Explore the Enriched CISA KEV Catalog
The CISA KEV Vulnerability Enrichment Dashboard enables vulnerability researchers to quickly analyze trends of known and exploitable vulnerabilities identified by CISA. The table is free to use and provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog which is then enriched with CVSS, EPSS, and GreyNoise Threat Intelligence. You can easily sort, search and export the data in the table below. Give it a try!
CVE ID | Vendor | Product | Date Added to Catalog | EPSS Score | CVSSv4 Base | CVSSv3 Base | GreyNoise Tags | Shadowserver 30d Avg. | Nucleus Exploited by Malware | Nucleus Public Exploit Available | Nucleus Impacts OT | CISA Notes | VulnCheck XDB Entries |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-6693 | Fortinet | FortiOS | 06/25/2025 | 0.28232 | 6.5 | TRUE | TRUE | FALSE | https://fortiguard.com/advisory/FG-IR-19-007 ; https://nvd.nist.gov/vuln/detail/CVE-2019-6693 | https://vulncheck.com/xdb/00a6bf68463d||https://vulncheck.com/xdb/00a6bf68463d , https://vulncheck.com/xdb/664ed0cdf661||https://vulncheck.com/xdb/664ed0cdf661 | |||
CVE-2024-54085 | AMI | MegaRAC SPx | 06/25/2025 | 0.00246 | FALSE | FALSE | FALSE | This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf ; https://security.netapp.com/advisory/ntap-20250328-0003/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-54085 | |||||
CVE-2024-0769 | D-Link | DIR-859 Router | 06/25/2025 | 0.39732 | 5.3 | https://viz.greynoise.io/tag/dlink-dir-859-information-disclosure-attempt||https://viz.greynoise.io/tag/dlink-dir-859-information-disclosure-attempt | FALSE | FALSE | FALSE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769 | |||
CVE-2023-0386 | Linux | Kernel | 06/17/2025 | 0.56789 | 7.8 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a ; https://access.redhat.com/security/cve/cve-2023-0386 ; https://security.netapp.com/advisory/ntap-20230420-0004/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-0386 | https://vulncheck.com/xdb/8bb70e7dbfc7||https://vulncheck.com/xdb/8bb70e7dbfc7 , https://vulncheck.com/xdb/c79ab92abc39||https://vulncheck.com/xdb/c79ab92abc39 , https://vulncheck.com/xdb/917dedee61f9||https://vulncheck.com/xdb/917dedee61f9 , https://vulncheck.com/xdb/cee2b1a019b8||https://vulncheck.com/xdb/cee2b1a019b8 , https://vulncheck.com/xdb/6278e1e62115||https://vulncheck.com/xdb/6278e1e62115 , https://vulncheck.com/xdb/25bf65fa10ff||https://vulncheck.com/xdb/25bf65fa10ff , https://vulncheck.com/xdb/84dd9b75426f||https://vulncheck.com/xdb/84dd9b75426f , https://vulncheck.com/xdb/6b752e342371||https://vulncheck.com/xdb/6b752e342371 , https://vulncheck.com/xdb/8e83ff46f752||https://vulncheck.com/xdb/8e83ff46f752 , https://vulncheck.com/xdb/6fd75a13aef7||https://vulncheck.com/xdb/6fd75a13aef7 | |||
CVE-2023-33538 | TP-Link | Multiple Routers | 06/16/2025 | 0.89654 | 8.8 | FALSE | TRUE | FALSE | https://www.tp-link.com/nordic/support/faq/3562/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-33538 | https://vulncheck.com/xdb/16db4bdedbf0||https://vulncheck.com/xdb/16db4bdedbf0 , https://vulncheck.com/xdb/1c98f82a1773||https://vulncheck.com/xdb/1c98f82a1773 | |||
CVE-2025-43200 | Apple | Multiple Products | 06/16/2025 | 0.00759 | 4.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/122174 ; https://support.apple.com/en-us/122173 ; https://support.apple.com/en-us/122900 ; https://support.apple.com/en-us/122901 ; https://support.apple.com/en-us/122902 ; https://support.apple.com/en-us/122903 ; https://support.apple.com/en-us/122904 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43200 | ||||
CVE-2025-24016 | Wazuh | Wazuh Server | 06/10/2025 | 0.91855 | 9.9 | 0 | FALSE | TRUE | FALSE | https://wazuh.com/blog/addressing-the-cve-2025-24016-vulnerability/ ; https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh ; https://nvd.nist.gov/vuln/detail/CVE-2025-24016 | https://vulncheck.com/xdb/909b383279ed||https://vulncheck.com/xdb/909b383279ed , https://vulncheck.com/xdb/5a3cacea8ac9||https://vulncheck.com/xdb/5a3cacea8ac9 , https://vulncheck.com/xdb/d107a6d33872||https://vulncheck.com/xdb/d107a6d33872 , https://vulncheck.com/xdb/771d8a208bca||https://vulncheck.com/xdb/771d8a208bca , https://vulncheck.com/xdb/a8a53f5d0129||https://vulncheck.com/xdb/a8a53f5d0129 , https://vulncheck.com/xdb/d157eb797a2f||https://vulncheck.com/xdb/d157eb797a2f | ||
CVE-2025-33053 | Microsoft | Windows | 06/10/2025 | 0.15008 | 8.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 ; https://nvd.nist.gov/vuln/detail/CVE-2025-33053 | https://vulncheck.com/xdb/e50dcdc5ad53 | |||
CVE-2025-32433 | Erlang | Erlang/OTP | 06/09/2025 | 0.55376 | 10.0 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy ; https://nvd.nist.gov/vuln/detail/CVE-2025-32433 | https://vulncheck.com/xdb/a2f1151c609a||https://vulncheck.com/xdb/a2f1151c609a , https://vulncheck.com/xdb/22d7bf70f177||https://vulncheck.com/xdb/22d7bf70f177 , https://vulncheck.com/xdb/874f94accfde||https://vulncheck.com/xdb/874f94accfde , https://vulncheck.com/xdb/49e3a7890ab8||https://vulncheck.com/xdb/49e3a7890ab8 , https://vulncheck.com/xdb/38c75d4fe3df||https://vulncheck.com/xdb/38c75d4fe3df , https://vulncheck.com/xdb/ec3bcdccec72||https://vulncheck.com/xdb/ec3bcdccec72 , https://vulncheck.com/xdb/6b216fd69575||https://vulncheck.com/xdb/6b216fd69575 , https://vulncheck.com/xdb/0b33fe6d7d52||https://vulncheck.com/xdb/0b33fe6d7d52 , https://vulncheck.com/xdb/734f3d7eff96||https://vulncheck.com/xdb/734f3d7eff96 , https://vulncheck.com/xdb/04468c21f876||https://vulncheck.com/xdb/04468c21f876 , https://vulncheck.com/xdb/a78d51fa522e||https://vulncheck.com/xdb/a78d51fa522e , https://vulncheck.com/xdb/eb611c1ee1c0||https://vulncheck.com/xdb/eb611c1ee1c0 , https://vulncheck.com/xdb/774a5554920f||https://vulncheck.com/xdb/774a5554920f , https://vulncheck.com/xdb/822dbe209d89||https://vulncheck.com/xdb/822dbe209d89 , https://vulncheck.com/xdb/0e9bd89eb6d9||https://vulncheck.com/xdb/0e9bd89eb6d9 , https://vulncheck.com/xdb/839147304502||https://vulncheck.com/xdb/839147304502 , https://vulncheck.com/xdb/d7301295748a||https://vulncheck.com/xdb/d7301295748a , https://vulncheck.com/xdb/42214d962233||https://vulncheck.com/xdb/42214d962233 | |||
CVE-2024-42009 | Roundcube | Webmail | 06/09/2025 | 0.72898 | 9.3 | FALSE | TRUE | FALSE | https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 ; https://nvd.nist.gov/vuln/detail/CVE-2024-42009 | https://vulncheck.com/xdb/0f7a6566385d||https://vulncheck.com/xdb/0f7a6566385d , https://vulncheck.com/xdb/38e4d4169186||https://vulncheck.com/xdb/38e4d4169186 , https://vulncheck.com/xdb/c65b1a816cd3||https://vulncheck.com/xdb/c65b1a816cd3 , https://vulncheck.com/xdb/1ccb8f1c8989||https://vulncheck.com/xdb/1ccb8f1c8989 | |||
CVE-2025-5419 | Chromium V8 | 06/05/2025 | 0.00207 | 8.8 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2025-5419", | |||||
CVE-2025-21479 | Qualcomm | Multiple Chipsets | 06/03/2025 | 0.03288 | 8.6 | FALSE | TRUE | FALSE | Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-21479 | https://vulncheck.com/xdb/13d1e869f88c | |||
CVE-2025-21480 | Qualcomm | Multiple Chipsets | 06/03/2025 | 0.03288 | 8.6 | FALSE | FALSE | FALSE | Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-21480 | ||||
CVE-2025-27038 | Qualcomm | Multiple Chipsets | 06/03/2025 | 0.02775 | 7.5 | FALSE | FALSE | FALSE | Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-27038 | ||||
CVE-2023-39780 | ASUS | RT-AX55 Routers | 06/02/2025 | 0.66750 | 8.8 | FALSE | FALSE | FALSE | https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55 ; https://www.asus.com/content/asus-product-security-advisory/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-39780 | ||||
CVE-2025-35939 | Craft CMS | Craft CMS | 06/02/2025 | 0.43970 | FALSE | FALSE | FALSE | https://github.com/craftcms/cms/pull/17220 ; https://nvd.nist.gov/vuln/detail/CVE-2025-35939 | |||||
CVE-2025-3935 | ConnectWise | ScreenConnect | 06/02/2025 | 0.19467 | 8.1 | FALSE | FALSE | FALSE | https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4 ; https://nvd.nist.gov/vuln/detail/CVE-2025-3935 | ||||
CVE-2024-56145 | Craft CMS | Craft CMS | 06/02/2025 | 0.94029 | https://viz.greynoise.io/tag/craft-cms-cve-2024-56145-rce-attempt||https://viz.greynoise.io/tag/craft-cms-cve-2024-56145-rce-attempt | FALSE | TRUE | FALSE | https://github.com/craftcms/cms/security/advisories/GHSA-2p6p-9rc9-62j9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-56145 | https://vulncheck.com/xdb/9fa879d8df13||https://vulncheck.com/xdb/9fa879d8df13 , https://vulncheck.com/xdb/bc0f04bab107||https://vulncheck.com/xdb/bc0f04bab107 | |||
CVE-2021-32030 | ASUS | Routers | 06/02/2025 | 0.94215 | 9.8 | https://viz.greynoise.io/tag/asus-gt-ac2900-auth-bypass-attempt||https://viz.greynoise.io/tag/asus-gt-ac2900-auth-bypass-attempt | 6 | FALSE | FALSE | TRUE | https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ ; https://www.asus.com/us/supportonly/rog%20rapture%20gt-ac2900/helpdesk_bios/; https://nvd.nist.gov/vuln/detail/CVE-2021-32030 | ||
CVE-2025-4632 | Samsung | MagicINFO 9 Server | 05/22/2025 | 0.46663 | 9.8 | FALSE | FALSE | FALSE | https://security.samsungtv.com/securityUpdates#SVP-MAY-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2025-4632 | ||||
CVE-2025-4428 | Ivanti | Endpoint Manager Mobile (EPMM) | 05/19/2025 | 0.21116 | 7.2 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4428 | https://vulncheck.com/xdb/1d58a0908c17||https://vulncheck.com/xdb/1d58a0908c17 , https://vulncheck.com/xdb/0fb0366ce3c8||https://vulncheck.com/xdb/0fb0366ce3c8 | |||
CVE-2025-4427 | Ivanti | Endpoint Manager Mobile (EPMM) | 05/19/2025 | 0.81049 | 5.3 | 6 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4427 | https://vulncheck.com/xdb/2b5da99e82e5 | ||
CVE-2024-11182 | MDaemon | Email Server | 05/19/2025 | 0.26788 | 5.3 | 6.1 | FALSE | FALSE | FALSE | https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html ; https://mdaemon.com/pages/downloads-critical-updates ; https://nvd.nist.gov/vuln/detail/CVE-2024-11182 | |||
CVE-2023-38950 | ZKTeco | BioTime | 05/19/2025 | 0.86079 | 7.5 | FALSE | FALSE | FALSE | https://www.zkteco.com/en/Security_Bulletinsibs ; https://nvd.nist.gov/vuln/detail/CVE-2023-38950 | ||||
CVE-2024-27443 | Synacor | Zimbra Collaboration Suite (ZCS) | 05/19/2025 | 0.20782 | 6.1 | FALSE | FALSE | FALSE | https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes ; https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P39#Security_Fixes ; https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.7#Security_Fixes ; https://nvd.nist.gov/vuln/detail/CVE-2024-27443 | ||||
CVE-2025-27920 | Srimax | Output Messenger | 05/19/2025 | 0.57510 | 7.2 | FALSE | FALSE | FALSE | https://www.outputmessenger.com/cve-2025-27920/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-27920 | ||||
CVE-2025-42999 | SAP | NetWeaver | 05/15/2025 | 0.18135 | 9.1 | FALSE | FALSE | FALSE | SAP users must have an account to log in and access the patch: https://me.sap.com/notes/3604119 ; https://nvd.nist.gov/vuln/detail/CVE-2025-42999 | ||||
CVE-2025-4664 | Chromium | 05/15/2025 | 0.00013 | 4.3 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-4664 | https://vulncheck.com/xdb/70f6cb2db4f9 | ||||
CVE-2024-12987 | DrayTek | Vigor Routers | 05/15/2025 | 0.84299 | 6.9 | 7.3 | 0 | FALSE | FALSE | TRUE | https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf ; https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf ; https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-12987 | ||
CVE-2025-32756 | Fortinet | Multiple Products | 05/14/2025 | 0.10736 | 9.8 | FALSE | TRUE | FALSE | https://fortiguard.fortinet.com/psirt/FG-IR-25-254 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32756 | https://vulncheck.com/xdb/e32aaf91a2c9||https://vulncheck.com/xdb/e32aaf91a2c9 , https://vulncheck.com/xdb/67c085a152a1||https://vulncheck.com/xdb/67c085a152a1 , https://vulncheck.com/xdb/79e4cd0f0df6||https://vulncheck.com/xdb/79e4cd0f0df6 , https://vulncheck.com/xdb/f294010abfe2||https://vulncheck.com/xdb/f294010abfe2 | |||
CVE-2025-32701 | Microsoft | Windows | 05/13/2025 | 0.04192 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32701 | ||||
CVE-2025-30400 | Microsoft | Windows | 05/13/2025 | 0.03697 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30400 ; https://nvd.nist.gov/vuln/detail/CVE-2025-30400 | ||||
CVE-2025-32706 | Microsoft | Windows | 05/13/2025 | 0.12062 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32706 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32706 | ||||
CVE-2025-32709 | Microsoft | Windows | 05/13/2025 | 0.04230 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32709 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32709 | ||||
CVE-2025-30397 | Microsoft | Windows | 05/13/2025 | 0.16413 | 7.5 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-30397 | https://vulncheck.com/xdb/2b537fb7d9da | |||
CVE-2025-47729 | TeleMessage | TM SGNL | 05/12/2025 | 0.07260 | 1.9 | FALSE | FALSE | FALSE | Apply mitigations per vendor instructions. Absent mitigating instructions from the vendor, discontinue use of the product. ; https://nvd.nist.gov/vuln/detail/CVE-2025-47729 | ||||
CVE-2024-11120 | GeoVision | Multiple Devices | 05/07/2025 | 0.54555 | 9.8 | 0 | FALSE | FALSE | TRUE | https://dlcdn.geovision.com.tw/TechNotice/CyberSecurity/Security_Advisory_IP_Device_2024-11.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-11120 | |||
CVE-2024-6047 | GeoVision | Multiple Devices | 05/07/2025 | 0.75403 | 9.8 | FALSE | FALSE | FALSE | https://dlcdn.geovision.com.tw/TechNotice/CyberSecurity/Security_Advisory_IP_Device_2024-11.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-6047 | ||||
CVE-2025-27363 | FreeType | FreeType | 05/06/2025 | 0.68423 | 8.1 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2025-05-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-27363 | https://vulncheck.com/xdb/e5445691adbb | |||
CVE-2025-3248 | Langflow | Langflow | 05/05/2025 | 0.92388 | 9.8 | 3 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https://github.com/advisories/GHSA-c995-4fw3-j39m ; https://nvd.nist.gov/vuln/detail/CVE-2025-3248 | https://vulncheck.com/xdb/288fea3e2ebf||https://vulncheck.com/xdb/288fea3e2ebf , https://vulncheck.com/xdb/cd6d4cd25599||https://vulncheck.com/xdb/cd6d4cd25599 , https://vulncheck.com/xdb/f4d3bcf9f10f||https://vulncheck.com/xdb/f4d3bcf9f10f , https://vulncheck.com/xdb/58f291eee1de||https://vulncheck.com/xdb/58f291eee1de , https://vulncheck.com/xdb/2098ab2f7185||https://vulncheck.com/xdb/2098ab2f7185 , https://vulncheck.com/xdb/93417d485096||https://vulncheck.com/xdb/93417d485096 , https://vulncheck.com/xdb/be18e792efe8||https://vulncheck.com/xdb/be18e792efe8 , https://vulncheck.com/xdb/36d353279df8||https://vulncheck.com/xdb/36d353279df8 , https://vulncheck.com/xdb/5bba2deca1c3||https://vulncheck.com/xdb/5bba2deca1c3 , https://vulncheck.com/xdb/145490c5ce6f||https://vulncheck.com/xdb/145490c5ce6f , https://vulncheck.com/xdb/631b46774fd7||https://vulncheck.com/xdb/631b46774fd7 , https://vulncheck.com/xdb/ad786ecce441||https://vulncheck.com/xdb/ad786ecce441 , https://vulncheck.com/xdb/e3068430fa4d||https://vulncheck.com/xdb/e3068430fa4d , https://vulncheck.com/xdb/ee9c80f0dd42||https://vulncheck.com/xdb/ee9c80f0dd42 , https://vulncheck.com/xdb/e7c172788c42||https://vulncheck.com/xdb/e7c172788c42 , https://vulncheck.com/xdb/8ae92c1bc671||https://vulncheck.com/xdb/8ae92c1bc671 , https://vulncheck.com/xdb/efad80d04720||https://vulncheck.com/xdb/efad80d04720 | ||
