Report Name: pt_trend_cve_combined2024 reportGenerated: 2024-12-04 18:21:31
Product Name | Prevalence | U | C | H | M | L | A | Comment |
---|---|---|---|---|---|---|---|---|
GitLab | 0.9 | 1 | 1 | GitLab is a DevOps software package that combines the ability to develop, secure, and operate software in a single application | ||||
Windows Kernel | 0.9 | 2 | 1 | 3 | Windows Kernel | |||
nftables | 0.9 | 1 | 1 | nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames | ||||
Juniper JunOS | 0.8 | 1 | 1 | Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices | ||||
Microsoft Exchange | 0.8 | 1 | 1 | 2 | Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft | |||
PHP | 0.8 | 1 | 1 | PHP is a general-purpose scripting language geared towards web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. | ||||
Windows Ancillary Function Driver for WinSock | 0.8 | 1 | 1 | Windows component | ||||
Windows CSC Service | 0.8 | 1 | 1 | Windows component | ||||
Windows Common Log File System Driver | 0.8 | 1 | 1 | Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs | ||||
Windows DWM Core Library | 0.8 | 1 | 1 | Windows component | ||||
Windows Error Reporting Service | 0.8 | 1 | 1 | Windows component | ||||
Windows Installer | 0.8 | 1 | 1 | Windows component | ||||
Windows Kernel-Mode Driver | 0.8 | 1 | 1 | Windows component | ||||
Windows MSHTML Platform | 0.8 | 2 | 3 | 5 | Windows component | |||
Windows Mark of the Web | 0.8 | 2 | 2 | Windows component | ||||
Windows Power Dependency Coordinator | 0.8 | 1 | 1 | Windows component | ||||
Windows Print Spooler | 0.8 | 1 | 1 | Windows component | ||||
Windows Remote Desktop Licensing Service | 0.8 | 1 | 1 | Windows component | ||||
Windows SmartScreen | 0.8 | 1 | 1 | SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge | ||||
Windows Task Scheduler | 0.8 | 1 | 1 | Windows component | ||||
Atlassian Confluence | 0.7 | 1 | 1 | 2 | Confluence is a web-based corporate wiki | |||
Ivanti Connect Secure | 0.7 | 3 | 3 | Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources | ||||
TeamCity | 0.7 | 1 | 1 | TeamCity is a build management and continuous integration server from JetBrains | ||||
VMware vCenter | 0.7 | 2 | 2 | 4 | VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds | |||
XWiki Platform | 0.7 | 1 | 1 | XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm | ||||
Zyxel firewall | 0.7 | 1 | 1 | Firewalls manufactured by Zyxel | ||||
needrestart | 0.7 | 1 | 1 | Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot | ||||
Jenkins | 0.6 | 1 | 1 | Jenkins is an open source automation server. It helps automate the parts of software development related to building, testing, and deploying, facilitating continuous integration, and continuous delivery. | ||||
LiteSpeed Cache WordPress plugin | 0.6 | 1 | 1 | WordPress plugin | ||||
MOVEit Transfer | 0.6 | 1 | 1 | Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems. | ||||
Microsoft Outlook | 0.6 | 1 | 2 | 3 | Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites | |||
PaperCut NG | 0.6 | 1 | 1 | PaperCut NG is a comprehensive print management system designed to seamlessly monitor and control your resources with easy to use administrative and user tools that can be securely accessed from anywhere on the network though a web browser | ||||
Roundcube | 0.6 | 1 | 1 | Roundcube is a web-based IMAP email client | ||||
SugarCRM | 0.6 | 1 | 1 | SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams | ||||
The Events Calendar plugin for WordPress | 0.6 | 1 | 1 | The Events Calendar is a plugin for creating an events listing website | ||||
Acronis Cyber Infrastructure | 0.5 | 1 | 1 | A hyperconverged solution providing storage, compute, and network resources for businesses and service provider | ||||
Barracuda Email Security Gateway | 0.5 | 1 | 1 | The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks | ||||
Check Point Security Gateway | 0.5 | 1 | 1 | The Check Point Security Gateway is a core component of Check Point’s cybersecurity architecture, designed to protect networks and data by providing a range of security functions | ||||
Fluent Bit | 0.5 | 1 | 1 | Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces | ||||
FortiClientEMS | 0.5 | 1 | 1 | FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client) | ||||
