Veeam Backup & Replication (CVE-2024-29849) - High [591]

Description: Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SINSINOLOGY:CVE-2024-29849 website
Criticality of Vulnerability Type0.9815Authentication Bypass
Vulnerable Product is Common0.514Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11287

69. Elevation of Privilege - LiteSpeed Cache WordPress plugin (CVE-2024-28000) - High [585]

Description: Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ALUCARD0X1:CVE-2024-28000, Vulners:PublicExploit:GitHub:JOHNDOEANONITA:CVE-2024-28000, Vulners:PublicExploit:GitHub:SSSSUPERX:CVE-2024-28000, Vulners:PublicExploit:GitHub:ARCH1M3D:CVE-2024-28000, Vulners:PublicExploit:GitHub:EBRASHA:CVE-2024-28000 websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.614WordPress plugin
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.110EPSS Probability is 0.00043, EPSS Percentile is 0.11616

70. Spoofing - Proxy Driver (CVE-2024-26234) - High [577]

Description: Proxy Driver Spoofing Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on BDU website
Exploit Exists0.517The existence of a private exploit is mentioned on BDU:PrivateExploit website
Criticality of Vulnerability Type0.415Spoofing
Vulnerable Product is Common0.514Proxy Driver
CVSS Base Score0.710CVSS Base Score is 6.7. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00052, EPSS Percentile is 0.23248

71. Remote Code Execution - Atlassian Confluence (CVE-2024-21683) - High [569]

Description: This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an admin-authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-ATLASSIAN_CONFLUENCE_RCE_CVE_2024_21683-, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:XH4VM:CVE-2024-21683, Vulners:PublicExploit:GitHub:PHUCRIO:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-21683-RCE, Vulners:PublicExploit:PACKETSTORM:179507, Vulners:PublicExploit:1337DAY-ID-39681 websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Confluence is a web-based corporate wiki
CVSS Base Score0.010CVSS Base Score is NA. No data.
EPSS Percentile0.610EPSS Probability is 0.00256, EPSS Percentile is 0.64777

72. Elevation of Privilege - Microsoft Streaming Service (CVE-2024-30090) - High [544]

Description: Microsoft Streaming Service Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DOR00TKIT:CVE-2024-30090, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.514Microsoft Streaming Service
CVSS Base Score0.710CVSS Base Score is 7.0. According to NVD data source
EPSS Percentile0.210EPSS Probability is 0.00048, EPSS Percentile is 0.19707

73. Remote Code Execution - VMware vCenter (CVE-2024-37079) - High [461]

Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists017The existence of publicly available or private exploit is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.41209

74. Remote Code Execution - VMware vCenter (CVE-2024-37080) - High [461]

Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT mentioned in available Data Sources
Exploit Exists017The existence of publicly available or private exploit is NOT mentioned in available Data Sources
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile0.410EPSS Probability is 0.00093, EPSS Percentile is 0.41209

Medium (0)

Low (0)

Exploitation in the wild detected (55)

Authentication Bypass (8)

Remote Code Execution (12)

Command Injection (2)

Code Injection (1)

Elevation of Privilege (15)

Security Feature Bypass (8)

Information Disclosure (1)

Cross Site Scripting (1)

Path Traversal (1)

Spoofing (6)

Public exploit exists, but exploitation in the wild is NOT detected (17)

Remote Code Execution (8)

Elevation of Privilege (6)

Code Injection (1)

Information Disclosure (1)

Authentication Bypass (1)

Other Vulnerabilities (2)

Remote Code Execution (2)