CVE-2025-34028 | Commvault | Command Center | 05/02/2025 | 0.63170 | 10.0 | 2 | FALSE | TRUE | FALSE | https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-34028 | https://vulncheck.com/xdb/56babf971542||https://vulncheck.com/xdb/56babf971542 , https://vulncheck.com/xdb/984fda0f0672||https://vulncheck.com/xdb/984fda0f0672 , https://vulncheck.com/xdb/69bab7633674||https://vulncheck.com/xdb/69bab7633674 , https://vulncheck.com/xdb/14624eb2c48c||https://vulncheck.com/xdb/14624eb2c48c | ||
CVE-2024-58136 | Yiiframework | Yii | 05/02/2025 | 0.35900 | 9.0 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136 | ||||
CVE-2024-38475 | Apache | HTTP Server | 05/01/2025 | 0.93550 | 9.1 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://httpd.apache.org/security/vulnerabilities_24.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-38475 | https://vulncheck.com/xdb/80a83821ddf6||https://vulncheck.com/xdb/80a83821ddf6 , https://vulncheck.com/xdb/e5dc771322d3||https://vulncheck.com/xdb/e5dc771322d3 , https://vulncheck.com/xdb/624d3509f429||https://vulncheck.com/xdb/624d3509f429 , https://vulncheck.com/xdb/61c7ef7fbe32||https://vulncheck.com/xdb/61c7ef7fbe32 | |||
CVE-2023-44221 | SonicWall | SMA100 Appliances | 05/01/2025 | 0.42318 | 7.2 | FALSE | FALSE | FALSE | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 ; https://nvd.nist.gov/vuln/detail/CVE-2023-44221 | ||||
CVE-2025-31324 | SAP | NetWeaver | 04/29/2025 | 0.63520 | 10.0 | 4 | TRUE | TRUE | FALSE | https://me.sap.com/notes/3594142 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31324 | https://vulncheck.com/xdb/1dbd462ef19f||https://vulncheck.com/xdb/1dbd462ef19f , https://vulncheck.com/xdb/8e5d68f04c35||https://vulncheck.com/xdb/8e5d68f04c35 , https://vulncheck.com/xdb/3a18354253c2||https://vulncheck.com/xdb/3a18354253c2 , https://vulncheck.com/xdb/d9d077bc2000||https://vulncheck.com/xdb/d9d077bc2000 , https://vulncheck.com/xdb/e19c182f0ca9||https://vulncheck.com/xdb/e19c182f0ca9 , https://vulncheck.com/xdb/6b35038ccd06||https://vulncheck.com/xdb/6b35038ccd06 , https://vulncheck.com/xdb/7f7dc0b252eb||https://vulncheck.com/xdb/7f7dc0b252eb , https://vulncheck.com/xdb/9ed2a1a3a049||https://vulncheck.com/xdb/9ed2a1a3a049 , https://vulncheck.com/xdb/aa7f5440b92e||https://vulncheck.com/xdb/aa7f5440b92e , https://vulncheck.com/xdb/21140617b6aa||https://vulncheck.com/xdb/21140617b6aa , https://vulncheck.com/xdb/0c5b7577024a||https://vulncheck.com/xdb/0c5b7577024a , https://vulncheck.com/xdb/18c7f30cc438||https://vulncheck.com/xdb/18c7f30cc438 | ||
CVE-2025-1976 | Broadcom | Brocade Fabric OS | 04/28/2025 | 0.02054 | FALSE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602 ; https://nvd.nist.gov/vuln/detail/CVE-2025-1976 | |||||
CVE-2025-3928 | Commvault | Web Server | 04/28/2025 | 0.12731 | FALSE | FALSE | FALSE | https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html; https://www.commvault.com/blogs/notice-security-advisory-update; https://nvd.nist.gov/vuln/detail/CVE-2025-3928 | |||||
CVE-2025-42599 | Qualitia | Active! Mail | 04/28/2025 | 0.10614 | 9.8 | FALSE | FALSE | FALSE | https://www.qualitia.com/jp/news/2025/04/18_1030.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-42599 | ||||
CVE-2025-31201 | Apple | Multiple Products | 04/17/2025 | 0.00268 | 7.5 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31201 | ||||
CVE-2025-31200 | Apple | Multiple Products | 04/17/2025 | 0.00285 | 6.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31200 | ||||
CVE-2025-24054 | Microsoft | Windows | 04/17/2025 | 0.35445 | 6.5 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24054 | https://vulncheck.com/xdb/312833432df9||https://vulncheck.com/xdb/312833432df9 , https://vulncheck.com/xdb/550db84afa9d||https://vulncheck.com/xdb/550db84afa9d , https://vulncheck.com/xdb/8f3733c43997||https://vulncheck.com/xdb/8f3733c43997 , https://vulncheck.com/xdb/39435b65af8c||https://vulncheck.com/xdb/39435b65af8c , https://vulncheck.com/xdb/a73df2b2b792||https://vulncheck.com/xdb/a73df2b2b792 , https://vulncheck.com/xdb/78d3d4d389a8||https://vulncheck.com/xdb/78d3d4d389a8 | |||
CVE-2021-20035 | SonicWall | SMA100 Appliances | 04/16/2025 | 0.14007 | 6.5 | FALSE | FALSE | FALSE | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022 ; https://nvd.nist.gov/vuln/detail/CVE-2021-20035 | ||||
CVE-2024-53197 | Linux | Kernel | 04/09/2025 | 0.00200 | 7.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53197 | ||||
CVE-2024-53150 | Linux | Kernel | 04/09/2025 | 0.00158 | 7.1 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024122427-CVE-2024-53150-3a7d@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53150 | ||||
CVE-2025-29824 | Microsoft | Windows | 04/08/2025 | 0.02690 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29824 | https://vulncheck.com/xdb/55d280cbffe8 | |||
CVE-2025-30406 | Gladinet | CentreStack | 04/08/2025 | 0.84595 | 9.0 | FALSE | TRUE | FALSE | https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf ; https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2025-triofox.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2025-30406 | https://vulncheck.com/xdb/ddfce728e42e | |||
CVE-2025-31161 | CrushFTP | CrushFTP | 04/07/2025 | 0.83274 | 9.8 | TRUE | TRUE | FALSE | https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update ; https://nvd.nist.gov/vuln/detail/CVE-2025-31161 | https://vulncheck.com/xdb/e24d445b54c0||https://vulncheck.com/xdb/e24d445b54c0 , https://vulncheck.com/xdb/dbb333d827c5||https://vulncheck.com/xdb/dbb333d827c5 , https://vulncheck.com/xdb/259d44739ff2||https://vulncheck.com/xdb/259d44739ff2 , https://vulncheck.com/xdb/93ea4025399d||https://vulncheck.com/xdb/93ea4025399d , https://vulncheck.com/xdb/d7039f76e4eb||https://vulncheck.com/xdb/d7039f76e4eb , https://vulncheck.com/xdb/5e71bfa64150||https://vulncheck.com/xdb/5e71bfa64150 , https://vulncheck.com/xdb/5e62161000cc||https://vulncheck.com/xdb/5e62161000cc , https://vulncheck.com/xdb/8930ce0f55b5||https://vulncheck.com/xdb/8930ce0f55b5 , https://vulncheck.com/xdb/c65abd96e3cd||https://vulncheck.com/xdb/c65abd96e3cd | |||
CVE-2025-22457 | Ivanti | Connect Secure, Policy Secure, and ZTA Gateways | 04/04/2025 | 0.26466 | 9.0 | TRUE | TRUE | FALSE | CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22457 | https://vulncheck.com/xdb/ade6954fee43||https://vulncheck.com/xdb/ade6954fee43 , https://vulncheck.com/xdb/79aa4a3559fa||https://vulncheck.com/xdb/79aa4a3559fa , https://vulncheck.com/xdb/e1a9d9a11e79||https://vulncheck.com/xdb/e1a9d9a11e79 , https://vulncheck.com/xdb/3bdca4b1c828||https://vulncheck.com/xdb/3bdca4b1c828 , https://vulncheck.com/xdb/074464a0946f||https://vulncheck.com/xdb/074464a0946f | |||
CVE-2025-24813 | Apache | Tomcat | 04/01/2025 | 0.93871 | 9.8 | 0 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq ; https://nvd.nist.gov/vuln/detail/CVE-2025-24813 | https://vulncheck.com/xdb/9e52fea0ddb5||https://vulncheck.com/xdb/9e52fea0ddb5 , https://vulncheck.com/xdb/8229a5ce661e||https://vulncheck.com/xdb/8229a5ce661e , https://vulncheck.com/xdb/c63f2f746a4c||https://vulncheck.com/xdb/c63f2f746a4c , https://vulncheck.com/xdb/66bfb6dc4529||https://vulncheck.com/xdb/66bfb6dc4529 , https://vulncheck.com/xdb/41039969d4bb||https://vulncheck.com/xdb/41039969d4bb , https://vulncheck.com/xdb/2e8121be4e6c||https://vulncheck.com/xdb/2e8121be4e6c , https://vulncheck.com/xdb/f95cb1d5b6af||https://vulncheck.com/xdb/f95cb1d5b6af , https://vulncheck.com/xdb/ecda97c5692c||https://vulncheck.com/xdb/ecda97c5692c , https://vulncheck.com/xdb/2e3eea69a36d||https://vulncheck.com/xdb/2e3eea69a36d , https://vulncheck.com/xdb/3aff79b6f0d4||https://vulncheck.com/xdb/3aff79b6f0d4 , https://vulncheck.com/xdb/31ac53ba66b2||https://vulncheck.com/xdb/31ac53ba66b2 , https://vulncheck.com/xdb/ff7c931b911d||https://vulncheck.com/xdb/ff7c931b911d , https://vulncheck.com/xdb/25d3559a5ca1||https://vulncheck.com/xdb/25d3559a5ca1 , https://vulncheck.com/xdb/1f1e1835349f||https://vulncheck.com/xdb/1f1e1835349f , https://vulncheck.com/xdb/e48dddb86729||https://vulncheck.com/xdb/e48dddb86729 , https://vulncheck.com/xdb/40412144ed11||https://vulncheck.com/xdb/40412144ed11 , https://vulncheck.com/xdb/62ff6f95bed3||https://vulncheck.com/xdb/62ff6f95bed3 , https://vulncheck.com/xdb/62446f11b151||https://vulncheck.com/xdb/62446f11b151 , https://vulncheck.com/xdb/5ff5b290fccd||https://vulncheck.com/xdb/5ff5b290fccd , https://vulncheck.com/xdb/02795c240160||https://vulncheck.com/xdb/02795c240160 , https://vulncheck.com/xdb/bec48551a957||https://vulncheck.com/xdb/bec48551a957 , https://vulncheck.com/xdb/2ed807c5c32c||https://vulncheck.com/xdb/2ed807c5c32c , https://vulncheck.com/xdb/181640a7c0ae||https://vulncheck.com/xdb/181640a7c0ae , https://vulncheck.com/xdb/dbf0b83e164b||https://vulncheck.com/xdb/dbf0b83e164b , https://vulncheck.com/xdb/438c59eda6a1||https://vulncheck.com/xdb/438c59eda6a1 , https://vulncheck.com/xdb/930571969654||https://vulncheck.com/xdb/930571969654 , https://vulncheck.com/xdb/a23cfd526be6||https://vulncheck.com/xdb/a23cfd526be6 | ||
CVE-2024-20439 | Cisco | Smart Licensing Utility | 03/31/2025 | 0.88877 | 9.8 | https://viz.greynoise.io/tag/cisco-smart-licensing-cve-2024-20439-hardcoded-credentials-attempt||https://viz.greynoise.io/tag/cisco-smart-licensing-cve-2024-20439-hardcoded-credentials-attempt | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw ; https://nvd.nist.gov/vuln/detail/CVE-2024-20439 | |||
CVE-2025-2783 | Chromium Mojo | 03/27/2025 | 0.05464 | 8.3 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-2783 | |||||
CVE-2019-9874 | Sitecore | CMS and Experience Platform (XP) | 03/26/2025 | 0.18393 | 9.8 | FALSE | FALSE | FALSE | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0334035 ; https://nvd.nist.gov/vuln/detail/CVE-2019-9874 | ||||
CVE-2019-9875 | Sitecore | CMS and Experience Platform (XP) | 03/26/2025 | 0.11888 | 8.8 | FALSE | FALSE | FALSE | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0038556 ; https://nvd.nist.gov/vuln/detail/CVE-2019-9875 | ||||
CVE-2025-30154 | reviewdog | action-setup GitHub Action | 03/24/2025 | 0.38636 | 8.6 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: CISA Mitigation Instructions: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction ; Additional References: https://github.com/reviewdog/reviewdog/security/advisories/GHSA-qmg3-hpqr-gqvc ; https://nvd.nist.gov/vuln/detail/CVE-2025-30154 | ||||
CVE-2017-12637 | SAP | NetWeaver | 03/19/2025 | 0.91938 | 7.5 | FALSE | FALSE | FALSE | SAP users must have an account to log in and access the patch: https://me.sap.com/notes/3476549 ; https://nvd.nist.gov/vuln/detail/CVE-2017-12637 | ||||
CVE-2025-1316 | Edimax | IC-7100 IP Camera | 03/19/2025 | 0.78187 | 0 | FALSE | FALSE | TRUE | https://www.edimax.com/edimax/post/post/data/edimax/global/press_releases/4801/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-1316 | ||||
CVE-2024-48248 | NAKIVO | Backup and Replication | 03/19/2025 | 0.93529 | 8.6 | 1 | FALSE | TRUE | FALSE | https://helpcenter.nakivo.com/Release-Notes/Content/Release-Notes.htm ; https://nvd.nist.gov/vuln/detail/CVE-2024-48248 | https://vulncheck.com/xdb/f2bd8ffd3b8d | ||
CVE-2025-24472 | Fortinet | FortiOS and FortiProxy | 03/18/2025 | 0.07265 | 8.1 | TRUE | FALSE | FALSE | https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24472 | ||||
CVE-2025-30066 | tj-actions | changed-files GitHub Action | 03/18/2025 | 0.74591 | 8.6 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: CISA Mitigation Instructions: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction ; Additional References: https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 ; https://nvd.nist.gov/vuln/detail/CVE-20 | ||||
CVE-2025-24201 | Apple | Multiple Products | 03/13/2025 | 0.00042 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/122281 ; https://support.apple.com/en-us/122283 ; https://support.apple.com/en-us/122284 ; https://support.apple.com/en-us/122285 ; ; https://nvd.nist.gov/vuln/detail/CVE-2025-24201 | ||||
CVE-2025-21590 | Juniper | Junos OS | 03/13/2025 | 0.00963 | FALSE | FALSE | FALSE | https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-21590 | |||||
CVE-2025-26633 | Microsoft | Windows | 03/11/2025 | 0.05485 | 7.0 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26633 ; https://nvd.nist.gov/vuln/detail/CVE-2025-26633 | https://vulncheck.com/xdb/32970494431d | |||
CVE-2025-24983 | Microsoft | Windows | 03/11/2025 | 0.01664 | 7.0 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24983 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24983 | ||||
CVE-2025-24984 | Microsoft | Windows | 03/11/2025 | 0.18721 | 4.6 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24984 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24984 | ||||
CVE-2025-24985 | Microsoft | Windows | 03/11/2025 | 0.01183 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24985 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24985 | ||||
CVE-2025-24991 | Microsoft | Windows | 03/11/2025 | 0.03088 | 5.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24991 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24991 | ||||
CVE-2025-24993 | Microsoft | Windows | 03/11/2025 | 0.05500 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24993 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24993 | ||||
CVE-2025-25181 | Advantive | VeraCore | 03/10/2025 | 0.65857 | 5.8 | FALSE | FALSE | FALSE | https://advantive.my.site.com/support/s/article/Veracore-Release-Notes-2025-1-1-3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-25181 | ||||
CVE-2024-13159 | Ivanti | Endpoint Manager (EPM) | 03/10/2025 | 0.94121 | 9.8 | 3 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13159 | https://vulncheck.com/xdb/a83b2bb45c99 | ||
CVE-2024-13161 | Ivanti | Endpoint Manager (EPM) | 03/10/2025 | 0.92138 | 9.8 | 2 | FALSE | FALSE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13161 | |||
CVE-2024-57968 | Advantive | VeraCore | 03/10/2025 | 0.09755 | 9.9 | FALSE | FALSE | FALSE | https://advantive.my.site.com/support/s/article/VeraCore-Release-Notes-2024-4-2-1 ; https://nvd.nist.gov/vuln/detail/CVE-2024-57968 | ||||
CVE-2024-13160 | Ivanti | Endpoint Manager (EPM) | 03/10/2025 | 0.93513 | 9.8 | 2 | FALSE | FALSE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13160 | |||
CVE-2024-50302 | Linux | Kernel | 03/04/2025 | 0.00213 | 5.5 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-50302 | ||||
CVE-2025-22224 | VMware | ESXi and Workstation | 03/04/2025 | 0.30629 | 9.3 | TRUE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224 | ||||
CVE-2025-22226 | VMware | ESXi, Workstation, and Fusion | 03/04/2025 | 0.04915 | 7.1 | FALSE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22226 | ||||
CVE-2025-22225 | VMware | ESXi | 03/04/2025 | 0.04699 | 8.2 | FALSE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22225 | ||||
CVE-2024-4885 | Progress | WhatsUp Gold | 03/03/2025 | 0.94278 | 9.8 | https://viz.greynoise.io/tag/progress-whatsup-gold-rce-cve-2024-4885-attempt||https://viz.greynoise.io/tag/progress-whatsup-gold-rce-cve-2024-4885-attempt | 2 | FALSE | TRUE | FALSE | https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-4885 | https://vulncheck.com/xdb/3ffa6851bf72 | |
CVE-2022-43769 | Hitachi Vantara | Pentaho Business Analytics (BA) Server | 03/03/2025 | 0.93769 | 8.8 | https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt||https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt | FALSE | TRUE | FALSE | https://support.pentaho.com/hc/en-us/articles/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769 ; https://nvd.nist.gov/vuln/detail/CVE-2022-43769 | https://vulncheck.com/xdb/ee3a42a38210 | ||