FortiManager | 0.5 | 1 | 1 | FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances | ||||
FortiOS | 0.5 | 1 | 1 | 2 | FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches | |||
Internet Shortcut Files | 0.5 | 1 | 1 | Internet Shortcut Files | ||||
Microsoft Streaming Service | 0.5 | 1 | 1 | Microsoft Streaming Service | ||||
NTLM Hash Disclosure | 0.5 | 1 | 1 | NTLM Hash Disclosure | ||||
PAN-OS | 0.5 | 3 | 3 | PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls | ||||
Proxy Driver | 0.5 | 1 | 1 | Proxy Driver | ||||
SmartScreen Prompt | 0.5 | 1 | 1 | SmartScreen Prompt | ||||
Veeam Backup & Replication | 0.5 | 1 | 1 | 2 | Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors | |||
Artifex Ghostscript | 0.3 | 1 | 1 | Artifex Ghostscript is an interpreter for the PostScript® language and PDF files |
Vulnerability Type | Criticality | U | C | H | M | L | A |
---|---|---|---|---|---|---|---|
Remote Code Execution | 1.0 | 12 | 6 | 3 | 21 | ||
Authentication Bypass | 0.98 | 7 | 1 | 8 | |||
Code Injection | 0.97 | 1 | 1 | 2 | |||
Command Injection | 0.97 | 2 | 2 | ||||
Security Feature Bypass | 0.9 | 5 | 2 | 7 | |||
Elevation of Privilege | 0.85 | 9 | 5 | 5 | 19 | ||
Information Disclosure | 0.83 | 1 | 1 | 2 | |||
Cross Site Scripting | 0.8 | 1 | 1 | ||||
Path Traversal | 0.7 | 1 | 1 | ||||
Memory Corruption | 0.5 | 1 | 1 | ||||
Spoofing | 0.4 | 5 | 1 | 6 |
1. Authentication Bypass - GitLab (CVE-2023-7028) - Urgent [979]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
2. Remote Code Execution - PHP (CVE-2024-4577) - Urgent [966]
Description: In
3. Remote Code Execution - Atlassian Confluence (CVE-2023-22527) - Urgent [950]
Description: A template injection vulnerability on older versions of
4. Authentication Bypass - TeamCity (CVE-2024-27198) - Urgent [946]
Description: In JetBrains
5. Remote Code Execution - PaperCut NG (CVE-2023-27350) - Urgent [933]
Description: This vulnerability allows remote attackers to bypass authentication on affected installations of
6. Command Injection - Ivanti Connect Secure (CVE-2024-21887) - Urgent [932]
Description: A command injection vulnerability in web components of
7. Authentication Bypass - Jenkins (CVE-2024-23897) - Urgent [929]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
8. Code Injection - MOVEit Transfer (CVE-2023-34362) - Urgent [927]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:GLEN-PEARSON:MOVEIT-CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-34362, Vulners:PublicExploit:GitHub:DEEPINSTINCT:MOVEIT_CVE-2023-34362_IOCS, Vulners:PublicExploit:GitHub:GLEN-PEARSON:CVE-2023-34362-RCE, Vulners:PublicExploit:GitHub:SFEWER-R7:CVE-2023-34362, Vulners:PublicExploit:GitHub:MALWAREMAN007:CVE-2023-34362, Vulners:PublicExploit:GitHub:ERRORFIATHCK:MOVEIT-EXPLOIT, Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-26067, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:PACKETSTORM:173110, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-MOVEIT_CVE_2023_34362-, Vulners:PublicExploit:1337DAY-ID-38820, BDU:PublicExploit websites | |
0.97 | 15 | Code Injection | |
0.6 | 14 | Progress MOVEit is a secure Managed File Transfer (MFT) software. MOVEit enables organizations to meet compliance standards, easily ensure the reliability of core business processes, and secure the transfer of sensitive data between partners, customers, users and systems. | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.9702, EPSS Percentile is 0.99805 |
9. Authentication Bypass - Ivanti Connect Secure (CVE-2023-46805) - Urgent [922]
Description: An
10. Authentication Bypass - Ivanti Connect Secure (CVE-2024-21893) - Urgent [922]
Description: A server-side request forgery vulnerability in the SAML component of
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:H4X0R-DZ:CVE-2024-21893.PY, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-21893-TO-CVE-2024-21887, Vulners:PublicExploit:GitHub:SEAJAYSEC:IVANTI-CONNECT-AROUND-SCAN, Vulners:PublicExploit:1337DAY-ID-39350, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-IVANTI_CONNECT_SECURE_RCE_CVE_2024_21893-, Vulners:PublicExploit:PACKETSTORM:177229 websites | |
0.98 | 15 | Authentication Bypass | |
0.7 | 14 | Ivanti Connect Secure (Pulse Connect Secure) provides a seamless, cost-effective, SSL VPN solution for remote and mobile users from any web- enabled device to corporate resources | |
