Report Name: september_2021_other report
Generated: 2021-09-18 22:32:39

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLComment
Confluence Server0.71Confluence Server
macOS0.71macOS
Microsoft MSHTML01Unclassified Product
Unknown Product01Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLComment
Remote Code Execution1.0111Remote Code Execution
Unknown Vulnerability Type01Unknown Vulnerability Type


Vulnerabilities

Urgent (1)

1. Remote Code Execution - Confluence Server (CVE-2021-26084) - Urgent [943]

Description: In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object), AttackerKB
Public Exploit Exists1.017Public exploit is found at Vulners (Confluence Server 7.12.4 - 'OGNL injection' Remote Code Execution (RCE) (Unauthenticated), Atlassian Confluence WebWork OGNL Injection Exploit, Confluence Server 7.12.4 - (OGNL injection) Remote Code Execution Exploit, Confluence Server 7.12.4 OGNL Injection Remote Code Execution, Atlassian Confluence WebWork OGNL Injection)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Confluence Server
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 9.8. Based on NVD data

Critical (1)

2. Remote Code Execution - macOS (CVE-2021-30860) - Critical [686]

Description: An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at AttackerKB
Public Exploit Exists017Public exploit is NOT found at Vulners website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714macOS
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on NVD data

High (1)

3. Remote Code Execution - Microsoft MSHTML (CVE-2021-40444) - High [567]

Description: Microsoft MSHTML Remote Code Execution Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (CISA object, AttackerKB object), AttackerKB, Microsoft
Public Exploit Exists017Public exploit is NOT found at Vulners website
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unclassified Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.8. Based on Microsoft data

Medium (0)

Low (1)

4. Unknown Vulnerability Type - Unknown Product (CVE-2021-3781) - Low [0]

Description:

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists017Public exploit is NOT found at Vulners website
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.010Vulnerability Severity Rating based on CVSS Base Score is NA. No data.

Exploitation in the wild detected (3)

Remote Code Execution (3)

Public exploit exists, but exploitation in the wild is NOT detected (0)

Other Vulnerabilities (1)

Unknown Vulnerability Type (1)