CVE-2023-20118 | Cisco | Small Business RV Series Routers | 03/03/2025 | 0.03546 | 6.5 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 ; https://nvd.nist.gov/vuln/detail/CVE-2023-20118 | ||||
CVE-2022-43939 | Hitachi Vantara | Pentaho Business Analytics (BA) Server | 03/03/2025 | 0.85909 | 8.6 | https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt||https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt | 2 | FALSE | TRUE | FALSE | https://support.pentaho.com/hc/en-us/articles/14455394120333--Resolved-Pentaho-BA-Server-Use-of-Non-Canonical-URL-Paths-for-Authorization-Decisions-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43939- ; https://nvd.nist.gov/vuln/detail/CVE-2022-43939 | https://vulncheck.com/xdb/915c4e634580 | |
CVE-2018-8639 | Microsoft | Windows | 03/03/2025 | 0.20821 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-8639 ; https://nvd.nist.gov/vuln/detail/CVE-2018-8639 | https://vulncheck.com/xdb/1f273f25f0fa||https://vulncheck.com/xdb/1f273f25f0fa , https://vulncheck.com/xdb/07b9ec25ec52||https://vulncheck.com/xdb/07b9ec25ec52 , https://vulncheck.com/xdb/103ce63ab269||https://vulncheck.com/xdb/103ce63ab269 , https://vulncheck.com/xdb/aa765b244430||https://vulncheck.com/xdb/aa765b244430 , https://vulncheck.com/xdb/5619ec246b0f||https://vulncheck.com/xdb/5619ec246b0f | |||
CVE-2023-34192 | Synacor | Zimbra Collaboration Suite (ZCS) | 02/25/2025 | 0.86293 | 9.0 | FALSE | FALSE | FALSE | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2023-34192 | ||||
CVE-2024-49035 | Microsoft | Partner Center | 02/25/2025 | 0.04504 | 8.7 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49035 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49035 | ||||
CVE-2017-3066 | Adobe | ColdFusion | 02/24/2025 | 0.93642 | 9.8 | FALSE | TRUE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb17-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2017-3066 | https://vulncheck.com/xdb/f8b1d5f82123 | |||
CVE-2024-20953 | Oracle | Agile Product Lifecycle Management (PLM) | 02/24/2025 | 0.70927 | 8.8 | FALSE | FALSE | FALSE | https://www.oracle.com/security-alerts/cpujan2024.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20953 | ||||
CVE-2025-24989 | Microsoft | Power Pages | 02/21/2025 | 0.10164 | 8.2 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24989 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24989 | ||||
CVE-2025-23209 | Craft CMS | Craft CMS | 02/20/2025 | 0.03309 | 8.0 | FALSE | FALSE | FALSE | https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x ; https://nvd.nist.gov/vuln/detail/CVE-2025-23209 | ||||
CVE-2025-0111 | Palo Alto Networks | PAN-OS | 02/20/2025 | 0.03255 | 7.1 | 6.5 | FALSE | FALSE | FALSE | https://security.paloaltonetworks.com/CVE-2025-0111 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0111 | |||
CVE-2025-0108 | Palo Alto Networks | PAN-OS | 02/18/2025 | 0.93982 | 8.8 | 9.1 | 8 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2025-0108 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0108 | https://vulncheck.com/xdb/e534e54d74a7||https://vulncheck.com/xdb/e534e54d74a7 , https://vulncheck.com/xdb/c7b1b239539d||https://vulncheck.com/xdb/c7b1b239539d , https://vulncheck.com/xdb/b12dbc5cd9c9||https://vulncheck.com/xdb/b12dbc5cd9c9 , https://vulncheck.com/xdb/1b50d3d89443||https://vulncheck.com/xdb/1b50d3d89443 , https://vulncheck.com/xdb/f70f1cc5b204||https://vulncheck.com/xdb/f70f1cc5b204 , https://vulncheck.com/xdb/81f131d1f00d||https://vulncheck.com/xdb/81f131d1f00d | |
CVE-2024-53704 | SonicWall | SonicOS | 02/18/2025 | 0.93906 | 9.8 | 3 | FALSE | TRUE | FALSE | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53704 | https://vulncheck.com/xdb/364cc4eceb03 | ||
CVE-2024-57727 | SimpleHelp | SimpleHelp | 02/13/2025 | 0.93972 | 7.5 | 0 | TRUE | TRUE | FALSE | https://simple-help.com/kb---security-vulnerabilities-01-2025 ; Additional CISA Mitigation Instructions: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a ; https://nvd.nist.gov/vuln/detail/CVE-2024-57727 | https://vulncheck.com/xdb/2d0a6de76da1 | ||
CVE-2025-24200 | Apple | iOS and iPadOS | 02/12/2025 | 0.44842 | 6.1 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/122173 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24200 | ||||
CVE-2024-41710 | Mitel | SIP Phones | 02/12/2025 | 0.08515 | 7.2 | FALSE | FALSE | FALSE | https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0019-001-v2.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-41710 | ||||
CVE-2025-21418 | Microsoft | Windows | 02/11/2025 | 0.12183 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21418 | ||||
CVE-2024-40890 | Zyxel | DSL CPE Devices | 02/11/2025 | 0.19444 | 8.8 | https://viz.greynoise.io/tag/zyxel-cpe-backdoor-account-attempt||https://viz.greynoise.io/tag/zyxel-cpe-backdoor-account-attempt , https://viz.greynoise.io/tag/zyxel-cpe-cve-2024-40890-command-injection-attempt||https://viz.greynoise.io/tag/zyxel-cpe-cve-2024-40890-command-injection-attempt | FALSE | FALSE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40890 | |||
CVE-2025-21391 | Microsoft | Windows | 02/11/2025 | 0.04198 | 7.1 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21391 | ||||
CVE-2024-40891 | Zyxel | DSL CPE Devices | 02/11/2025 | 0.50002 | 8.8 | FALSE | FALSE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891 | ||||
CVE-2025-0994 | Trimble | Cityworks | 02/07/2025 | 0.68627 | 8.6 | 8.8 | FALSE | FALSE | FALSE | https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?; https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0994 | |||
CVE-2025-0411 | 7-Zip | 7-Zip | 02/06/2025 | 0.36788 | 7.0 | FALSE | TRUE | FALSE | https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411 | https://vulncheck.com/xdb/3dceaa95f37d||https://vulncheck.com/xdb/3dceaa95f37d , https://vulncheck.com/xdb/379529f376bf||https://vulncheck.com/xdb/379529f376bf , https://vulncheck.com/xdb/7259dd836b0b||https://vulncheck.com/xdb/7259dd836b0b | |||
CVE-2020-15069 | Sophos | XG Firewall | 02/06/2025 | 0.57377 | 9.8 | FALSE | FALSE | FALSE | https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal ; https://nvd.nist.gov/vuln/detail/CVE-2020-15069 | ||||
CVE-2022-23748 | Audinate | Dante Discovery | 02/06/2025 | 0.16272 | 7.8 | FALSE | FALSE | FALSE | https://www.getdante.com/support/faq/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748/ ; https://nvd.nist.gov/vuln/detail/CVE-2022-23748 | ||||
CVE-2024-21413 | Microsoft | Office Outlook | 02/06/2025 | 0.93681 | 9.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413 | https://vulncheck.com/xdb/f843c9fab927||https://vulncheck.com/xdb/f843c9fab927 , https://vulncheck.com/xdb/7e98d318e5ee||https://vulncheck.com/xdb/7e98d318e5ee , https://vulncheck.com/xdb/f5432e60cf3a||https://vulncheck.com/xdb/f5432e60cf3a , https://vulncheck.com/xdb/903f7c89226e||https://vulncheck.com/xdb/903f7c89226e , https://vulncheck.com/xdb/e5743c4aa3d6||https://vulncheck.com/xdb/e5743c4aa3d6 , https://vulncheck.com/xdb/38f03d75ef65||https://vulncheck.com/xdb/38f03d75ef65 , https://vulncheck.com/xdb/22ef4fecc344||https://vulncheck.com/xdb/22ef4fecc344 , https://vulncheck.com/xdb/9d1931bf8b43||https://vulncheck.com/xdb/9d1931bf8b43 , https://vulncheck.com/xdb/e742b4b6b811||https://vulncheck.com/xdb/e742b4b6b811 , https://vulncheck.com/xdb/3a5fa2dbf482||https://vulncheck.com/xdb/3a5fa2dbf482 , https://vulncheck.com/xdb/353be747e705||https://vulncheck.com/xdb/353be747e705 , https://vulncheck.com/xdb/44a78f4aa71f||https://vulncheck.com/xdb/44a78f4aa71f , https://vulncheck.com/xdb/4424d059b825||https://vulncheck.com/xdb/4424d059b825 , https://vulncheck.com/xdb/b009e7e8de7f||https://vulncheck.com/xdb/b009e7e8de7f , https://vulncheck.com/xdb/9d498f414ca6||https://vulncheck.com/xdb/9d498f414ca6 , https://vulncheck.com/xdb/bf0ad298ff8b||https://vulncheck.com/xdb/bf0ad298ff8b | |||
CVE-2020-29574 | Sophos | CyberoamOS | 02/06/2025 | 0.12237 | 9.8 | FALSE | FALSE | FALSE | https://support.sophos.com/support/s/article/KBA-000007526 ; https://nvd.nist.gov/vuln/detail/CVE-2020-29574 | ||||
CVE-2024-53104 | Linux | Kernel | 02/05/2025 | 0.02472 | 7.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104 | ||||
CVE-2024-29059 | Microsoft | .NET Framework | 02/04/2025 | 0.93675 | 7.5 | https://viz.greynoise.io/tag/microsoft--net-framework-information-disclosure-attempt||https://viz.greynoise.io/tag/microsoft--net-framework-information-disclosure-attempt | 3 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29059 | https://vulncheck.com/xdb/4b06223bcea0 | |
CVE-2018-19410 | Paessler | PRTG Network Monitor | 02/04/2025 | 0.91484 | 9.8 | https://viz.greynoise.io/tag/prtg-network-monitor-auth-bypass-attempt-cve-2018-19410||https://viz.greynoise.io/tag/prtg-network-monitor-auth-bypass-attempt-cve-2018-19410 | FALSE | TRUE | FALSE | https://www.paessler.com/prtg/history/prtg-18#18.2.41.1652 ; https://nvd.nist.gov/vuln/detail/CVE-2018-19410 | https://vulncheck.com/xdb/997f2d3dc749 | ||
CVE-2018-9276 | Paessler | PRTG Network Monitor | 02/04/2025 | 0.80858 | 7.2 | FALSE | TRUE | FALSE | https://www.paessler.com/prtg/history/prtg-18#18.2.39 ; https://nvd.nist.gov/vuln/detail/CVE-2018-9276 | https://vulncheck.com/xdb/0086801811ed | |||
CVE-2024-45195 | Apache | OFBiz | 02/04/2025 | 0.94139 | 7.5 | https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-45195-data-file-validation-rce-attempt||https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-45195-data-file-validation-rce-attempt | 1 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://ofbiz.apache.org/security.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-45195 | ||
CVE-2025-24085 | Apple | Multiple Products | 01/29/2025 | 0.08548 | 7.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/122066 ; https://support.apple.com/en-us/122068 ; https://support.apple.com/en-us/122071 ; https://support.apple.com/en-us/122072 ; https://support.apple.com/en-us/122073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24085 | https://vulncheck.com/xdb/0a1058ad5867||https://vulncheck.com/xdb/0a1058ad5867 , https://vulncheck.com/xdb/0a1058ad5867||https://vulncheck.com/xdb/0a1058ad5867 | |||
CVE-2025-23006 | SonicWall | SMA1000 Appliances | 01/24/2025 | 0.49846 | 9.8 | TRUE | FALSE | FALSE | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 ; https://nvd.nist.gov/vuln/detail/CVE-2025-23006 | ||||
CVE-2020-11023 | JQuery | JQuery | 01/23/2025 | 0.21831 | 6.9 | FALSE | TRUE | FALSE | https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2020-11023 | ||||
CVE-2024-50603 | Aviatrix | Controllers | 01/16/2025 | 0.94352 | 10.0 | 2 | FALSE | TRUE | FALSE | https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true ; https://nvd.nist.gov/vuln/detail/CVE-2024-50603 | https://vulncheck.com/xdb/cfd9552d3699||https://vulncheck.com/xdb/cfd9552d3699 , https://vulncheck.com/xdb/513baacd981d||https://vulncheck.com/xdb/513baacd981d | ||
CVE-2025-21334 | Microsoft | Windows | 01/14/2025 | 0.04626 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334 | ||||
CVE-2025-21335 | Microsoft | Windows | 01/14/2025 | 0.06104 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335 | ||||
CVE-2025-21333 | Microsoft | Windows | 01/14/2025 | 0.56696 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333 | https://vulncheck.com/xdb/089575034e07||https://vulncheck.com/xdb/089575034e07 , https://vulncheck.com/xdb/4e8247ebe2f4||https://vulncheck.com/xdb/4e8247ebe2f4 | |||
CVE-2024-55591 | Fortinet | FortiOS and FortiProxy | 01/14/2025 | 0.94176 | 9.8 | TRUE | TRUE | FALSE | https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591 | https://vulncheck.com/xdb/2112e05b2905||https://vulncheck.com/xdb/2112e05b2905 , https://vulncheck.com/xdb/92d9a3d86d34||https://vulncheck.com/xdb/92d9a3d86d34 , https://vulncheck.com/xdb/584a6c464304||https://vulncheck.com/xdb/584a6c464304 , https://vulncheck.com/xdb/49f0149db4da||https://vulncheck.com/xdb/49f0149db4da , https://vulncheck.com/xdb/e26be9aa9402||https://vulncheck.com/xdb/e26be9aa9402 , https://vulncheck.com/xdb/887dc3b62aac||https://vulncheck.com/xdb/887dc3b62aac | |||
CVE-2023-48365 | Qlik | Sense | 01/13/2025 | 0.73360 | 9.6 | TRUE | FALSE | FALSE | https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365 | ||||
CVE-2024-12686 | BeyondTrust | Privileged Remote Access (PRA) and Remote Support (RS) | 01/13/2025 | 0.05770 | 6.6 | FALSE | FALSE | FALSE | https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686 | ||||
CVE-2025-0282 | Ivanti | Connect Secure, Policy Secure, and ZTA Gateways | 01/08/2025 | 0.93244 | 9.0 | TRUE | TRUE | FALSE | CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282 | https://vulncheck.com/xdb/043030d6caa4||https://vulncheck.com/xdb/043030d6caa4 , https://vulncheck.com/xdb/858b463ecabe||https://vulncheck.com/xdb/858b463ecabe , https://vulncheck.com/xdb/85fcb27bdd09||https://vulncheck.com/xdb/85fcb27bdd09 , https://vulncheck.com/xdb/d343e6784986||https://vulncheck.com/xdb/d343e6784986 | |||
CVE-2020-2883 | Oracle | WebLogic Server | 01/07/2025 | 0.93729 | 9.8 | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpuapr2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-2883 | https://vulncheck.com/xdb/407219371c37||https://vulncheck.com/xdb/407219371c37 , https://vulncheck.com/xdb/7960bb5df13e||https://vulncheck.com/xdb/7960bb5df13e , https://vulncheck.com/xdb/d55ddb5fac32||https://vulncheck.com/xdb/d55ddb5fac32 , https://vulncheck.com/xdb/7927833b7021||https://vulncheck.com/xdb/7927833b7021 , https://vulncheck.com/xdb/da7b6fb2895f||https://vulncheck.com/xdb/da7b6fb2895f , https://vulncheck.com/xdb/f0337df1320b||https://vulncheck.com/xdb/f0337df1320b , https://vulncheck.com/xdb/9ab580b3f80b||https://vulncheck.com/xdb/9ab580b3f80b | |||
CVE-2024-41713 | Mitel | MiCollab | 01/07/2025 | 0.93914 | 9.1 | https://viz.greynoise.io/tag/mitel-micollab-cve-2024-41713-authentication-bypass-attempt||https://viz.greynoise.io/tag/mitel-micollab-cve-2024-41713-authentication-bypass-attempt | 2 | TRUE | TRUE | TRUE | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-41713 | https://vulncheck.com/xdb/90a108cc70dd||https://vulncheck.com/xdb/90a108cc70dd , https://vulncheck.com/xdb/c852f2485f3d||https://vulncheck.com/xdb/c852f2485f3d , https://vulncheck.com/xdb/cabd1689d8de||https://vulncheck.com/xdb/cabd1689d8de , https://vulncheck.com/xdb/355eb6521aa8||https://vulncheck.com/xdb/355eb6521aa8 , https://vulncheck.com/xdb/95179643ddce||https://vulncheck.com/xdb/95179643ddce | |
CVE-2024-55550 | Mitel | MiCollab | 01/07/2025 | 0.15002 | 2.7 | TRUE | FALSE | FALSE | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55550 | ||||
CVE-2024-3393 | Palo Alto Networks | PAN-OS | 12/30/2024 | 0.64730 | 8.7 | 7.5 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2024-3393 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3393 | https://vulncheck.com/xdb/07151b94c337 | ||
CVE-2021-44207 | Acclaim Systems | USAHERDS | 12/23/2024 | 0.11853 | 8.1 | FALSE | FALSE | FALSE | https://www.acclaimsystems.com/#contact ; https://www.tnatc.org/#contact ; https://nvd.nist.gov/vuln/detail/CVE-2021-44207 | ||||
CVE-2024-12356 | BeyondTrust | Privileged Remote Access (PRA) and Remote Support (RS) | 12/19/2024 | 0.93775 | 9.8 | FALSE | TRUE | FALSE | https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12356 | ||||
CVE-2021-40407 | Reolink | RLC-410W IP Camera | 12/18/2024 | 0.47291 | 9.1 | FALSE | FALSE | FALSE | https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-40407 | ||||