0.8 | 10 | CVSS Base Score is 8.2. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.95989, EPSS Percentile is 0.99547 |
11. Remote Code Execution - Windows MSHTML Platform (CVE-2023-35628) - Urgent [919]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on BDU website | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on GitHub website | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 8.1. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00993, EPSS Percentile is 0.84193 |
12. Remote Code Execution - FortiClientEMS (CVE-2023-48788) - Urgent [916]
Description: A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:HORIZON3AI:CVE-2023-48788, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-HTTP-FORTICLIENT_EMS_FCTID_SQLI-, Vulners:PublicExploit:1337DAY-ID-39585, Vulners:PublicExploit:PACKETSTORM:178230 websites | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | FortiClient EMS provides efficient and effective administration of endpoints running FortiClient (a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client) | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.71085, EPSS Percentile is 0.9816 |
13. Remote Code Execution - FortiManager (CVE-2024-47575) - Urgent [916]
Description: A missing authentication for critical function in
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-47575-EXP, Vulners:PublicExploit:GitHub:WATCHTOWRLABS:FORTIJUMP-EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:GitHub:SKYALLIANCE:EXPLOIT-CVE-2024-47575, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-MISC-FORTIMANAGER_RCE_CVE_2024_47575-, Vulners:PublicExploit:PACKETSTORM:182936 websites | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | FortiManager provides centralised policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.88627, EPSS Percentile is 0.98827 |
14. Remote Code Execution - PAN-OS (CVE-2024-3400) - Urgent [916]
Description: A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks
15. Remote Code Execution - Veeam Backup & Replication (CVE-2024-40711) - Urgent [916]
Description: A deserialization of untrusted data vulnerability in
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:WATCHTOWRLABS:CVE-2024-40711, Vulners:PublicExploit:GitHub:REALSTATUS:CVE-2024-40711-EXP, BDU:PublicExploit websites | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.96695, EPSS Percentile is 0.99702 |
16. Remote Code Execution - VMware vCenter (CVE-2024-38812) - Urgent [914]
Description: The
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on BDU:PublicExploit website | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.7 | 10 | EPSS Probability is 0.00416, EPSS Percentile is 0.7485 |
17. Authentication Bypass - Acronis Cyber Infrastructure (CVE-2023-45249) - Urgent [913]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181993, Vulners:PublicExploit:MSF:EXPLOIT-LINUX-HTTP-ACRONIS_CYBER_INFRA_CVE_2023_45249-, Vulners:PublicExploit:1337DAY-ID-39768 websites | |
0.98 | 15 | Authentication Bypass | |
0.5 | 14 | A hyperconverged solution providing storage, compute, and network resources for businesses and service provider | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.88105, EPSS Percentile is 0.98796 |
18. Authentication Bypass - PAN-OS (CVE-2024-0012) - Urgent [913]
Description: An
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:VEGETABLELASAGNE:CVE-2024-0012, Vulners:PublicExploit:GitHub:0XJESSIE21:CVE-2024-0012, Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474 websites | |
0.98 | 15 | Authentication Bypass | |
0.5 | 14 | PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.97192, EPSS Percentile is 0.99861 |
19. Elevation of Privilege - Windows Task Scheduler (CVE-2024-49039) - Urgent [904]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JE5442804:WPTASKSCHEDULER_CVE-2024-49039, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.9 | 10 | CVSS Base Score is 8.8. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00677, EPSS Percentile is 0.80556 |
20. Remote Code Execution - FortiOS (CVE-2024-21762) - Urgent [904]
Description: A out-of-bounds write in Fortinet
21. Security Feature Bypass - SugarCRM (CVE-2023-22952) - Urgent [903]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:171320, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-SUGARCRM_WEBSHELL_CVE_2023_22952-, Vulners:PublicExploit:1337DAY-ID-38255, BDU:PublicExploit websites | |