CVE-2018-14933 | NUUO | NVRmini Devices | 12/18/2024 | 0.93678 | 9.8 | FALSE | TRUE | FALSE | https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter%EF%BC%BFNVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2018-14933 | ||||
CVE-2019-11001 | Reolink | Multiple IP Cameras | 12/18/2024 | 0.47127 | 7.2 | FALSE | FALSE | FALSE | https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-11001 | ||||
CVE-2022-23227 | NUUO | NVRmini2 Devices | 12/18/2024 | 0.55998 | 9.8 | FALSE | FALSE | FALSE | https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter_NVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2022-23227 | ||||
CVE-2024-55956 | Cleo | Multiple Products | 12/17/2024 | 0.91828 | 9.8 | https://viz.greynoise.io/tag/cleo-file-transfer-cve-2024-55956-arbitrary-file-write-attempt||https://viz.greynoise.io/tag/cleo-file-transfer-cve-2024-55956-arbitrary-file-write-attempt | TRUE | TRUE | FALSE | https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update-CVE-2024-55956 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55956 | |||
CVE-2024-20767 | Adobe | ColdFusion | 12/16/2024 | 0.94114 | 7.4 | https://viz.greynoise.io/tag/adobe-coldfusion-arbitrary-file-read-cve-2024-20767-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-arbitrary-file-read-cve-2024-20767-attempt | 1 | FALSE | TRUE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20767 | https://vulncheck.com/xdb/1e72253d309a||https://vulncheck.com/xdb/1e72253d309a , https://vulncheck.com/xdb/3aa2e6eafec7||https://vulncheck.com/xdb/3aa2e6eafec7 , https://vulncheck.com/xdb/d03c6dd756ae||https://vulncheck.com/xdb/d03c6dd756ae , https://vulncheck.com/xdb/2ec2b9a2d54d||https://vulncheck.com/xdb/2ec2b9a2d54d | |
CVE-2024-35250 | Microsoft | Windows | 12/16/2024 | 0.52421 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250 ; https://nvd.nist.gov/vuln/detail/CVE-2024-35250 | https://vulncheck.com/xdb/0d2b550a1e93||https://vulncheck.com/xdb/0d2b550a1e93 , https://vulncheck.com/xdb/ad758b7b19fe||https://vulncheck.com/xdb/ad758b7b19fe , https://vulncheck.com/xdb/46bcac6e7f22||https://vulncheck.com/xdb/46bcac6e7f22 , https://vulncheck.com/xdb/e8420e7e6156||https://vulncheck.com/xdb/e8420e7e6156 | |||
CVE-2024-50623 | Cleo | Multiple Products | 12/13/2024 | 0.93992 | 9.8 | https://viz.greynoise.io/tag/cleo-cve-2024-50623-unrestricted-file-upload-or-download-attempt||https://viz.greynoise.io/tag/cleo-cve-2024-50623-unrestricted-file-upload-or-download-attempt | 0 | TRUE | TRUE | FALSE | https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update ; https://nvd.nist.gov/vuln/detail/CVE-2024-50623 | https://vulncheck.com/xdb/99fbb4b736ab||https://vulncheck.com/xdb/99fbb4b736ab , https://vulncheck.com/xdb/755b4f4137d1||https://vulncheck.com/xdb/755b4f4137d1 , https://vulncheck.com/xdb/f7e91dc53927||https://vulncheck.com/xdb/f7e91dc53927 , https://vulncheck.com/xdb/5b8b8aaf6a74||https://vulncheck.com/xdb/5b8b8aaf6a74 | |
CVE-2024-49138 | Microsoft | Windows | 12/10/2024 | 0.84420 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49138 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49138 | https://vulncheck.com/xdb/7b388f4dba71||https://vulncheck.com/xdb/7b388f4dba71 , https://vulncheck.com/xdb/622cd13afd39||https://vulncheck.com/xdb/622cd13afd39 | |||
CVE-2024-51378 | CyberPersons | CyberPanel | 12/04/2024 | 0.94089 | 10.0 | https://viz.greynoise.io/tag/cyberpanel-getresetstatus-cve-2024-51378-command-injection-attempt||https://viz.greynoise.io/tag/cyberpanel-getresetstatus-cve-2024-51378-command-injection-attempt | TRUE | TRUE | FALSE | https://cyberpanel.net/KnowledgeBase/home/change-logs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-51378 | https://vulncheck.com/xdb/f89a893b80f0||https://vulncheck.com/xdb/f89a893b80f0 , https://vulncheck.com/xdb/a3aa6ae8056c||https://vulncheck.com/xdb/a3aa6ae8056c | ||
CVE-2024-11680 | ProjectSend | ProjectSend | 12/03/2024 | 0.93609 | 9.8 | https://viz.greynoise.io/tag/projectsend-cve-2024-11680-incorrect-authorization-webshell-upload-attempt||https://viz.greynoise.io/tag/projectsend-cve-2024-11680-incorrect-authorization-webshell-upload-attempt | FALSE | TRUE | FALSE | https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11680 | https://vulncheck.com/xdb/a7d6dcb1ffac | ||
CVE-2024-11667 | Zyxel | Multiple Firewalls | 12/03/2024 | 0.50985 | 7.5 | TRUE | FALSE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-21-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11667 | ||||
CVE-2023-45727 | North Grid | Proself | 12/03/2024 | 0.20604 | 7.5 | FALSE | FALSE | FALSE | https://www.proself.jp/information/153/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-45727 | ||||
CVE-2023-28461 | Array Networks | AG/vxAG ArrayOS | 11/25/2024 | 0.89761 | 9.8 | https://viz.greynoise.io/tag/array-networks-ag-vxag-cve-2023-28461-remote-code-execution-attempt||https://viz.greynoise.io/tag/array-networks-ag-vxag-cve-2023-28461-remote-code-execution-attempt | 0 | TRUE | FALSE | FALSE | https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2023-28461 | ||
CVE-2024-44309 | Apple | Multiple Products | 11/21/2024 | 0.00237 | 6.1 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44309 | ||||
CVE-2024-21287 | Oracle | Agile Product Lifecycle Management (PLM) | 11/21/2024 | 0.73963 | 7.5 | FALSE | FALSE | FALSE | https://www.oracle.com/security-alerts/alert-cve-2024-21287.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-21287 | ||||
CVE-2024-44308 | Apple | Multiple Products | 11/21/2024 | 0.00334 | 8.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44308 | https://vulncheck.com/xdb/aa3a6d7e0723 | |||
CVE-2024-38813 | VMware | vCenter Server | 11/20/2024 | 0.14583 | 7.5 | FALSE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38813 | ||||
CVE-2024-38812 | VMware | vCenter Server | 11/20/2024 | 0.58010 | 9.8 | FALSE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38812 | ||||
CVE-2024-1212 | Progress | Kemp LoadMaster | 11/18/2024 | 0.94349 | 10.0 | https://viz.greynoise.io/tag/progress-kemp-loadmaster-rce-cve-2024-1212-attempt||https://viz.greynoise.io/tag/progress-kemp-loadmaster-rce-cve-2024-1212-attempt | 2 | FALSE | TRUE | FALSE | https://community.progress.com/s/article/Release-Notice-LMOS-7-2-59-2-7-2-54-8-7-2-48-10-CVE-2024-1212 ; https://nvd.nist.gov/vuln/detail/CVE-2024-1212 | https://vulncheck.com/xdb/50743b49ce00||https://vulncheck.com/xdb/50743b49ce00 , https://vulncheck.com/xdb/69dd3ae035ff||https://vulncheck.com/xdb/69dd3ae035ff | |
CVE-2024-0012 | Palo Alto Networks | PAN-OS | 11/18/2024 | 0.94327 | 9.3 | 9.8 | https://viz.greynoise.io/tag/palo-alto-pan-os-auth-bypass-cve-2024-0012-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-auth-bypass-cve-2024-0012-attempt | 4 | TRUE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2024-0012 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0012 | https://vulncheck.com/xdb/5a56db95a9d0||https://vulncheck.com/xdb/5a56db95a9d0 , https://vulncheck.com/xdb/8681e4b6c1e7||https://vulncheck.com/xdb/8681e4b6c1e7 , https://vulncheck.com/xdb/b64291402220||https://vulncheck.com/xdb/b64291402220 , https://vulncheck.com/xdb/3dd168f0b850||https://vulncheck.com/xdb/3dd168f0b850 , https://vulncheck.com/xdb/9407f5afd709||https://vulncheck.com/xdb/9407f5afd709 , https://vulncheck.com/xdb/f74a09e30d54||https://vulncheck.com/xdb/f74a09e30d54 , https://vulncheck.com/xdb/b3afbf33fe3c||https://vulncheck.com/xdb/b3afbf33fe3c , https://vulncheck.com/xdb/134e8d40e90c||https://vulncheck.com/xdb/134e8d40e90c , https://vulncheck.com/xdb/393b3785530d||https://vulncheck.com/xdb/393b3785530d , https://vulncheck.com/xdb/b44394b6ef69||https://vulncheck.com/xdb/b44394b6ef69 , https://vulncheck.com/xdb/eb11951249df||https://vulncheck.com/xdb/eb11951249df |
CVE-2024-9474 | Palo Alto Networks | PAN-OS | 11/18/2024 | 0.94283 | 6.9 | 7.2 | https://viz.greynoise.io/tag/palo-alto-pan-os-command-injection-cve-2024-9474-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-command-injection-cve-2024-9474-attempt | 0 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2024-9474 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9474 | https://vulncheck.com/xdb/0edcc19bc4d9||https://vulncheck.com/xdb/0edcc19bc4d9 , https://vulncheck.com/xdb/aa9dee512df6||https://vulncheck.com/xdb/aa9dee512df6 , https://vulncheck.com/xdb/633ea1c42a8f||https://vulncheck.com/xdb/633ea1c42a8f , https://vulncheck.com/xdb/d83694f41e6f||https://vulncheck.com/xdb/d83694f41e6f , https://vulncheck.com/xdb/0a9ea1b441bd||https://vulncheck.com/xdb/0a9ea1b441bd , https://vulncheck.com/xdb/a6c35ab80c45||https://vulncheck.com/xdb/a6c35ab80c45 , https://vulncheck.com/xdb/151f0aa40b6d||https://vulncheck.com/xdb/151f0aa40b6d , https://vulncheck.com/xdb/6401fcd40f5e||https://vulncheck.com/xdb/6401fcd40f5e |
CVE-2024-9463 | Palo Alto Networks | Expedition | 11/14/2024 | 0.94245 | 9.9 | 7.5 | https://viz.greynoise.io/tag/palo-alto-expedition-os-command-injection-cve-2024-9463-attempt||https://viz.greynoise.io/tag/palo-alto-expedition-os-command-injection-cve-2024-9463-attempt | 2 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/PAN-SA-2024-0010 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9463 | https://vulncheck.com/xdb/d043299b2a99 |
CVE-2024-9465 | Palo Alto Networks | Expedition | 11/14/2024 | 0.94244 | 9.2 | 9.1 | https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-9465-unauth-sqli-attempt||https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-9465-unauth-sqli-attempt | 1 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/PAN-SA-2024-0010 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9465 | https://vulncheck.com/xdb/bac87e2e0d0c||https://vulncheck.com/xdb/bac87e2e0d0c , https://vulncheck.com/xdb/f6fbf65dc654||https://vulncheck.com/xdb/f6fbf65dc654 , https://vulncheck.com/xdb/163bcfc3bb0a||https://vulncheck.com/xdb/163bcfc3bb0a |
CVE-2014-2120 | Cisco | Adaptive Security Appliance (ASA) | 11/12/2024 | 0.80116 | 6.1 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CVE-2014-2120 ; https://nvd.nist.gov/vuln/detail/CVE-2014-2120 | ||||
CVE-2021-26086 | Atlassian | Jira Server and Data Center | 11/12/2024 | 0.94247 | 5.3 | https://viz.greynoise.io/tag/atlassian-jira-path-traversal-attempt||https://viz.greynoise.io/tag/atlassian-jira-path-traversal-attempt | 0 | FALSE | TRUE | FALSE | https://jira.atlassian.com/browse/JRASERVER-72695 ; https://nvd.nist.gov/vuln/detail/CVE-2021-26086 | ||
CVE-2021-41277 | Metabase | Metabase | 11/12/2024 | 0.94404 | 10.0 | https://viz.greynoise.io/tag/metabase-lfi-attempt||https://viz.greynoise.io/tag/metabase-lfi-attempt | 2 | FALSE | TRUE | FALSE | https://github.com/metabase/metabase/security/advisories/GHSA-w73v-6p7p-fpfr ; https://nvd.nist.gov/vuln/detail/CVE-2021-41277 | https://vulncheck.com/xdb/4a3d504338fe||https://vulncheck.com/xdb/4a3d504338fe , https://vulncheck.com/xdb/ade2199af4d8||https://vulncheck.com/xdb/ade2199af4d8 , https://vulncheck.com/xdb/d82529f295a2||https://vulncheck.com/xdb/d82529f295a2 | |
CVE-2024-43451 | Microsoft | Windows | 11/12/2024 | 0.91072 | 6.5 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43451 | https://vulncheck.com/xdb/4b1e8e9b00ed | |||
CVE-2024-49039 | Microsoft | Windows | 11/12/2024 | 0.43689 | 8.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49039 | https://vulncheck.com/xdb/0dfb7d7bb580||https://vulncheck.com/xdb/0dfb7d7bb580 , https://vulncheck.com/xdb/b7425539e1cf||https://vulncheck.com/xdb/b7425539e1cf | |||
CVE-2024-51567 | CyberPersons | CyberPanel | 11/07/2024 | 0.94261 | 10.0 | https://viz.greynoise.io/tag/cyberpanel-rce-attempt||https://viz.greynoise.io/tag/cyberpanel-rce-attempt | 0 | TRUE | TRUE | FALSE | https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel ; https://nvd.nist.gov/vuln/detail/CVE-2024-51567 | https://vulncheck.com/xdb/04399b4b752c||https://vulncheck.com/xdb/04399b4b752c , https://vulncheck.com/xdb/459efae0ba21||https://vulncheck.com/xdb/459efae0ba21 , https://vulncheck.com/xdb/c7fb9952eb0e||https://vulncheck.com/xdb/c7fb9952eb0e | |
CVE-2019-16278 | Nostromo | nhttpd | 11/07/2024 | 0.94390 | 9.8 | https://viz.greynoise.io/tag/nostromo-rce-attempt||https://viz.greynoise.io/tag/nostromo-rce-attempt | 3 | FALSE | TRUE | FALSE | https://www.nazgul.ch/dev/nostromo_cl.txt ; https://nvd.nist.gov/vuln/detail/CVE-2019-16278 | https://vulncheck.com/xdb/42989a8efb98||https://vulncheck.com/xdb/42989a8efb98 , https://vulncheck.com/xdb/27caa8f2e1ed||https://vulncheck.com/xdb/27caa8f2e1ed , https://vulncheck.com/xdb/19dcd19fffaf||https://vulncheck.com/xdb/19dcd19fffaf , https://vulncheck.com/xdb/c170756630e3||https://vulncheck.com/xdb/c170756630e3 , https://vulncheck.com/xdb/9c48b3d900f1||https://vulncheck.com/xdb/9c48b3d900f1 , https://vulncheck.com/xdb/6c38a06d6d2a||https://vulncheck.com/xdb/6c38a06d6d2a , https://vulncheck.com/xdb/7d72baf3d3a6||https://vulncheck.com/xdb/7d72baf3d3a6 , https://vulncheck.com/xdb/b68c72b934fa||https://vulncheck.com/xdb/b68c72b934fa , https://vulncheck.com/xdb/9c7a1af9a272||https://vulncheck.com/xdb/9c7a1af9a272 , https://vulncheck.com/xdb/2c96c551dfdb||https://vulncheck.com/xdb/2c96c551dfdb , https://vulncheck.com/xdb/8233a377e146||https://vulncheck.com/xdb/8233a377e146 , https://vulncheck.com/xdb/dd3c9e908dd7||https://vulncheck.com/xdb/dd3c9e908dd7 , https://vulncheck.com/xdb/5bbc5ed5a337||https://vulncheck.com/xdb/5bbc5ed5a337 , https://vulncheck.com/xdb/ceecea9075da||https://vulncheck.com/xdb/ceecea9075da | |
CVE-2024-5910 | Palo Alto Networks | Expedition | 11/07/2024 | 0.90821 | 9.3 | 9.8 | https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-5910-account-takeover-attempt||https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-5910-account-takeover-attempt | 0 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2024-5910 ; https://nvd.nist.gov/vuln/detail/CVE-2024-5910 | |
CVE-2024-43093 | Android | Framework | 11/07/2024 | 0.00016 | 7.8 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/2024-11-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43093 | ||||
CVE-2024-8957 | PTZOptics | PT30X-SDI/NDI Cameras | 11/04/2024 | 0.46040 | 7.2 | https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-rce-attempt||https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-rce-attempt | 0 | FALSE | FALSE | TRUE | https://ptzoptics.com/firmware-changelog/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-8957 | ||
CVE-2024-8956 | PTZOptics | PT30X-SDI/NDI Cameras | 11/04/2024 | 0.86905 | 9.1 | https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-auth-bypass-attempt||https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-auth-bypass-attempt | FALSE | FALSE | FALSE | https://ptzoptics.com/firmware-changelog/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-8956 | |||
CVE-2024-20481 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 10/24/2024 | 0.02137 | 5.8 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW ; https://nvd.nist.gov/vuln/detail/CVE-2024-20481 | ||||
CVE-2024-37383 | Roundcube | Webmail | 10/24/2024 | 0.72100 | 6.1 | FALSE | TRUE | FALSE | https://github.com/roundcube/roundcubemail/releases/tag/1.5.7, https://github.com/roundcube/roundcubemail/releases/tag/1.6.7 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37383 | https://vulncheck.com/xdb/1154ab034311||https://vulncheck.com/xdb/1154ab034311 , https://vulncheck.com/xdb/ed3b62fcf757||https://vulncheck.com/xdb/ed3b62fcf757 | |||
CVE-2024-47575 | Fortinet | FortiManager | 10/23/2024 | 0.90308 | 9.8 | https://viz.greynoise.io/tag/fortinet-fortimanager-cve-2024-47575-rce-attempt||https://viz.greynoise.io/tag/fortinet-fortimanager-cve-2024-47575-rce-attempt | FALSE | TRUE | FALSE | https://fortiguard.fortinet.com/psirt/FG-IR-24-423 ; https://nvd.nist.gov/vuln/detail/CVE-2024-47575 | https://vulncheck.com/xdb/4d8956df056d||https://vulncheck.com/xdb/4d8956df056d , https://vulncheck.com/xdb/8204500c97e4||https://vulncheck.com/xdb/8204500c97e4 , https://vulncheck.com/xdb/bf46bb5d9d22||https://vulncheck.com/xdb/bf46bb5d9d22 , https://vulncheck.com/xdb/8df10500dd48||https://vulncheck.com/xdb/8df10500dd48 | ||
CVE-2024-38094 | Microsoft | SharePoint | 10/22/2024 | 0.84422 | 7.2 | TRUE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38094 | ||||
CVE-2024-9537 | ScienceLogic | SL1 | 10/21/2024 | 0.27343 | 9.3 | 9.8 | FALSE | FALSE | FALSE | https://support.sciencelogic.com/s/article/15527 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9537 | |||
CVE-2024-40711 | Veeam | Backup & Replication | 10/17/2024 | 0.49658 | 9.8 | https://viz.greynoise.io/tag/veeam-backup-and-replication-cve-2024-40711-unsafe-deserialization-rce-attempt||https://viz.greynoise.io/tag/veeam-backup-and-replication-cve-2024-40711-unsafe-deserialization-rce-attempt | TRUE | TRUE | FALSE | https://www.veeam.com/kb4649 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40711 | https://vulncheck.com/xdb/1adc56f6da25 | ||
CVE-2024-28987 | SolarWinds | Web Help Desk | 10/15/2024 | 0.94221 | 9.1 | https://viz.greynoise.io/tag/solarwinds-web-help-desk-cve-2024-28987-hard-coded-credentials-attempt||https://viz.greynoise.io/tag/solarwinds-web-help-desk-cve-2024-28987-hard-coded-credentials-attempt | FALSE | TRUE | FALSE | https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987 ; https://nvd.nist.gov/vuln/detail/CVE-2024-28987 | https://vulncheck.com/xdb/1378be70d8dd||https://vulncheck.com/xdb/1378be70d8dd , https://vulncheck.com/xdb/d11c0c1a7a29||https://vulncheck.com/xdb/d11c0c1a7a29 , https://vulncheck.com/xdb/cb33e9cd9f7c||https://vulncheck.com/xdb/cb33e9cd9f7c | ||
CVE-2024-9680 | Mozilla | Firefox | 10/15/2024 | 0.09444 | 9.8 | FALSE | FALSE | FALSE | https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-9680 | ||||
CVE-2024-30088 | Microsoft | Windows | 10/15/2024 | 0.82802 | 7.0 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-30088 | https://vulncheck.com/xdb/3fd3632fa1a2||https://vulncheck.com/xdb/3fd3632fa1a2 , https://vulncheck.com/xdb/84d8f14d4ea2||https://vulncheck.com/xdb/84d8f14d4ea2 , https://vulncheck.com/xdb/80c76b2faf7e||https://vulncheck.com/xdb/80c76b2faf7e , https://vulncheck.com/xdb/8ca084cd8bf8||https://vulncheck.com/xdb/8ca084cd8bf8 , https://vulncheck.com/xdb/30cfb6a2ab0d||https://vulncheck.com/xdb/30cfb6a2ab0d | |||
CVE-2024-9379 | Ivanti | Cloud Services Appliance (CSA) | 10/09/2024 | 0.84371 | 6.5 | FALSE | FALSE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9379 | ||||
CVE-2024-9380 | Ivanti | Cloud Services Appliance (CSA) | 10/09/2024 | 0.82973 | 7.2 | FALSE | FALSE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9380 | ||||
CVE-2024-23113 | Fortinet | Multiple Products | 10/09/2024 | 0.45024 | 9.8 | FALSE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-24-029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23113 | https://vulncheck.com/xdb/b3ae997acc06||https://vulncheck.com/xdb/b3ae997acc06 , https://vulncheck.com/xdb/0548206afc9c||https://vulncheck.com/xdb/0548206afc9c , https://vulncheck.com/xdb/aad788d038d3||https://vulncheck.com/xdb/aad788d038d3 , https://vulncheck.com/xdb/3039091c436b||https://vulncheck.com/xdb/3039091c436b | |||
CVE-2024-43572 | Microsoft | Windows | 10/08/2024 | 0.63415 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/advisory/CVE-2024-43572 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43572 | ||||
CVE-2024-43047 | Qualcomm | Multiple Chipsets | 10/08/2024 | 0.00309 | 7.8 | FALSE | FALSE | FALSE | https://git.codelinaro.org/clo/la/platform/vendor/qcom/opensource/dsp-kernel/-/commit/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43047 | ||||
CVE-2024-43573 | Microsoft | Windows | 10/08/2024 | 0.08507 | 6.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43573 | ||||
CVE-2024-45519 | Synacor | Zimbra Collaboration Suite (ZCS) | 10/03/2024 | 0.94150 | 10.0 | https://viz.greynoise.io/tag/zimbra-collaboration-suite-cve-2024-45519-rce-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-cve-2024-45519-rce-attempt | FALSE | TRUE | FALSE | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2024-45519 | https://vulncheck.com/xdb/136d21a96745||https://vulncheck.com/xdb/136d21a96745 , https://vulncheck.com/xdb/2302bb7a26b2||https://vulncheck.com/xdb/2302bb7a26b2 , https://vulncheck.com/xdb/d42dbaba27e2||https://vulncheck.com/xdb/d42dbaba27e2 , https://vulncheck.com/xdb/a9e277d65f37||https://vulncheck.com/xdb/a9e277d65f37 , https://vulncheck.com/xdb/2476d32f40af||https://vulncheck.com/xdb/2476d32f40af | ||
CVE-2024-29824 | Ivanti | Endpoint Manager (EPM) | 10/02/2024 | 0.94341 | 9.6 | https://viz.greynoise.io/tag/ivanti-epm-cve-2024-29824-sqli-attempt||https://viz.greynoise.io/tag/ivanti-epm-cve-2024-29824-sqli-attempt | 2 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-May-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29824 | https://vulncheck.com/xdb/8d6a9418e9bf||https://vulncheck.com/xdb/8d6a9418e9bf , https://vulncheck.com/xdb/4987580c0d13||https://vulncheck.com/xdb/4987580c0d13 | |
CVE-2021-4043 | Motion Spell | GPAC | 09/30/2024 | 0.00747 | 5.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db ; https://nvd.nist.gov/vuln/detail/CVE-2021-4043 | ||||
CVE-2023-25280 | D-Link | DIR-820 Router | 09/30/2024 | 0.93612 | 9.8 | https://viz.greynoise.io/tag/d-link-dir-820-cve-2023-25280-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-820-cve-2023-25280-rce-attempt | FALSE | FALSE | FALSE | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10358 ; https://nvd.nist.gov/vuln/detail/CVE-2023-25280 | |||
CVE-2019-0344 | SAP | Commerce Cloud | 09/30/2024 | 0.34064 | 9.8 | FALSE | FALSE | FALSE | https://web.archive.org/web/20191214053020/https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 ; https://nvd.nist.gov/vuln/detail/CVE-2019-0344 | ||||
CVE-2020-15415 | DrayTek | Multiple Vigor Routers | 09/30/2024 | 0.93089 | 9.8 | https://viz.greynoise.io/tag/draytek-vigor-routers-cve-2020-15415-rce-attempt||https://viz.greynoise.io/tag/draytek-vigor-routers-cve-2020-15415-rce-attempt | 4 | FALSE | FALSE | TRUE | https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-remote-code-injection/execution-vulnerability-(cve-2020-14472) ; https://nvd.nist.gov/vuln/detail/CVE-2020-15415 | ||
CVE-2024-7593 | Ivanti | Virtual Traffic Manager | 09/24/2024 | 0.94399 | 9.8 | https://viz.greynoise.io/tag/ivanti-vtm-authentication-bypass-cve-2024-7593-attempt||https://viz.greynoise.io/tag/ivanti-vtm-authentication-bypass-cve-2024-7593-attempt | 2 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593 ; https://nvd.nist.gov/vuln/detail/CVE-2024-7593 | https://vulncheck.com/xdb/8ef95f91d4f9||https://vulncheck.com/xdb/8ef95f91d4f9 , https://vulncheck.com/xdb/9fce86dd34dc||https://vulncheck.com/xdb/9fce86dd34dc | |
CVE-2024-8963 | Ivanti | Cloud Services Appliance (CSA) | 09/19/2024 | 0.94296 | 9.4 | 5 | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963 | https://vulncheck.com/xdb/c1b270462e6a||https://vulncheck.com/xdb/c1b270462e6a , https://vulncheck.com/xdb/3186c7bc1c8b||https://vulncheck.com/xdb/3186c7bc1c8b | ||
CVE-2020-0618 | Microsoft | SQL Server | 09/18/2024 | 0.94252 | 8.8 | https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-attempt||https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-attempt , https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-check||https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-check | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618 | |||
CVE-2022-21445 | Oracle | ADF Faces | 09/18/2024 | 0.91483 | 9.8 | https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-scanner||https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-scanner , https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-attempt||https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-attempt | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445 | https://vulncheck.com/xdb/df8eb20f5b8e | ||
CVE-2020-14644 | Oracle | WebLogic Server | 09/18/2024 | 0.90365 | 9.8 | FALSE | FALSE | FALSE | https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644 | ||||
CVE-2024-27348 | Apache | HugeGraph-Server | 09/18/2024 | 0.94073 | 9.8 | https://viz.greynoise.io/tag/apache-hugegraph-cve-2024-27348-rce-attempt||https://viz.greynoise.io/tag/apache-hugegraph-cve-2024-27348-rce-attempt | 1 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348 | https://vulncheck.com/xdb/0817f891a615||https://vulncheck.com/xdb/0817f891a615 , https://vulncheck.com/xdb/486eb74db84b||https://vulncheck.com/xdb/486eb74db84b , https://vulncheck.com/xdb/1e027cb9ed60||https://vulncheck.com/xdb/1e027cb9ed60 , https://vulncheck.com/xdb/74d386417a3e||https://vulncheck.com/xdb/74d386417a3e | |
CVE-2013-0648 | Adobe | Flash Player | 09/17/2024 | 0.36931 | 8.8 | FALSE | FALSE | FALSE | https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648 | ||||
CVE-2014-0502 | Adobe | Flash Player | 09/17/2024 | 0.86341 | 8.8 | FALSE | FALSE | FALSE | https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502 | ||||
CVE-2013-0643 | Adobe | Flash Player | 09/17/2024 | 0.36303 | 8.8 | FALSE | FALSE | FALSE | https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643 | ||||
CVE-2014-0497 | Adobe | Flash Player | 09/17/2024 | 0.93453 | 9.8 | FALSE | TRUE | FALSE | https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497 | ||||
CVE-2024-6670 | Progress | WhatsUp Gold | 09/16/2024 | 0.94467 | 9.8 | https://viz.greynoise.io/tag/progress-whatsup-gold-cve-2024-6670-rce-attempt||https://viz.greynoise.io/tag/progress-whatsup-gold-cve-2024-6670-rce-attempt | 2 | TRUE | TRUE | FALSE | https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-6670 | https://vulncheck.com/xdb/f11b117a91b0 | |
CVE-2024-43461 | Microsoft | Windows | 09/16/2024 | 0.09714 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461 | ||||
CVE-2024-8190 | Ivanti | Cloud Services Appliance | 09/13/2024 | 0.91307 | 7.2 | https://viz.greynoise.io/tag/ivanti-cloud-services-appliance-os-injection-cve-2024-8190-attempt||https://viz.greynoise.io/tag/ivanti-cloud-services-appliance-os-injection-cve-2024-8190-attempt | FALSE | TRUE | FALSE | https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190; https://nvd.nist.gov/vuln/detail/CVE-2024-8190 | https://vulncheck.com/xdb/a262b91c09ce||https://vulncheck.com/xdb/a262b91c09ce , https://vulncheck.com/xdb/0e22f5deaf9d||https://vulncheck.com/xdb/0e22f5deaf9d | ||
CVE-2024-38014 | Microsoft | Windows | 09/10/2024 | 0.10523 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014; https://nvd.nist.gov/vuln/detail/CVE-2024-38014 | ||||
CVE-2024-38217 | Microsoft | Windows | 09/10/2024 | 0.14086 | 5.4 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217; https://nvd.nist.gov/vuln/detail/CVE-2024-38217 | ||||
CVE-2024-38226 | Microsoft | Publisher | 09/10/2024 | 0.03751 | 7.3 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226; https://nvd.nist.gov/vuln/detail/CVE-2024-38226 | ||||
CVE-2024-43491 | Microsoft | Windows | 09/10/2024 | 0.12392 | 9.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491; https://nvd.nist.gov/vuln/detail/CVE-2024-43491 | ||||
CVE-2024-40766 | SonicWall | SonicOS | 09/09/2024 | 0.18328 | 9.8 | TRUE | FALSE | FALSE | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015; https://nvd.nist.gov/vuln/detail/CVE-2024-40766 | ||||
CVE-2016-3714 | ImageMagick | ImageMagick | 09/09/2024 | 0.93877 | 8.4 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714 | https://vulncheck.com/xdb/06fba2780616||https://vulncheck.com/xdb/06fba2780616 , https://vulncheck.com/xdb/a180c1b0bb7e||https://vulncheck.com/xdb/a180c1b0bb7e , https://vulncheck.com/xdb/bef3b078d296||https://vulncheck.com/xdb/bef3b078d296 | |||
CVE-2017-1000253 | Linux | Kernel | 09/09/2024 | 0.55565 | 7.8 | TRUE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86; https://nvd.nist.gov/vuln/detail/CVE-2017-1000253 | https://vulncheck.com/xdb/a2d5c439141b||https://vulncheck.com/xdb/a2d5c439141b , https://vulncheck.com/xdb/545d9c502435||https://vulncheck.com/xdb/545d9c502435 | |||
CVE-2021-20124 | DrayTek | VigorConnect | 09/03/2024 | 0.93733 | 7.5 | https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20124-attempt||https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20124-attempt | 1 | FALSE | FALSE | FALSE | https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20124 | ||
CVE-2024-7262 | Kingsoft | WPS Office | 09/03/2024 | 0.25173 | 9.3 | 7.8 | FALSE | FALSE | FALSE | While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.; https://nvd.nist.gov/vuln/detail/CVE-2024-7262 | |||
CVE-2021-20123 | DrayTek | VigorConnect | 09/03/2024 | 0.93181 | 7.5 | https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20123-attempt||https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20123-attempt | 1 | FALSE | FALSE | FALSE | https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20123 | ||
CVE-2024-7965 | Chromium V8 | 08/28/2024 | 0.12837 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7965 | https://vulncheck.com/xdb/7fca7a836019||https://vulncheck.com/xdb/7fca7a836019 , https://vulncheck.com/xdb/bcc27e4b72fb||https://vulncheck.com/xdb/bcc27e4b72fb | ||||
CVE-2024-38856 | Apache | OFBiz | 08/27/2024 | 0.94366 | 9.8 | https://viz.greynoise.io/tag/apache-ofbiz-rce-cve-2024-38856-attempt||https://viz.greynoise.io/tag/apache-ofbiz-rce-cve-2024-38856-attempt | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w; https://nvd.nist.gov/vuln/detail/CVE-2024-38856 | https://vulncheck.com/xdb/edb9d392f8e8||https://vulncheck.com/xdb/edb9d392f8e8 , https://vulncheck.com/xdb/2ca2a8c3b393||https://vulncheck.com/xdb/2ca2a8c3b393 , https://vulncheck.com/xdb/f6c5ff007112||https://vulncheck.com/xdb/f6c5ff007112 , https://vulncheck.com/xdb/d832bf48d567||https://vulncheck.com/xdb/d832bf48d567 , https://vulncheck.com/xdb/e14070e9ff4a||https://vulncheck.com/xdb/e14070e9ff4a , https://vulncheck.com/xdb/034aa8828710||https://vulncheck.com/xdb/034aa8828710 , https://vulncheck.com/xdb/1c1099b3c2cc||https://vulncheck.com/xdb/1c1099b3c2cc , https://vulncheck.com/xdb/a05e462ad7f8||https://vulncheck.com/xdb/a05e462ad7f8 , https://vulncheck.com/xdb/b695c336103d||https://vulncheck.com/xdb/b695c336103d , https://vulncheck.com/xdb/22ff4506fd33||https://vulncheck.com/xdb/22ff4506fd33 , https://vulncheck.com/xdb/cd8eee41112d||https://vulncheck.com/xdb/cd8eee41112d | ||
CVE-2024-7971 | Chromium V8 | 08/26/2024 | 0.00351 | 9.6 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7971 | https://vulncheck.com/xdb/a847c8a9da7a | ||||
CVE-2024-39717 | Versa | Director | 08/23/2024 | 0.05514 | 6.6 | FALSE | FALSE | FALSE | https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717 | ||||
CVE-2021-33044 | Dahua | IP Camera Firmware | 08/21/2024 | 0.94269 | 9.8 | https://viz.greynoise.io/tag/dahua-auth-bypass||https://viz.greynoise.io/tag/dahua-auth-bypass | 2 | FALSE | TRUE | TRUE | https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33044 | https://vulncheck.com/xdb/75bd7155e05f||https://vulncheck.com/xdb/75bd7155e05f , https://vulncheck.com/xdb/1d81a72358fa||https://vulncheck.com/xdb/1d81a72358fa | |
CVE-2021-33045 | Dahua | IP Camera Firmware | 08/21/2024 | 0.93811 | 9.8 | https://viz.greynoise.io/tag/dahua-auth-bypass||https://viz.greynoise.io/tag/dahua-auth-bypass | FALSE | FALSE | FALSE | https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045 | |||