0.9 | 15 | Security Feature Bypass | |
0.6 | 14 | SugarCRM is a comprehensive Customer Relationship Management (CRM) platform designed to connect your sales, marketing, and service teams | |
0.9 | 10 | CVSS Base Score is 8.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.56829, EPSS Percentile is 0.97806 |
22. Command Injection - Barracuda Email Security Gateway (CVE-2023-2868) - Urgent [899]
Description: A remote
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CFIELDING-R7:POC-CVE-2023-2868, BDU:PublicExploit websites | |
0.97 | 15 | Command Injection | |
0.5 | 14 | The Barracuda Email Security Gateway is an email security gateway that manages and filters all inbound and outbound email traffic to protect organizations from email-borne threats and data leaks | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.9 | 10 | EPSS Probability is 0.07757, EPSS Percentile is 0.94457 |
23. Elevation of Privilege - nftables (CVE-2024-1086) - Urgent [897]
Description: A use-after-free vulnerability in the Linux kernel's netfilter:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:PL0XE:CVE-2024-1086, Vulners:PublicExploit:GitHub:CCIEVOICE2009:CVE-2024-1086, Vulners:PublicExploit:GitHub:KEVCOOPER:CVE-2024-1086-CHECKER, Vulners:PublicExploit:GitHub:XZX482:CVE-2024-1086, Vulners:PublicExploit:GitHub:NOTSELWYN:CVE-2024-1086, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | nftables is a subsystem of the Linux kernel providing filtering and classification of network packets/datagrams/frames | |
0.8 | 10 | CVSS Base Score is 7.8. According to Vulners data source | |
0.7 | 10 | EPSS Probability is 0.00291, EPSS Percentile is 0.69833 |
24. Information Disclosure - Check Point Security Gateway (CVE-2024-24919) - Urgent [874]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
25. Elevation of Privilege - Windows Kernel (CVE-2024-30088) - Urgent [861]
Description:
26. Elevation of Privilege - PAN-OS (CVE-2024-9474) - Urgent [854]
Description: A
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CHOCAPIKK:CVE-2024-9474, Vulners:PublicExploit:GitHub:DEATHVU:CVE-2024-9474, Vulners:PublicExploit:GitHub:GREASELOVELY:CVE-2024-0012, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-0012-POC, Vulners:PublicExploit:GitHub:K4NFR3:CVE-2024-9474, Vulners:PublicExploit:GitHub:SACHINART:CVE-2024-0012-POC, Vulners:PublicExploit:SAINT:2BC072FED655BA2418A2026EAEAAB6D5 websites | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls | |
0.7 | 10 | CVSS Base Score is 7.2. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.97513, EPSS Percentile is 0.99989 |
27. Security Feature Bypass - Internet Shortcut Files (CVE-2024-21412) - Urgent [851]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:WR00T:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:LSR00TER:CVE-2024-21412_WATER-HYDRA, Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT, BDU:PublicExploit websites | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | Internet Shortcut Files | |
0.8 | 10 | CVSS Base Score is 8.1. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00573, EPSS Percentile is 0.78591 |
28. Security Feature Bypass - SmartScreen Prompt (CVE-2024-29988) - Urgent [851]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT website | |
0.9 | 15 | Security Feature Bypass | |
0.5 | 14 | SmartScreen Prompt | |
0.9 | 10 | CVSS Base Score is 8.8. According to Microsoft data source | |
0.7 | 10 | EPSS Probability is 0.00337, EPSS Percentile is 0.72086 |
29. Elevation of Privilege - Windows Kernel (CVE-2024-21338) - Urgent [849]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:177869, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-21338, Vulners:PublicExploit:GitHub:TYKAWAII98:CVE-2024-21338_POC, Vulners:PublicExploit:GitHub:HAKAIOFFSEC:CVE-2024-21338, Vulners:PublicExploit:GitHub:UMU618:CVE-2024-21338, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:1337DAY-ID-39515, Vulners:PublicExploit:EDB-ID:51946, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | Windows Kernel | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.3 | 10 | EPSS Probability is 0.0007, EPSS Percentile is 0.32288 |