CVE-2021-31196 | Microsoft | Exchange Server | 08/21/2024 | 0.03916 | 7.2 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196; https://nvd.nist.gov/vuln/detail/CVE-2021-31196 | ||||
CVE-2022-0185 | Linux | Kernel | 08/21/2024 | 0.00749 | 8.4 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2; https://nvd.nist.gov/vuln/detail/CVE-2022-0185 | https://vulncheck.com/xdb/6f9afef80b6d||https://vulncheck.com/xdb/6f9afef80b6d , https://vulncheck.com/xdb/38c4c63f9d6f||https://vulncheck.com/xdb/38c4c63f9d6f , https://vulncheck.com/xdb/b96fe0fc5a17||https://vulncheck.com/xdb/b96fe0fc5a17 , https://vulncheck.com/xdb/617305981f80||https://vulncheck.com/xdb/617305981f80 , https://vulncheck.com/xdb/c66aa08676a5||https://vulncheck.com/xdb/c66aa08676a5 , https://vulncheck.com/xdb/ee5208622092||https://vulncheck.com/xdb/ee5208622092 | |||
CVE-2024-23897 | Jenkins | Jenkins Command Line Interface (CLI) | 08/19/2024 | 0.94466 | 9.8 | https://viz.greynoise.io/tag/jenkins-cli-arbitrary-file-read-cve-2024-23897-attempt||https://viz.greynoise.io/tag/jenkins-cli-arbitrary-file-read-cve-2024-23897-attempt | 1 | TRUE | TRUE | FALSE | https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314; https://nvd.nist.gov/vuln/detail/CVE-2024-23897 | https://vulncheck.com/xdb/58ee3e361a9c||https://vulncheck.com/xdb/58ee3e361a9c , https://vulncheck.com/xdb/4ebb59b08827||https://vulncheck.com/xdb/4ebb59b08827 , https://vulncheck.com/xdb/13fbb1e454d4||https://vulncheck.com/xdb/13fbb1e454d4 , https://vulncheck.com/xdb/0013389cb2b5||https://vulncheck.com/xdb/0013389cb2b5 , https://vulncheck.com/xdb/2a862a5f18bf||https://vulncheck.com/xdb/2a862a5f18bf , https://vulncheck.com/xdb/f548a7c24191||https://vulncheck.com/xdb/f548a7c24191 , https://vulncheck.com/xdb/45c1b452f366||https://vulncheck.com/xdb/45c1b452f366 , https://vulncheck.com/xdb/020fda9d3348||https://vulncheck.com/xdb/020fda9d3348 , https://vulncheck.com/xdb/8a21c598c826||https://vulncheck.com/xdb/8a21c598c826 , https://vulncheck.com/xdb/56f0947af384||https://vulncheck.com/xdb/56f0947af384 , https://vulncheck.com/xdb/066b2623ad07||https://vulncheck.com/xdb/066b2623ad07 , https://vulncheck.com/xdb/97119087d54d||https://vulncheck.com/xdb/97119087d54d , https://vulncheck.com/xdb/9fd38a912fe1||https://vulncheck.com/xdb/9fd38a912fe1 , https://vulncheck.com/xdb/b79e6878d0b3||https://vulncheck.com/xdb/b79e6878d0b3 , https://vulncheck.com/xdb/f5619d4199d8||https://vulncheck.com/xdb/f5619d4199d8 , https://vulncheck.com/xdb/20c72b87534c||https://vulncheck.com/xdb/20c72b87534c , https://vulncheck.com/xdb/16ccb84aebed||https://vulncheck.com/xdb/16ccb84aebed , https://vulncheck.com/xdb/e82dc77437a5||https://vulncheck.com/xdb/e82dc77437a5 , https://vulncheck.com/xdb/56f3efc97d5a||https://vulncheck.com/xdb/56f3efc97d5a , https://vulncheck.com/xdb/8fb56cde4d69||https://vulncheck.com/xdb/8fb56cde4d69 , https://vulncheck.com/xdb/015a1eb7b8c5||https://vulncheck.com/xdb/015a1eb7b8c5 , https://vulncheck.com/xdb/c79b60996775||https://vulncheck.com/xdb/c79b60996775 , https://vulncheck.com/xdb/ea61ab6382c6||https://vulncheck.com/xdb/ea61ab6382c6 , https://vulncheck.com/xdb/59f5833a8dd0||https://vulncheck.com/xdb/59f5833a8dd0 , https://vulncheck.com/xdb/f240e8d471e6||https://vulncheck.com/xdb/f240e8d471e6 , https://vulncheck.com/xdb/93fd98979e35||https://vulncheck.com/xdb/93fd98979e35 , https://vulncheck.com/xdb/bafdcb3d292c||https://vulncheck.com/xdb/bafdcb3d292c , https://vulncheck.com/xdb/98fe8aa360ae||https://vulncheck.com/xdb/98fe8aa360ae , https://vulncheck.com/xdb/6028cfd20f54||https://vulncheck.com/xdb/6028cfd20f54 , https://vulncheck.com/xdb/e7f68889c96b||https://vulncheck.com/xdb/e7f68889c96b , https://vulncheck.com/xdb/29a3cbe431c7||https://vulncheck.com/xdb/29a3cbe431c7 , https://vulncheck.com/xdb/2e81d41ecf10||https://vulncheck.com/xdb/2e81d41ecf10 , https://vulncheck.com/xdb/0450095821bb||https://vulncheck.com/xdb/0450095821bb , https://vulncheck.com/xdb/5f45754388ab||https://vulncheck.com/xdb/5f45754388ab , https://vulncheck.com/xdb/f520f4462657||https://vulncheck.com/xdb/f520f4462657 | |
CVE-2024-28986 | SolarWinds | Web Help Desk | 08/15/2024 | 0.32620 | 9.8 | FALSE | FALSE | FALSE | https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986; https://nvd.nist.gov/vuln/detail/CVE-2024-28986 | ||||
CVE-2024-38107 | Microsoft | Windows | 08/13/2024 | 0.03564 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107; https://nvd.nist.gov/vuln/detail/CVE-2024-38107 | ||||
CVE-2024-38178 | Microsoft | Windows | 08/13/2024 | 0.17040 | 7.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178; https://nvd.nist.gov/vuln/detail/CVE-2024-38178 | ||||
CVE-2024-38213 | Microsoft | Windows | 08/13/2024 | 0.71705 | 6.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213; https://nvd.nist.gov/vuln/detail/CVE-2024-38213 | ||||
CVE-2024-38193 | Microsoft | Windows | 08/13/2024 | 0.73164 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193 | https://vulncheck.com/xdb/fe97c3479e7f||https://vulncheck.com/xdb/fe97c3479e7f , https://vulncheck.com/xdb/083768bfaf83||https://vulncheck.com/xdb/083768bfaf83 | |||
CVE-2024-38106 | Microsoft | Windows | 08/13/2024 | 0.00403 | 7.0 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106; https://nvd.nist.gov/vuln/detail/CVE-2024-38106 | ||||
CVE-2024-38189 | Microsoft | Project | 08/13/2024 | 0.38016 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189; https://nvd.nist.gov/vuln/detail/CVE-2024-38189 | ||||
CVE-2024-36971 | Android | Kernel | 08/07/2024 | 0.00088 | 7.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971 | ||||
CVE-2024-32113 | Apache | OFBiz | 08/07/2024 | 0.93490 | 9.8 | https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-32113-path-traversal-attempt||https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-32113-path-traversal-attempt | 0 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd; https://nvd.nist.gov/vuln/detail/CVE-2024-32113 | https://vulncheck.com/xdb/334230980654||https://vulncheck.com/xdb/334230980654 , https://vulncheck.com/xdb/3a5fd521c416||https://vulncheck.com/xdb/3a5fd521c416 , https://vulncheck.com/xdb/928095ddd898||https://vulncheck.com/xdb/928095ddd898 | |
CVE-2018-0824 | Microsoft | Windows | 08/05/2024 | 0.85450 | 8.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824 | https://vulncheck.com/xdb/a5ebdd77a6af | |||
CVE-2024-37085 | VMware | ESXi | 07/30/2024 | 0.53731 | 6.8 | TRUE | FALSE | FALSE | https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085 | ||||
CVE-2023-45249 | Acronis | Cyber Infrastructure (ACI) | 07/29/2024 | 0.59652 | 9.8 | FALSE | TRUE | FALSE | https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249 | ||||
CVE-2024-4879 | ServiceNow | Utah, Vancouver, and Washington DC Now Platform | 07/29/2024 | 0.94336 | 9.3 | 9.8 | https://viz.greynoise.io/tag/servicenow-template-injection-cve-2024-4879-attempt||https://viz.greynoise.io/tag/servicenow-template-injection-cve-2024-4879-attempt | FALSE | TRUE | FALSE | https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879 | https://vulncheck.com/xdb/76f4c048d613||https://vulncheck.com/xdb/76f4c048d613 , https://vulncheck.com/xdb/242ab81b8f99||https://vulncheck.com/xdb/242ab81b8f99 , https://vulncheck.com/xdb/a79b35b9ebfa||https://vulncheck.com/xdb/a79b35b9ebfa , https://vulncheck.com/xdb/fe3d3d16f09c||https://vulncheck.com/xdb/fe3d3d16f09c , https://vulncheck.com/xdb/468d11a46eb6||https://vulncheck.com/xdb/468d11a46eb6 , https://vulncheck.com/xdb/694933652e15||https://vulncheck.com/xdb/694933652e15 , https://vulncheck.com/xdb/b11c6c3afaf3||https://vulncheck.com/xdb/b11c6c3afaf3 , https://vulncheck.com/xdb/16b3983d129b||https://vulncheck.com/xdb/16b3983d129b , https://vulncheck.com/xdb/bfd7c0b964ed||https://vulncheck.com/xdb/bfd7c0b964ed | |
CVE-2024-5217 | ServiceNow | Utah, Vancouver, and Washington DC Now Platform | 07/29/2024 | 0.94196 | 9.2 | 9.8 | https://viz.greynoise.io/tag/servicenow-input-validation-exploit-cve-2024-5217-attempt||https://viz.greynoise.io/tag/servicenow-input-validation-exploit-cve-2024-5217-attempt | 0 | FALSE | TRUE | FALSE | https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217 | https://vulncheck.com/xdb/31835aad0114 |
CVE-2012-4792 | Microsoft | Internet Explorer | 07/23/2024 | 0.89213 | 8.8 | FALSE | TRUE | FALSE | https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792 | ||||
CVE-2024-39891 | Twilio | Authy | 07/23/2024 | 0.18149 | 5.3 | FALSE | FALSE | FALSE | https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS; https://nvd.nist.gov/vuln/detail/CVE-2024-39891 | ||||
CVE-2024-34102 | Adobe | Commerce and Magento Open Source | 07/17/2024 | 0.94373 | 9.8 | https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-attempt||https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-attempt , https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-check||https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-check , https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-attempt||https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-attempt , https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-check||https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-check | 0 | FALSE | TRUE | FALSE | https://helpx.adobe.com/security/products/magento/apsb24-40.html; https://nvd.nist.gov/vuln/detail/CVE-2024-34102 | https://vulncheck.com/xdb/2eb4d44dc79b||https://vulncheck.com/xdb/2eb4d44dc79b , https://vulncheck.com/xdb/b9a5654f364d||https://vulncheck.com/xdb/b9a5654f364d , https://vulncheck.com/xdb/771b0f9ad8b9||https://vulncheck.com/xdb/771b0f9ad8b9 , https://vulncheck.com/xdb/56d612cb301b||https://vulncheck.com/xdb/56d612cb301b , https://vulncheck.com/xdb/31319adbe12a||https://vulncheck.com/xdb/31319adbe12a , https://vulncheck.com/xdb/e16ac34e34d7||https://vulncheck.com/xdb/e16ac34e34d7 , https://vulncheck.com/xdb/ff651d9ccadf||https://vulncheck.com/xdb/ff651d9ccadf , https://vulncheck.com/xdb/18320f3f459c||https://vulncheck.com/xdb/18320f3f459c , https://vulncheck.com/xdb/e10072b9959a||https://vulncheck.com/xdb/e10072b9959a , https://vulncheck.com/xdb/b740eaf30da0||https://vulncheck.com/xdb/b740eaf30da0 , https://vulncheck.com/xdb/62c07de93469||https://vulncheck.com/xdb/62c07de93469 , https://vulncheck.com/xdb/f7ec53083d00||https://vulncheck.com/xdb/f7ec53083d00 , https://vulncheck.com/xdb/68297a933a3c||https://vulncheck.com/xdb/68297a933a3c | |
CVE-2024-28995 | SolarWinds | Serv-U | 07/17/2024 | 0.94367 | 8.6 | https://viz.greynoise.io/tag/solarwinds-serv-u-cve-2024-28995-path-traversal-attempt||https://viz.greynoise.io/tag/solarwinds-serv-u-cve-2024-28995-path-traversal-attempt | 8 | FALSE | TRUE | FALSE | https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995; https://nvd.nist.gov/vuln/detail/CVE-2024-28995 | https://vulncheck.com/xdb/fbe1b8d46402||https://vulncheck.com/xdb/fbe1b8d46402 , https://vulncheck.com/xdb/7cf3d7653ea8||https://vulncheck.com/xdb/7cf3d7653ea8 , https://vulncheck.com/xdb/674e1185ddc2||https://vulncheck.com/xdb/674e1185ddc2 , https://vulncheck.com/xdb/04919da4277e||https://vulncheck.com/xdb/04919da4277e , https://vulncheck.com/xdb/a331ef4fdde9||https://vulncheck.com/xdb/a331ef4fdde9 , https://vulncheck.com/xdb/99c2ff5b21dd||https://vulncheck.com/xdb/99c2ff5b21dd , https://vulncheck.com/xdb/ed3ef6870d11||https://vulncheck.com/xdb/ed3ef6870d11 , https://vulncheck.com/xdb/e7b7e88149e0||https://vulncheck.com/xdb/e7b7e88149e0 , https://vulncheck.com/xdb/c54c86fb6c5e||https://vulncheck.com/xdb/c54c86fb6c5e , https://vulncheck.com/xdb/476fdc663c01||https://vulncheck.com/xdb/476fdc663c01 | |
CVE-2022-22948 | VMware | vCenter Server | 07/17/2024 | 0.11504 | 6.5 | FALSE | TRUE | FALSE | https://www.vmware.com/security/advisories/VMSA-2022-0009.html; https://nvd.nist.gov/vuln/detail/CVE-2022-22948 | ||||
CVE-2024-36401 | OSGeo | GeoServer | 07/15/2024 | 0.94418 | 9.8 | https://viz.greynoise.io/tag/geoserver-geotools-cve-2024-36401-rce-attempt||https://viz.greynoise.io/tag/geoserver-geotools-cve-2024-36401-rce-attempt | 5 | FALSE | TRUE | FALSE | This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ; https://nvd.nist.gov/vuln/detail/CVE-2024-36401 | https://vulncheck.com/xdb/83b62ab68571||https://vulncheck.com/xdb/83b62ab68571 , https://vulncheck.com/xdb/82eba5264bfb||https://vulncheck.com/xdb/82eba5264bfb , https://vulncheck.com/xdb/8a38414bb4b7||https://vulncheck.com/xdb/8a38414bb4b7 , https://vulncheck.com/xdb/432db9e70d9e||https://vulncheck.com/xdb/432db9e70d9e , https://vulncheck.com/xdb/02f273d018e8||https://vulncheck.com/xdb/02f273d018e8 , https://vulncheck.com/xdb/584a39f9a9cb||https://vulncheck.com/xdb/584a39f9a9cb , https://vulncheck.com/xdb/6cab2db287eb||https://vulncheck.com/xdb/6cab2db287eb , https://vulncheck.com/xdb/07cf7a5d5e1b||https://vulncheck.com/xdb/07cf7a5d5e1b , https://vulncheck.com/xdb/3d8baa68c24c||https://vulncheck.com/xdb/3d8baa68c24c , https://vulncheck.com/xdb/e5537b0b1e67||https://vulncheck.com/xdb/e5537b0b1e67 , https://vulncheck.com/xdb/fe7544c5185c||https://vulncheck.com/xdb/fe7544c5185c , https://vulncheck.com/xdb/6cff7d86193f||https://vulncheck.com/xdb/6cff7d86193f , https://vulncheck.com/xdb/0a69e625f39a||https://vulncheck.com/xdb/0a69e625f39a , https://vulncheck.com/xdb/f4801e6b28d5||https://vulncheck.com/xdb/f4801e6b28d5 , https://vulncheck.com/xdb/b1faacbe8f25||https://vulncheck.com/xdb/b1faacbe8f25 , https://vulncheck.com/xdb/e908c49bab48||https://vulncheck.com/xdb/e908c49bab48 , https://vulncheck.com/xdb/a4b1ddfc8280||https://vulncheck.com/xdb/a4b1ddfc8280 , https://vulncheck.com/xdb/46abf92ec267||https://vulncheck.com/xdb/46abf92ec267 , https://vulncheck.com/xdb/1dbce5a4766b||https://vulncheck.com/xdb/1dbce5a4766b | |
CVE-2024-23692 | Rejetto | HTTP File Server | 07/09/2024 | 0.94285 | 9.8 | https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-attempt||https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-attempt , https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-check||https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-check | 2 | FALSE | TRUE | FALSE | The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692 | https://vulncheck.com/xdb/c6a68c1f041c||https://vulncheck.com/xdb/c6a68c1f041c , https://vulncheck.com/xdb/2a1f7d7aff04||https://vulncheck.com/xdb/2a1f7d7aff04 , https://vulncheck.com/xdb/0a411a2452d2||https://vulncheck.com/xdb/0a411a2452d2 , https://vulncheck.com/xdb/c299ffad376a||https://vulncheck.com/xdb/c299ffad376a , https://vulncheck.com/xdb/92d41c55acaa||https://vulncheck.com/xdb/92d41c55acaa , https://vulncheck.com/xdb/2ec70b75b126||https://vulncheck.com/xdb/2ec70b75b126 , https://vulncheck.com/xdb/46740685e776||https://vulncheck.com/xdb/46740685e776 , https://vulncheck.com/xdb/4ac87aa915cb||https://vulncheck.com/xdb/4ac87aa915cb , https://vulncheck.com/xdb/9cd77e6b6f2e||https://vulncheck.com/xdb/9cd77e6b6f2e , https://vulncheck.com/xdb/c1ccd57299ea||https://vulncheck.com/xdb/c1ccd57299ea , https://vulncheck.com/xdb/6274be6d1fb5||https://vulncheck.com/xdb/6274be6d1fb5 , https://vulncheck.com/xdb/d5b6ecca1a09||https://vulncheck.com/xdb/d5b6ecca1a09 | |
CVE-2024-38080 | Microsoft | Windows | 07/09/2024 | 0.14770 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080 | https://vulncheck.com/xdb/69e7cda43d47 | |||
CVE-2024-38112 | Microsoft | Windows | 07/09/2024 | 0.90957 | 7.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112 | ||||
CVE-2024-20399 | Cisco | NX-OS | 07/02/2024 | 0.00142 | 6.0 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399 | ||||