30. Elevation of Privilege - Windows DWM Core Library (CVE-2024-30051) - Urgent [844]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:FORTRA:CVE-2024-30051, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.4 | 10 | EPSS Probability is 0.00085, EPSS Percentile is 0.37761 |
31. Elevation of Privilege - Windows Installer (CVE-2024-38014) - Urgent [844]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:PACKETSTORM:181954, Vulners:PublicExploit:PACKETSTORM:182142 websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.4 | 10 | EPSS Probability is 0.00078, EPSS Percentile is 0.35012 |
32. Cross Site Scripting - Roundcube (CVE-2024-37383) - Urgent [838]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:AMIRZARGHAM:CVE-2024-37383-EXPLOIT, Vulners:PublicExploit:GitHub:BARTFROKLAGE:CVE-2024-37383-POC, BDU:PublicExploit websites | |
0.8 | 15 | Cross Site Scripting | |
0.6 | 14 | Roundcube is a web-based IMAP email client | |
0.6 | 10 | CVSS Base Score is 6.1. According to Vulners data source | |
0.9 | 10 | EPSS Probability is 0.03646, EPSS Percentile is 0.92025 |
33. Elevation of Privilege - Microsoft Exchange (CVE-2024-21410) - Urgent [838]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft | |
1.0 | 10 | CVSS Base Score is 9.8. According to Microsoft data source | |
1.0 | 10 | EPSS Probability is 0.10456, EPSS Percentile is 0.95242 |
34. Remote Code Execution - Microsoft Outlook (CVE-2024-21378) - Urgent [838]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on BDU website | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:JOHNHORMOND:CVE-2024-21378, Vulners:PublicExploit:GitHub:D0RB:CVE-2024-21378, BDU:PublicExploit websites | |
1.0 | 15 | Remote Code Execution | |
0.6 | 14 | Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites | |
0.9 | 10 | CVSS Base Score is 8.8. According to Microsoft data source | |
0.3 | 10 | EPSS Probability is 0.00056, EPSS Percentile is 0.25096 |
35. Remote Code Execution - VMware vCenter (CVE-2023-34048) - Urgent [836]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
0.5 | 17 | The existence of a private exploit is mentioned on BDU:PrivateExploit website | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.9 | 10 | EPSS Probability is 0.05166, EPSS Percentile is 0.93259 |
36. Elevation of Privilege - Windows Ancillary Function Driver for WinSock (CVE-2024-38193) - Urgent [820]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NEPHSTER:CVE-2024-38193 website | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.2 | 10 | EPSS Probability is 0.00054, EPSS Percentile is 0.24466 |
37. Security Feature Bypass - Windows MSHTML Platform (CVE-2024-30040) - Urgent [811]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Windows component | |
0.9 | 10 | CVSS Base Score is 8.8. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00563, EPSS Percentile is 0.7842 |
38. Security Feature Bypass - Windows SmartScreen (CVE-2024-21351) - Urgent [811]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploit is mentioned on BDU:PrivateExploit website | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge | |
0.8 | 10 | CVSS Base Score is 7.6. According to Microsoft data source | |
0.9 | 10 | EPSS Probability is 0.05284, EPSS Percentile is 0.9333 |
39. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38213) - Critical [764]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Windows component | |
0.7 | 10 | CVSS Base Score is 6.5. According to Microsoft data source | |
0.6 | 10 | EPSS Probability is 0.00221, EPSS Percentile is 0.61016 |
40. Security Feature Bypass - Windows Mark of the Web (CVE-2024-38217) - Critical [740]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.9 | 15 | Security Feature Bypass | |
0.8 | 14 | Windows component | |
0.5 | 10 | CVSS Base Score is 5.4. According to Microsoft data source | |
0.6 | 10 | EPSS Probability is 0.00226, EPSS Percentile is 0.61636 |
41. Spoofing - Windows MSHTML Platform (CVE-2024-38112) - Critical [734]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.5. According to Microsoft data source | |
1.0 | 10 | EPSS Probability is 0.70086, EPSS Percentile is 0.98132 |
42. Spoofing - Windows MSHTML Platform (CVE-2024-43461) - Critical [734]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Windows component | |
0.9 | 10 | CVSS Base Score is 8.8. According to Microsoft data source | |
0.9 | 10 | EPSS Probability is 0.02933, EPSS Percentile is 0.91166 |
43. Remote Code Execution - Juniper JunOS (CVE-2024-21591) - Critical [728]
Description:
An Out-of-bounds Write vulnerability in J-Web of Juniper Networks
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on BDU:PublicExploit website | |
1.0 | 15 | Remote Code Execution | |
0.8 | 14 | Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.8 | 10 | EPSS Probability is 0.0048, EPSS Percentile is 0.76605 |
44. Remote Code Execution - Atlassian Confluence (CVE-2024-21683) - Critical [723]
Description: This High severity
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:MSF:EXPLOIT-MULTI-HTTP-ATLASSIAN_CONFLUENCE_RCE_CVE_2024_21683-, Vulners:PublicExploit:GitHub:PHUCRIO:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:W01FH4CKER:CVE-2024-21683-RCE, Vulners:PublicExploit:GitHub:XH4VM:CVE-2024-21683, Vulners:PublicExploit:GitHub:XIAOMINGX:CVE-2024-21683-RCE, Vulners:PublicExploit:PACKETSTORM:179507, Vulners:PublicExploit:1337DAY-ID-39681 websites | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | Confluence is a web-based corporate wiki | |
0.9 | 10 | CVSS Base Score is 8.8. According to Vulners data source | |
1.0 | 10 | EPSS Probability is 0.94107, EPSS Percentile is 0.99275 |
45. Memory Corruption - Artifex Ghostscript (CVE-2024-29510) - Critical [722]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB websites | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:1337DAY-ID-39687, Vulners:PublicExploit:MSF:EXPLOIT-MULTI-FILEFORMAT-GHOSTSCRIPT_FORMAT_STRING_CVE_2024_29510-, Vulners:PublicExploit:PACKETSTORM:179645, Vulners:PublicExploit:GitHub:SWSMITH2391:CVE-2024-29510, BDU:PublicExploit websites | |
0.5 | 15 | Memory Corruption | |
0.3 | 14 | Artifex Ghostscript is an interpreter for the PostScript® language and PDF files | |
0.6 | 10 | CVSS Base Score is 6.3. According to Vulners data source | |
0.8 | 10 | EPSS Probability is 0.00722, EPSS Percentile is 0.81228 |
46. Elevation of Privilege - Windows Error Reporting Service (CVE-2024-26169) - Critical [719]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
0.5 | 17 | The existence of a private exploit is mentioned on BDU:PrivateExploit website | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.2 | 10 | EPSS Probability is 0.00052, EPSS Percentile is 0.22138 |
47. Elevation of Privilege - Windows Print Spooler (CVE-2022-38028) - Critical [719]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, BDU websites | |
0.5 | 17 | The existence of a private exploit is mentioned on BDU:PrivateExploit website | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.2 | 10 | EPSS Probability is 0.00051, EPSS Percentile is 0.21534 |
48. Elevation of Privilege - Windows Kernel (CVE-2024-38106) - Critical [712]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.9 | 14 | Windows Kernel | |
0.7 | 10 | CVSS Base Score is 7.0. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.11026 |
49. Elevation of Privilege - Windows Power Dependency Coordinator (CVE-2024-38107) - Critical [707]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.11026 |
50. Spoofing - Windows MSHTML Platform (CVE-2024-43573) - Critical [698]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Windows component | |
0.7 | 10 | CVSS Base Score is 6.5. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.01063, EPSS Percentile is 0.84777 |
51. Remote Code Execution - Windows Remote Desktop Licensing Service (CVE-2024-38077) - Critical [680]
Description:
52. Elevation of Privilege - Windows Common Log File System Driver (CVE-2023-36424) - Critical [677]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:NASSIM-ASRIR:CVE-2023-36424 website | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Common Log File System is a general-purpose logging subsystem that is accessible to both kernel-mode as well as user-mode applications for building high-performance transaction logs | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00789, EPSS Percentile is 0.8216 |
53. Remote Code Execution - XWiki Platform (CVE-2024-31982) - Critical [652]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TH3GOKUL:CVE-2024-31982, Vulners:PublicExploit:GitHub:BIGB0X:CVE-2024-31982, Vulners:PublicExploit:GitHub:K3LPI3B4NSH33:CVE-2024-31982, BDU:PublicExploit websites | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | XWiki offers a generic platform for developing projects and collaborative applications using the wiki paradigm | |