CVE-2022-24816 | OSGeo | JAI-EXT | 06/26/2024 | 0.94163 | 10.0 | https://viz.greynoise.io/tag/geoserver-rce-attempt||https://viz.greynoise.io/tag/geoserver-rce-attempt | 5 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816 | https://vulncheck.com/xdb/8c423c9c5367 | |
CVE-2022-2586 | Linux | Kernel | 06/26/2024 | 0.01471 | 5.3 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586 | https://vulncheck.com/xdb/174eaee64a01||https://vulncheck.com/xdb/174eaee64a01 , https://vulncheck.com/xdb/6feeb109d166||https://vulncheck.com/xdb/6feeb109d166 , https://vulncheck.com/xdb/371b22b792df||https://vulncheck.com/xdb/371b22b792df | |||
CVE-2020-13965 | Roundcube | Webmail | 06/26/2024 | 0.85831 | 6.1 | FALSE | FALSE | FALSE | https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965 | ||||
CVE-2024-26169 | Microsoft | Windows | 06/13/2024 | 0.30848 | 7.8 | TRUE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169; https://nvd.nist.gov/vuln/detail/CVE-2024-26169 | ||||
CVE-2024-32896 | Android | Pixel | 06/13/2024 | 0.00046 | 7.8 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/pixel/2024-06-01; https://nvd.nist.gov/vuln/detail/CVE-2024-32896 | ||||
CVE-2024-4358 | Progress | Telerik Report Server | 06/13/2024 | 0.94254 | 9.8 | https://viz.greynoise.io/tag/telerik-report-server-cve-2024-4358-auth-bypass-attempt||https://viz.greynoise.io/tag/telerik-report-server-cve-2024-4358-auth-bypass-attempt | 2 | FALSE | TRUE | FALSE | https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358 | https://vulncheck.com/xdb/d93bd725c202||https://vulncheck.com/xdb/d93bd725c202 , https://vulncheck.com/xdb/08a930e2d98e||https://vulncheck.com/xdb/08a930e2d98e , https://vulncheck.com/xdb/5ffe12856f76||https://vulncheck.com/xdb/5ffe12856f76 , https://vulncheck.com/xdb/eaffc0a0430d||https://vulncheck.com/xdb/eaffc0a0430d , https://vulncheck.com/xdb/8cf1f3a0513a||https://vulncheck.com/xdb/8cf1f3a0513a , https://vulncheck.com/xdb/6c74175dbba7||https://vulncheck.com/xdb/6c74175dbba7 | |
CVE-2024-4610 | Arm | Mali GPU Kernel Driver | 06/12/2024 | 0.00086 | 7.8 | FALSE | FALSE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2024-4610 | ||||
CVE-2024-4577 | PHP Group | PHP | 06/12/2024 | 0.94412 | 9.8 | https://viz.greynoise.io/tag/php-cve-2024-4577-rce-attempt||https://viz.greynoise.io/tag/php-cve-2024-4577-rce-attempt | 5 | TRUE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577 | https://vulncheck.com/xdb/d3b12b49d03c||https://vulncheck.com/xdb/d3b12b49d03c , https://vulncheck.com/xdb/7a69cea7f16d||https://vulncheck.com/xdb/7a69cea7f16d , https://vulncheck.com/xdb/b2fa764f2781||https://vulncheck.com/xdb/b2fa764f2781 , https://vulncheck.com/xdb/975f3d4508fd||https://vulncheck.com/xdb/975f3d4508fd , https://vulncheck.com/xdb/c3ffd6462c70||https://vulncheck.com/xdb/c3ffd6462c70 , https://vulncheck.com/xdb/aed5b2a31554||https://vulncheck.com/xdb/aed5b2a31554 , https://vulncheck.com/xdb/218b19f4d22e||https://vulncheck.com/xdb/218b19f4d22e , https://vulncheck.com/xdb/c8c379f83d10||https://vulncheck.com/xdb/c8c379f83d10 , https://vulncheck.com/xdb/64f14f4beecb||https://vulncheck.com/xdb/64f14f4beecb , https://vulncheck.com/xdb/cb830f9d202f||https://vulncheck.com/xdb/cb830f9d202f , https://vulncheck.com/xdb/aa3899b675a4||https://vulncheck.com/xdb/aa3899b675a4 , https://vulncheck.com/xdb/3e8fa83c20c9||https://vulncheck.com/xdb/3e8fa83c20c9 , https://vulncheck.com/xdb/20d85040c310||https://vulncheck.com/xdb/20d85040c310 , https://vulncheck.com/xdb/825b99bdb560||https://vulncheck.com/xdb/825b99bdb560 , https://vulncheck.com/xdb/081170ce66e7||https://vulncheck.com/xdb/081170ce66e7 , https://vulncheck.com/xdb/56c6c80d0bc4||https://vulncheck.com/xdb/56c6c80d0bc4 , https://vulncheck.com/xdb/c4c00e052574||https://vulncheck.com/xdb/c4c00e052574 , https://vulncheck.com/xdb/552c4106ae73||https://vulncheck.com/xdb/552c4106ae73 , https://vulncheck.com/xdb/c8e637167f42||https://vulncheck.com/xdb/c8e637167f42 , https://vulncheck.com/xdb/e294281b4747||https://vulncheck.com/xdb/e294281b4747 , https://vulncheck.com/xdb/64046c52ba42||https://vulncheck.com/xdb/64046c52ba42 , https://vulncheck.com/xdb/7dd0ca311187||https://vulncheck.com/xdb/7dd0ca311187 , https://vulncheck.com/xdb/0b2ec7cacbad||https://vulncheck.com/xdb/0b2ec7cacbad , https://vulncheck.com/xdb/1531cf762de4||https://vulncheck.com/xdb/1531cf762de4 , https://vulncheck.com/xdb/5d63cc33def4||https://vulncheck.com/xdb/5d63cc33def4 , https://vulncheck.com/xdb/024996c990cc||https://vulncheck.com/xdb/024996c990cc , https://vulncheck.com/xdb/cd32f509d4ab||https://vulncheck.com/xdb/cd32f509d4ab , https://vulncheck.com/xdb/4f6effc389cd||https://vulncheck.com/xdb/4f6effc389cd , https://vulncheck.com/xdb/912529ac004f||https://vulncheck.com/xdb/912529ac004f , https://vulncheck.com/xdb/d982c4edc474||https://vulncheck.com/xdb/d982c4edc474 , https://vulncheck.com/xdb/ff0f9bccbf68||https://vulncheck.com/xdb/ff0f9bccbf68 , https://vulncheck.com/xdb/1287f9a713c6||https://vulncheck.com/xdb/1287f9a713c6 , https://vulncheck.com/xdb/0c4b91081cb3||https://vulncheck.com/xdb/0c4b91081cb3 , https://vulncheck.com/xdb/d06e30d57aaf||https://vulncheck.com/xdb/d06e30d57aaf , https://vulncheck.com/xdb/112f55c12274||https://vulncheck.com/xdb/112f55c12274 , https://vulncheck.com/xdb/b2eb4bae1e05||https://vulncheck.com/xdb/b2eb4bae1e05 , https://vulncheck.com/xdb/55023f1ef157||https://vulncheck.com/xdb/55023f1ef157 , https://vulncheck.com/xdb/b914f202bec2||https://vulncheck.com/xdb/b914f202bec2 , https://vulncheck.com/xdb/94a35549d41e||https://vulncheck.com/xdb/94a35549d41e , https://vulncheck.com/xdb/5d24a3878ae0||https://vulncheck.com/xdb/5d24a3878ae0 , https://vulncheck.com/xdb/acfef3dab7ab||https://vulncheck.com/xdb/acfef3dab7ab , https://vulncheck.com/xdb/bd76b0f41ae3||https://vulncheck.com/xdb/bd76b0f41ae3 , https://vulncheck.com/xdb/cc11323372a3||https://vulncheck.com/xdb/cc11323372a3 , https://vulncheck.com/xdb/30f842b7c8c9||https://vulncheck.com/xdb/30f842b7c8c9 , https://vulncheck.com/xdb/bd5de034d60f||https://vulncheck.com/xdb/bd5de034d60f , https://vulncheck.com/xdb/24731ac505a6||https://vulncheck.com/xdb/24731ac505a6 , https://vulncheck.com/xdb/ed23c8ab0f6a||https://vulncheck.com/xdb/ed23c8ab0f6a , https://vulncheck.com/xdb/7ee6ed2bc73f||https://vulncheck.com/xdb/7ee6ed2bc73f , https://vulncheck.com/xdb/5a6770491004||https://vulncheck.com/xdb/5a6770491004 , https://vulncheck.com/xdb/48d0c04eff37||https://vulncheck.com/xdb/48d0c04eff37 , https://vulncheck.com/xdb/fb1b068d71fb||https://vulncheck.com/xdb/fb1b068d71fb , https://vulncheck.com/xdb/d89b163c7ba9||https://vulncheck.com/xdb/d89b163c7ba9 , https://vulncheck.com/xdb/615662ae6add||https://vulncheck.com/xdb/615662ae6add | |
CVE-2017-3506 | Oracle | WebLogic Server | 06/03/2024 | 0.94409 | 7.4 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-3506-os-injection-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-3506-os-injection-attempt | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506 | https://vulncheck.com/xdb/7f8c560d1204 | ||
CVE-2024-1086 | Linux | Kernel | 05/30/2024 | 0.85083 | 7.8 | TRUE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086 | https://vulncheck.com/xdb/811b53a4b2e6||https://vulncheck.com/xdb/811b53a4b2e6 , https://vulncheck.com/xdb/0235a1b65409||https://vulncheck.com/xdb/0235a1b65409 , https://vulncheck.com/xdb/45b843d101d4||https://vulncheck.com/xdb/45b843d101d4 | |||
CVE-2024-24919 | Check Point | Quantum Security Gateways | 05/30/2024 | 0.94327 | 8.6 | https://viz.greynoise.io/tag/check-point-quantum-gateway-cve-2024-24919-information-dislosure-attempt||https://viz.greynoise.io/tag/check-point-quantum-gateway-cve-2024-24919-information-dislosure-attempt | 5 | TRUE | TRUE | FALSE | https://support.checkpoint.com/results/sk/sk182336 ; https://nvd.nist.gov/vuln/detail/CVE-2024-24919 | https://vulncheck.com/xdb/e82839fb2a3e||https://vulncheck.com/xdb/e82839fb2a3e , https://vulncheck.com/xdb/f36c4553046b||https://vulncheck.com/xdb/f36c4553046b , https://vulncheck.com/xdb/ab8c1e3e3646||https://vulncheck.com/xdb/ab8c1e3e3646 , https://vulncheck.com/xdb/1913565768f5||https://vulncheck.com/xdb/1913565768f5 , https://vulncheck.com/xdb/6243e133d9ea||https://vulncheck.com/xdb/6243e133d9ea , https://vulncheck.com/xdb/de9876a305c5||https://vulncheck.com/xdb/de9876a305c5 , https://vulncheck.com/xdb/0c9c869a08d3||https://vulncheck.com/xdb/0c9c869a08d3 , https://vulncheck.com/xdb/6b522b401a39||https://vulncheck.com/xdb/6b522b401a39 , https://vulncheck.com/xdb/9e2e6fb95473||https://vulncheck.com/xdb/9e2e6fb95473 , https://vulncheck.com/xdb/30fab5d1e270||https://vulncheck.com/xdb/30fab5d1e270 , https://vulncheck.com/xdb/6c1e9ba4333a||https://vulncheck.com/xdb/6c1e9ba4333a , https://vulncheck.com/xdb/d71f8b001a77||https://vulncheck.com/xdb/d71f8b001a77 , https://vulncheck.com/xdb/68cc499283d4||https://vulncheck.com/xdb/68cc499283d4 , https://vulncheck.com/xdb/73a9276dba9f||https://vulncheck.com/xdb/73a9276dba9f , https://vulncheck.com/xdb/f6944d96f1ec||https://vulncheck.com/xdb/f6944d96f1ec , https://vulncheck.com/xdb/092dd3ba67bd||https://vulncheck.com/xdb/092dd3ba67bd , https://vulncheck.com/xdb/b4d18c6bf06e||https://vulncheck.com/xdb/b4d18c6bf06e , https://vulncheck.com/xdb/91991bb01e09||https://vulncheck.com/xdb/91991bb01e09 , https://vulncheck.com/xdb/a3a8703af707||https://vulncheck.com/xdb/a3a8703af707 , https://vulncheck.com/xdb/41aac64174f4||https://vulncheck.com/xdb/41aac64174f4 , https://vulncheck.com/xdb/a1c0ae86d246||https://vulncheck.com/xdb/a1c0ae86d246 , https://vulncheck.com/xdb/f22cf8e4cd18||https://vulncheck.com/xdb/f22cf8e4cd18 , https://vulncheck.com/xdb/0a8cb6d49711||https://vulncheck.com/xdb/0a8cb6d49711 , https://vulncheck.com/xdb/de808000c9d3||https://vulncheck.com/xdb/de808000c9d3 , https://vulncheck.com/xdb/9d791cc169bf||https://vulncheck.com/xdb/9d791cc169bf , https://vulncheck.com/xdb/6334b1c021a5||https://vulncheck.com/xdb/6334b1c021a5 , https://vulncheck.com/xdb/51cb208786d3||https://vulncheck.com/xdb/51cb208786d3 , https://vulncheck.com/xdb/a709114311f6||https://vulncheck.com/xdb/a709114311f6 , https://vulncheck.com/xdb/b21251c38b61||https://vulncheck.com/xdb/b21251c38b61 , https://vulncheck.com/xdb/73f0d5b75fbd||https://vulncheck.com/xdb/73f0d5b75fbd , https://vulncheck.com/xdb/4cae1121ac6d||https://vulncheck.com/xdb/4cae1121ac6d , https://vulncheck.com/xdb/47b5fb744bf8||https://vulncheck.com/xdb/47b5fb744bf8 , https://vulncheck.com/xdb/9a3fb12624b4||https://vulncheck.com/xdb/9a3fb12624b4 , https://vulncheck.com/xdb/445c6eae61dd||https://vulncheck.com/xdb/445c6eae61dd , https://vulncheck.com/xdb/4a6e5f342e96||https://vulncheck.com/xdb/4a6e5f342e96 , https://vulncheck.com/xdb/6f9dd13e5f7e||https://vulncheck.com/xdb/6f9dd13e5f7e , https://vulncheck.com/xdb/35b00d2a87cc||https://vulncheck.com/xdb/35b00d2a87cc , https://vulncheck.com/xdb/f776bcf16de3||https://vulncheck.com/xdb/f776bcf16de3 , https://vulncheck.com/xdb/cb400c008cb4||https://vulncheck.com/xdb/cb400c008cb4 , https://vulncheck.com/xdb/307191685e1f||https://vulncheck.com/xdb/307191685e1f , https://vulncheck.com/xdb/c4b3fdf4a5a0||https://vulncheck.com/xdb/c4b3fdf4a5a0 , https://vulncheck.com/xdb/6d752fbb937c||https://vulncheck.com/xdb/6d752fbb937c , https://vulncheck.com/xdb/2df82d697c50||https://vulncheck.com/xdb/2df82d697c50 , https://vulncheck.com/xdb/8ee8515985ca||https://vulncheck.com/xdb/8ee8515985ca , https://vulncheck.com/xdb/50e7b76bdc9f||https://vulncheck.com/xdb/50e7b76bdc9f , https://vulncheck.com/xdb/c74ebcca3b51||https://vulncheck.com/xdb/c74ebcca3b51 , https://vulncheck.com/xdb/8efe86b85385||https://vulncheck.com/xdb/8efe86b85385 , https://vulncheck.com/xdb/70994ec0c5d3||https://vulncheck.com/xdb/70994ec0c5d3 , https://vulncheck.com/xdb/4b560c5574a3||https://vulncheck.com/xdb/4b560c5574a3 , https://vulncheck.com/xdb/f4c58c27ce8d||https://vulncheck.com/xdb/f4c58c27ce8d , https://vulncheck.com/xdb/ac33617aef51||https://vulncheck.com/xdb/ac33617aef51 , https://vulncheck.com/xdb/1b7c709c6360||https://vulncheck.com/xdb/1b7c709c6360 , https://vulncheck.com/xdb/28effee549e0||https://vulncheck.com/xdb/28effee549e0 , https://vulncheck.com/xdb/3e1daa797bf9||https://vulncheck.com/xdb/3e1daa797bf9 | |
CVE-2024-4978 | Justice AV Solutions | Viewer | 05/29/2024 | 0.24245 | 8.7 | 8.4 | FALSE | FALSE | FALSE | Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads; https://nvd.nist.gov/vuln/detail/CVE-2024-4978 | |||
CVE-2024-5274 | Chromium V8 | 05/28/2024 | 0.03360 | 9.6 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-5274 | https://vulncheck.com/xdb/e42c2ff2de33 | ||||
CVE-2020-17519 | Apache | Flink | 05/23/2024 | 0.94413 | 7.5 | https://viz.greynoise.io/tag/apache-flink-path-traversal-attempt||https://viz.greynoise.io/tag/apache-flink-path-traversal-attempt | 2 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d; https://nvd.nist.gov/vuln/detail/CVE-2020-17519 | https://vulncheck.com/xdb/1b1d6d820b0c||https://vulncheck.com/xdb/1b1d6d820b0c , https://vulncheck.com/xdb/02f7b73ab684||https://vulncheck.com/xdb/02f7b73ab684 , https://vulncheck.com/xdb/1620553c643a||https://vulncheck.com/xdb/1620553c643a , https://vulncheck.com/xdb/5060de9f4f15||https://vulncheck.com/xdb/5060de9f4f15 , https://vulncheck.com/xdb/259c72303ba8||https://vulncheck.com/xdb/259c72303ba8 , https://vulncheck.com/xdb/a0b10abc1d63||https://vulncheck.com/xdb/a0b10abc1d63 , https://vulncheck.com/xdb/7c9fe2b962fd||https://vulncheck.com/xdb/7c9fe2b962fd , https://vulncheck.com/xdb/7fe03bf0f0a6||https://vulncheck.com/xdb/7fe03bf0f0a6 , https://vulncheck.com/xdb/c096ce6f775b||https://vulncheck.com/xdb/c096ce6f775b , https://vulncheck.com/xdb/50a45f679975||https://vulncheck.com/xdb/50a45f679975 , https://vulncheck.com/xdb/9be1f64fbcd2||https://vulncheck.com/xdb/9be1f64fbcd2 | |
CVE-2024-4947 | Chromium V8 | 05/20/2024 | 0.00354 | 9.6 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4947 | |||||
CVE-2023-43208 | NextGen Healthcare | Mirth Connect | 05/20/2024 | 0.94413 | 9.8 | https://viz.greynoise.io/tag/nextgen-mirth-connect-cve-2023-43208-rce-attempt||https://viz.greynoise.io/tag/nextgen-mirth-connect-cve-2023-43208-rce-attempt | 3 | TRUE | TRUE | TRUE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New ; https://nvd.nist.gov/vuln/detail/CVE-2023-43208 | https://vulncheck.com/xdb/467a9c5dfc03||https://vulncheck.com/xdb/467a9c5dfc03 , https://vulncheck.com/xdb/5d0f4efbe9bb||https://vulncheck.com/xdb/5d0f4efbe9bb , https://vulncheck.com/xdb/ee5e1ec1b051||https://vulncheck.com/xdb/ee5e1ec1b051 | |
CVE-2021-40655 | D-Link | DIR-605 Router | 05/16/2024 | 0.93554 | 7.5 | https://viz.greynoise.io/tag/d-link-dir-605-information-disclosure-attempt||https://viz.greynoise.io/tag/d-link-dir-605-information-disclosure-attempt | FALSE | FALSE | FALSE | https://legacy.us.dlink.com/pages/product.aspx?id=2b09e95d90ff4cb38830ecc04c89cee5; https://nvd.nist.gov/vuln/detail/CVE-2021-40655 | |||
CVE-2024-4761 | Chromium V8 | 05/16/2024 | 0.03505 | 8.8 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4761 | |||||
CVE-2014-100005 | D-Link | DIR-600 Router | 05/16/2024 | 0.39245 | 8.8 | FALSE | TRUE | FALSE | https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005 | ||||
CVE-2024-30051 | Microsoft | DWM Core Library | 05/14/2024 | 0.48997 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051; https://nvd.nist.gov/vuln/detail/CVE-2024-30051 | https://vulncheck.com/xdb/c536913486a8 | |||
CVE-2024-30040 | Microsoft | Windows | 05/14/2024 | 0.27660 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040; https://nvd.nist.gov/vuln/detail/CVE-2024-30040 | ||||
CVE-2024-4671 | Chromium | 05/13/2024 | 0.00275 | 9.6 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-4671 | |||||