1.0 | 10 | CVSS Base Score is 10.0. According to Vulners data source | |
0.3 | 10 | EPSS Probability is 0.00063, EPSS Percentile is 0.28532 |
54. Spoofing - NTLM Hash Disclosure (CVE-2024-43451) - Critical [648]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.4 | 15 | Spoofing | |
0.5 | 14 | NTLM Hash Disclosure | |
0.7 | 10 | CVSS Base Score is 6.5. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.00469, EPSS Percentile is 0.76307 |
55. Remote Code Execution - Microsoft Outlook (CVE-2024-21413) - Critical [647]
Description:
56. Spoofing - Microsoft Exchange (CVE-2024-49040) - Critical [642]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Kaspersky website | |
0.4 | 17 | The existence of a private exploit is mentioned on Microsoft:PrivateExploit:PoC website | |
0.4 | 15 | Spoofing | |
0.8 | 14 | Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft | |
0.8 | 10 | CVSS Base Score is 7.5. According to Microsoft data source | |
0.4 | 10 | EPSS Probability is 0.00091, EPSS Percentile is 0.40618 |
57. Code Injection - The Events Calendar plugin for WordPress (CVE-2024-8275) - Critical [630]
Description: The
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:P33D:CVE-2024-8275, Vulners:PublicExploit:GitHub:WHITEROSE7777:CVE-2024-8275 websites | |
0.97 | 15 | Code Injection | |
0.6 | 14 | The Events Calendar is a plugin for creating an events listing website | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.3 | 10 | EPSS Probability is 0.00065, EPSS Percentile is 0.3042 |
58. Remote Code Execution - FortiOS (CVE-2023-42789) - Critical [630]
Description: A out-of-bounds write in Fortinet
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:CRIMBIT:CVE-2023-42789-POC, Vulners:PublicExploit:GitHub:JHONNYBONNY:CVE-2023-42789 websites | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | FortiOS is Fortinet's operating system used in their hardware, such as the Fortigate firewall and switches | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.4 | 10 | EPSS Probability is 0.00091, EPSS Percentile is 0.405 |
59. Information Disclosure - Microsoft Outlook (CVE-2023-35636) - Critical [629]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DUY-31:CVE-2023-35636 website | |
0.83 | 15 | Information Disclosure | |
0.6 | 14 | Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites | |
0.7 | 10 | CVSS Base Score is 6.5. According to Microsoft data source | |
0.8 | 10 | EPSS Probability is 0.0049, EPSS Percentile is 0.7682 |
60. Remote Code Execution - Fluent Bit (CVE-2024-4323) - High [595]
Description: A memory corruption vulnerability in
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:D0RB:CVE-2024-4323, Vulners:PublicExploit:GitHub:SKILFOY:CVE-2024-4323-EXPLOIT-POC, BDU:PublicExploit websites | |
1.0 | 15 | Remote Code Execution | |
0.5 | 14 | Fluent Bit is a fast, lightweight, and scalable telemetry data agent and processor for logs, metrics, and traces | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.10511 |
61. Elevation of Privilege - Windows CSC Service (CVE-2024-26229) - High [594]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:TEAM-MINEDEV:CVE-2024-26229, Vulners:PublicExploit:GitHub:NVISOSECURITY:CVE-2024-26229-BOF, Vulners:PublicExploit:GitHub:MQXMM:CVE-2024-26229, Vulners:PublicExploit:GitHub:CRACKED5PIDER:EOP24-26229, Vulners:PublicExploit:GitHub:0XJ175:DRIVE, Vulners:PublicExploit:GitHub:RALFHACKER:CVE-2024-26229-EXPLOIT, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-26229, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.10511 |
62. Elevation of Privilege - Windows Kernel-Mode Driver (CVE-2024-35250) - High [594]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:0XJIEFENG:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:YINSEL:CVE-2024-35250-BOF, Vulners:PublicExploit:GitHub:VARWARA:CVE-2024-35250, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.8 | 14 | Windows component | |
0.8 | 10 | CVSS Base Score is 7.8. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.11228 |
63. Authentication Bypass - Veeam Backup & Replication (CVE-2024-29849) - High [591]
Description: {'ms_cve_data_all': '', 'epss_cve_data_all': '', 'attackerkb_cve_data_all': '', 'vulners_cve_data_all': 'Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface.', 'bdu_cve_data_all': '', 'custom_cve_data_all': '', 'combined_cve_data_all': ''}
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:SINSINOLOGY:CVE-2024-29849 website | |
0.98 | 15 | Authentication Bypass | |
0.5 | 14 | Veeam Backup & Replication is a proprietary backup app developed by Veeam for virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.10511 |
64. Elevation of Privilege - needrestart (CVE-2024-48990) - High [589]
Description: Qualys discovered that
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ALLY-PETITT:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:CYB3RFR0G:CVE-2024-48990-POC, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990, Vulners:PublicExploit:GitHub:R0XDEADBEEF:CVE-2024-48990-EXPLOIT, Vulners:PublicExploit:GitHub:PENTESTFUNCTIONS:CVE-2024-48990-POC-TESTING, Vulners:PublicExploit:GitHub:NS989:CVE-2024-48990, Vulners:PublicExploit:GitHub:MAKUGA01:CVE-2024-48990-POC, Vulners:PublicExploit:PACKETSTORM:182765, Vulners:PublicExploit:1337DAY-ID-39817 websites | |
0.85 | 15 | Elevation of Privilege | |
0.7 | 14 | Needrestart is a utility that scans a system to determine the services that need to be restarted after applying shared library updates in a manner that avoids a complete system reboot | |
0.8 | 10 | CVSS Base Score is 7.8. According to Vulners data source | |
0.2 | 10 | EPSS Probability is 0.00045, EPSS Percentile is 0.17402 |
65. Elevation of Privilege - LiteSpeed Cache WordPress plugin (CVE-2024-28000) - High [585]
Description: Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:ARCH1M3D:CVE-2024-28000, Vulners:PublicExploit:GitHub:SSSSUPERX:CVE-2024-28000, Vulners:PublicExploit:GitHub:ALUCARD0X1:CVE-2024-28000, Vulners:PublicExploit:GitHub:JOHNDOEANONITA:CVE-2024-28000, Vulners:PublicExploit:GitHub:EBRASHA:CVE-2024-28000 websites | |
0.85 | 15 | Elevation of Privilege | |
0.6 | 14 | WordPress plugin | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.11252 |
66. Spoofing - Proxy Driver (CVE-2024-26234) - High [565]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Microsoft, BDU websites | |
0.5 | 17 | The existence of a private exploits is mentioned on Microsoft:PrivateExploit:Functional, BDU:PrivateExploit websites | |
0.4 | 15 | Spoofing | |
0.5 | 14 | Proxy Driver | |
0.7 | 10 | CVSS Base Score is 6.7. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.10511 |
67. Path Traversal - Zyxel firewall (CVE-2024-11667) - High [563]
Description: A
Component | Value | Weight | Comment |
---|---|---|---|
1.0 | 18 | Exploitation in the wild is mentioned on Vulners (AttackerKB object), AttackerKB, sekoia.io: Helldown Ransomware websites | |
0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
0.7 | 15 | Path Traversal | |
0.7 | 14 | Firewalls manufactured by Zyxel | |
0.8 | 10 | CVSS Base Score is 7.5. According to Vulners data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.10511 |
68. Elevation of Privilege - Microsoft Streaming Service (CVE-2024-30090) - High [532]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
1.0 | 17 | The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:DOR00TKIT:CVE-2024-30090, BDU:PublicExploit websites | |
0.85 | 15 | Elevation of Privilege | |
0.5 | 14 | Microsoft Streaming Service | |
0.7 | 10 | CVSS Base Score is 7.0. According to Microsoft data source | |
0.1 | 10 | EPSS Probability is 0.00043, EPSS Percentile is 0.11237 |
69. Remote Code Execution - VMware vCenter (CVE-2024-37079) - High [461]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.4 | 10 | EPSS Probability is 0.00093, EPSS Percentile is 0.41263 |
70. Remote Code Execution - VMware vCenter (CVE-2024-37080) - High [461]
Description:
Component | Value | Weight | Comment |
---|---|---|---|
0 | 18 | Exploitation in the wild is NOT mentioned in available Data Sources | |
0 | 17 | The existence of publicly available or private exploit is NOT mentioned in available Data Sources | |
1.0 | 15 | Remote Code Execution | |
0.7 | 14 | VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds | |
1.0 | 10 | CVSS Base Score is 9.8. According to Vulners data source | |
0.4 | 10 | EPSS Probability is 0.00093, EPSS Percentile is 0.41263 |