CVE-2023-7028 | GitLab | GitLab CE/EE | 05/01/2024 | 0.94004 | 10.0 | https://viz.greynoise.io/tag/gitlab-account-takeover-attempt||https://viz.greynoise.io/tag/gitlab-account-takeover-attempt | FALSE | TRUE | FALSE | https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-7028 | https://vulncheck.com/xdb/e0d36e3116c6||https://vulncheck.com/xdb/e0d36e3116c6 , https://vulncheck.com/xdb/da63a9b40012||https://vulncheck.com/xdb/da63a9b40012 , https://vulncheck.com/xdb/877497541569||https://vulncheck.com/xdb/877497541569 , https://vulncheck.com/xdb/87e14763757c||https://vulncheck.com/xdb/87e14763757c , https://vulncheck.com/xdb/0f7be935ff85||https://vulncheck.com/xdb/0f7be935ff85 , https://vulncheck.com/xdb/516e0f5addf3||https://vulncheck.com/xdb/516e0f5addf3 , https://vulncheck.com/xdb/674d0aabf7ce||https://vulncheck.com/xdb/674d0aabf7ce , https://vulncheck.com/xdb/29c90b604ec4||https://vulncheck.com/xdb/29c90b604ec4 , https://vulncheck.com/xdb/3a9685d9145c||https://vulncheck.com/xdb/3a9685d9145c , https://vulncheck.com/xdb/d0511db0dc7a||https://vulncheck.com/xdb/d0511db0dc7a , https://vulncheck.com/xdb/3703b3de223c||https://vulncheck.com/xdb/3703b3de223c , https://vulncheck.com/xdb/acdabc43c05f||https://vulncheck.com/xdb/acdabc43c05f , https://vulncheck.com/xdb/d5208cb503c5||https://vulncheck.com/xdb/d5208cb503c5 | ||
CVE-2024-29988 | Microsoft | SmartScreen Prompt | 04/30/2024 | 0.64766 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988; https://nvd.nist.gov/vuln/detail/CVE-2024-29988 | ||||
CVE-2024-20353 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 04/24/2024 | 0.11235 | 8.6 | TRUE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2; https://nvd.nist.gov/vuln/detail/CVE-2024-20353 | ||||
CVE-2024-4040 | CrushFTP | CrushFTP | 04/24/2024 | 0.94430 | 9.8 | https://viz.greynoise.io/tag/crushftp-vfs-sandbox-arbitrary-file-read-via-ssti-cve-2024-4040-attempt||https://viz.greynoise.io/tag/crushftp-vfs-sandbox-arbitrary-file-read-via-ssti-cve-2024-4040-attempt | 0 | TRUE | TRUE | FALSE | https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34; https://nvd.nist.gov/vuln/detail/CVE-2024-4040 | https://vulncheck.com/xdb/d683df1ebca9||https://vulncheck.com/xdb/d683df1ebca9 , https://vulncheck.com/xdb/eeeb1a30c8c2||https://vulncheck.com/xdb/eeeb1a30c8c2 , https://vulncheck.com/xdb/2655831cd2ed||https://vulncheck.com/xdb/2655831cd2ed , https://vulncheck.com/xdb/b40b6bf3d5a6||https://vulncheck.com/xdb/b40b6bf3d5a6 , https://vulncheck.com/xdb/458c6db39e2e||https://vulncheck.com/xdb/458c6db39e2e , https://vulncheck.com/xdb/1a53f981a558||https://vulncheck.com/xdb/1a53f981a558 , https://vulncheck.com/xdb/6e43a515753d||https://vulncheck.com/xdb/6e43a515753d , https://vulncheck.com/xdb/896af97e3f84||https://vulncheck.com/xdb/896af97e3f84 , https://vulncheck.com/xdb/c046e180c9e7||https://vulncheck.com/xdb/c046e180c9e7 , https://vulncheck.com/xdb/49d5d24a6094||https://vulncheck.com/xdb/49d5d24a6094 , https://vulncheck.com/xdb/40ea0e9b601d||https://vulncheck.com/xdb/40ea0e9b601d , https://vulncheck.com/xdb/e71d60507f5d||https://vulncheck.com/xdb/e71d60507f5d , https://vulncheck.com/xdb/247af1523302||https://vulncheck.com/xdb/247af1523302 , https://vulncheck.com/xdb/c76b89de33ef||https://vulncheck.com/xdb/c76b89de33ef | |
CVE-2024-20359 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 04/24/2024 | 0.00108 | 6.0 | TRUE | TRUE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h; https://nvd.nist.gov/vuln/detail/CVE-2024-20359 | ||||
CVE-2022-38028 | Microsoft | Windows | 04/23/2024 | 0.02883 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028; https://nvd.nist.gov/vuln/detail/CVE-2022-38028 | ||||
CVE-2024-3400 | Palo Alto Networks | PAN-OS | 04/12/2024 | 0.94323 | 10.0 | https://viz.greynoise.io/tag/palo-alto-pan-os-cve-2024-3400-rce-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-cve-2024-3400-rce-attempt | 0 | TRUE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2024-3400 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3400 | https://vulncheck.com/xdb/23c21d7a298f||https://vulncheck.com/xdb/23c21d7a298f , https://vulncheck.com/xdb/111ca00bbc19||https://vulncheck.com/xdb/111ca00bbc19 , https://vulncheck.com/xdb/ab7770d7db97||https://vulncheck.com/xdb/ab7770d7db97 , https://vulncheck.com/xdb/470b7dd7f349||https://vulncheck.com/xdb/470b7dd7f349 , https://vulncheck.com/xdb/771fff643c41||https://vulncheck.com/xdb/771fff643c41 , https://vulncheck.com/xdb/225a2064265d||https://vulncheck.com/xdb/225a2064265d , https://vulncheck.com/xdb/e8365a6f1e95||https://vulncheck.com/xdb/e8365a6f1e95 , https://vulncheck.com/xdb/b50f530b723f||https://vulncheck.com/xdb/b50f530b723f , https://vulncheck.com/xdb/d20ea188fb61||https://vulncheck.com/xdb/d20ea188fb61 , https://vulncheck.com/xdb/479d7527000f||https://vulncheck.com/xdb/479d7527000f , https://vulncheck.com/xdb/3d0eb812cb1f||https://vulncheck.com/xdb/3d0eb812cb1f , https://vulncheck.com/xdb/367874624944||https://vulncheck.com/xdb/367874624944 , https://vulncheck.com/xdb/2da1379943ca||https://vulncheck.com/xdb/2da1379943ca , https://vulncheck.com/xdb/5031bc9d21b6||https://vulncheck.com/xdb/5031bc9d21b6 , https://vulncheck.com/xdb/c8807722d985||https://vulncheck.com/xdb/c8807722d985 , https://vulncheck.com/xdb/2b38a2dd894c||https://vulncheck.com/xdb/2b38a2dd894c , https://vulncheck.com/xdb/111e25b96a3d||https://vulncheck.com/xdb/111e25b96a3d , https://vulncheck.com/xdb/72d187d1fad6||https://vulncheck.com/xdb/72d187d1fad6 | |
CVE-2024-3273 | D-Link | Multiple NAS Devices | 04/11/2024 | 0.94405 | 7.3 | https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt||https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt | 0 | FALSE | TRUE | FALSE | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3273 | https://vulncheck.com/xdb/30450b0eb331||https://vulncheck.com/xdb/30450b0eb331 , https://vulncheck.com/xdb/d693db35730c||https://vulncheck.com/xdb/d693db35730c , https://vulncheck.com/xdb/57d4fad19689||https://vulncheck.com/xdb/57d4fad19689 , https://vulncheck.com/xdb/1664daa62f60||https://vulncheck.com/xdb/1664daa62f60 , https://vulncheck.com/xdb/09dd98af8d08||https://vulncheck.com/xdb/09dd98af8d08 , https://vulncheck.com/xdb/54167707d84f||https://vulncheck.com/xdb/54167707d84f | |
CVE-2024-3272 | D-Link | Multiple NAS Devices | 04/11/2024 | 0.94192 | 9.8 | https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt||https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt | FALSE | TRUE | FALSE | https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272 | |||
CVE-2024-29745 | Android | Pixel | 04/04/2024 | 0.00062 | 5.5 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/pixel/2024-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29745 | ||||
CVE-2024-29748 | Android | Pixel | 04/04/2024 | 0.00213 | 7.8 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/pixel/2024-04-01; https://nvd.nist.gov/vuln/detail/CVE-2024-29748 | ||||
CVE-2023-24955 | Microsoft | SharePoint Server | 03/26/2024 | 0.92105 | 7.2 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955; https://nvd.nist.gov/vuln/detail/CVE-2023-24955 | https://vulncheck.com/xdb/2ed6898e22a5 | |||
CVE-2023-48788 | Fortinet | FortiClient EMS | 03/25/2024 | 0.94206 | 9.8 | https://viz.greynoise.io/tag/fortinet-forticlientems-cve-2023-48788-sql-injection-attempt||https://viz.greynoise.io/tag/fortinet-forticlientems-cve-2023-48788-sql-injection-attempt | TRUE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788 | https://vulncheck.com/xdb/25da8eff794a | ||
CVE-2019-7256 | Nice | Linear eMerge E3-Series | 03/25/2024 | 0.94406 | 9.8 | https://viz.greynoise.io/tag/linear-emerge-rce-attempt||https://viz.greynoise.io/tag/linear-emerge-rce-attempt | 3 | FALSE | TRUE | TRUE | https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256 | ||
CVE-2021-44529 | Ivanti | Endpoint Manager Cloud Service Appliance (EPM CSA) | 03/25/2024 | 0.94461 | 9.8 | https://viz.greynoise.io/tag/ivanti-endpoint-manager-rce-attempt||https://viz.greynoise.io/tag/ivanti-endpoint-manager-rce-attempt | TRUE | TRUE | FALSE | https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-44529 | https://vulncheck.com/xdb/ea1caea141cd||https://vulncheck.com/xdb/ea1caea141cd , https://vulncheck.com/xdb/e987b78c740c||https://vulncheck.com/xdb/e987b78c740c | ||
CVE-2024-27198 | JetBrains | TeamCity | 03/07/2024 | 0.94574 | 9.8 | https://viz.greynoise.io/tag/teamcity-jetbrain-cve-2024-27198-auth-bypass-attempt||https://viz.greynoise.io/tag/teamcity-jetbrain-cve-2024-27198-auth-bypass-attempt | 3 | TRUE | TRUE | FALSE | https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html; https://nvd.nist.gov/vuln/detail/CVE-2024-27198 | https://vulncheck.com/xdb/91171d800798||https://vulncheck.com/xdb/91171d800798 , https://vulncheck.com/xdb/1e759db5ae8a||https://vulncheck.com/xdb/1e759db5ae8a , https://vulncheck.com/xdb/744a0a915460||https://vulncheck.com/xdb/744a0a915460 , https://vulncheck.com/xdb/e69e68a2fbe1||https://vulncheck.com/xdb/e69e68a2fbe1 , https://vulncheck.com/xdb/3b8d28478979||https://vulncheck.com/xdb/3b8d28478979 , https://vulncheck.com/xdb/7b68c23841e0||https://vulncheck.com/xdb/7b68c23841e0 , https://vulncheck.com/xdb/95e2b317e207||https://vulncheck.com/xdb/95e2b317e207 , https://vulncheck.com/xdb/d69cac04e38e||https://vulncheck.com/xdb/d69cac04e38e , https://vulncheck.com/xdb/0ec24e1c31a8||https://vulncheck.com/xdb/0ec24e1c31a8 , https://vulncheck.com/xdb/f23a170dec11||https://vulncheck.com/xdb/f23a170dec11 , https://vulncheck.com/xdb/fc7ed36dfb86||https://vulncheck.com/xdb/fc7ed36dfb86 , https://vulncheck.com/xdb/3690cad185a4||https://vulncheck.com/xdb/3690cad185a4 | |
CVE-2024-23296 | Apple | Multiple Products | 03/06/2024 | 0.00085 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296 | ||||
CVE-2024-23225 | Apple | Multiple Products | 03/06/2024 | 0.00037 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214083, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214085, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214087, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23225 | ||||
CVE-2023-21237 | Android | Pixel | 03/05/2024 | 0.02496 | 5.5 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/pixel/2023-06-01; https://nvd.nist.gov/vuln/detail/CVE-2023-21237 | ||||
CVE-2021-36380 | Sunhillo | SureLine | 03/05/2024 | 0.94272 | 9.8 | https://viz.greynoise.io/tag/sunhillo-sureline-rce-attempt||https://viz.greynoise.io/tag/sunhillo-sureline-rce-attempt | 2 | FALSE | FALSE | FALSE | https://www.sunhillo.com/fb011/; https://nvd.nist.gov/vuln/detail/CVE-2021-36380 | ||
CVE-2024-21338 | Microsoft | Windows | 03/04/2024 | 0.80512 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338; https://nvd.nist.gov/vuln/detail/CVE-2024-21338 | https://vulncheck.com/xdb/bc7aefbec152||https://vulncheck.com/xdb/bc7aefbec152 , https://vulncheck.com/xdb/fb89266892c0||https://vulncheck.com/xdb/fb89266892c0 , https://vulncheck.com/xdb/0319939c028f||https://vulncheck.com/xdb/0319939c028f , https://vulncheck.com/xdb/0c0b9d5ca67d||https://vulncheck.com/xdb/0c0b9d5ca67d , https://vulncheck.com/xdb/b1beae9b4cef||https://vulncheck.com/xdb/b1beae9b4cef , https://vulncheck.com/xdb/d4686f78dfae||https://vulncheck.com/xdb/d4686f78dfae | |||
CVE-2023-29360 | Microsoft | Streaming Service | 02/29/2024 | 0.15004 | 8.4 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360 ;https://nvd.nist.gov/vuln/detail/CVE-2023-29360 | https://vulncheck.com/xdb/f4d98c781e76||https://vulncheck.com/xdb/f4d98c781e76 , https://vulncheck.com/xdb/4ff3cf601881||https://vulncheck.com/xdb/4ff3cf601881 | |||
CVE-2024-1709 | ConnectWise | ScreenConnect | 02/22/2024 | 0.94364 | 10.0 | https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-check||https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-check , https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-rce-attempt||https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-rce-attempt | 1 | TRUE | TRUE | FALSE | https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8; https://nvd.nist.gov/vuln/detail/CVE-2024-1709 | https://vulncheck.com/xdb/8f3e61327af3||https://vulncheck.com/xdb/8f3e61327af3 , https://vulncheck.com/xdb/2ac2c299e696||https://vulncheck.com/xdb/2ac2c299e696 , https://vulncheck.com/xdb/9e69f54b1bd0||https://vulncheck.com/xdb/9e69f54b1bd0 , https://vulncheck.com/xdb/8c4a64b38e63||https://vulncheck.com/xdb/8c4a64b38e63 , https://vulncheck.com/xdb/091c2acde216||https://vulncheck.com/xdb/091c2acde216 , https://vulncheck.com/xdb/bdf9efcfdbbe||https://vulncheck.com/xdb/bdf9efcfdbbe | |
CVE-2024-21410 | Microsoft | Exchange Server | 02/15/2024 | 0.01679 | 9.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410; https://nvd.nist.gov/vuln/detail/CVE-2024-21410 | ||||
CVE-2020-3259 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 02/15/2024 | 0.54329 | 7.5 | https://viz.greynoise.io/tag/cisco-asa-cve-2020-3259-information-disclosure-attempt||https://viz.greynoise.io/tag/cisco-asa-cve-2020-3259-information-disclosure-attempt | TRUE | FALSE | FALSE | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB; https://nvd.nist.gov/vuln/detail/CVE-2020-3259 | |||
CVE-2024-21351 | Microsoft | Windows | 02/13/2024 | 0.06174 | 7.6 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21351; https://nvd.nist.gov/vuln/detail/CVE-2024-21351 | ||||
CVE-2024-21412 | Microsoft | Windows | 02/13/2024 | 0.93777 | 8.1 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21412; https://nvd.nist.gov/vuln/detail/CVE-2024-21412 | https://vulncheck.com/xdb/758dee144289 | |||
CVE-2023-43770 | Roundcube | Webmail | 02/12/2024 | 0.75170 | 6.1 | FALSE | TRUE | FALSE | https://roundcube.net/news/2023/09/15/security-update-1.6.3-released ; https://nvd.nist.gov/vuln/detail/CVE-2023-43770 | https://vulncheck.com/xdb/49221e884214||https://vulncheck.com/xdb/49221e884214 , https://vulncheck.com/xdb/2e15ee69f350||https://vulncheck.com/xdb/2e15ee69f350 | |||
CVE-2024-21762 | Fortinet | FortiOS | 02/09/2024 | 0.91602 | 9.8 | https://viz.greynoise.io/tag/fortinet-fortios-fortiproxy-rce-cve-2024-21762-attempt||https://viz.greynoise.io/tag/fortinet-fortios-fortiproxy-rce-cve-2024-21762-attempt | 0 | TRUE | TRUE | FALSE | https://fortiguard.fortinet.com/psirt/FG-IR-24-015 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21762 | https://vulncheck.com/xdb/08ff8437a686||https://vulncheck.com/xdb/08ff8437a686 , https://vulncheck.com/xdb/62e1097a2db0||https://vulncheck.com/xdb/62e1097a2db0 , https://vulncheck.com/xdb/9c47a528c340||https://vulncheck.com/xdb/9c47a528c340 , https://vulncheck.com/xdb/1b6a203d05a8||https://vulncheck.com/xdb/1b6a203d05a8 , https://vulncheck.com/xdb/52aa01d2b528||https://vulncheck.com/xdb/52aa01d2b528 , https://vulncheck.com/xdb/ec72e0945311||https://vulncheck.com/xdb/ec72e0945311 , https://vulncheck.com/xdb/edb57d28f065||https://vulncheck.com/xdb/edb57d28f065 , https://vulncheck.com/xdb/cba7fa07e293||https://vulncheck.com/xdb/cba7fa07e293 | |
CVE-2023-4762 | Chromium V8 | 02/06/2024 | 0.11497 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-4762 | https://vulncheck.com/xdb/0e6fa0e1e54a | ||||
CVE-2024-21893 | Ivanti | Connect Secure, Policy Secure, and Neurons | 01/31/2024 | 0.94320 | 8.2 | https://viz.greynoise.io/tag/ivanti-connect-secure-ssrf-cve-2024-21893-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-ssrf-cve-2024-21893-attempt | 1 | TRUE | TRUE | FALSE | https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2024-21893 | https://vulncheck.com/xdb/54ee9161753c||https://vulncheck.com/xdb/54ee9161753c , https://vulncheck.com/xdb/6b04ca9b3dac||https://vulncheck.com/xdb/6b04ca9b3dac | |
CVE-2022-48618 | Apple | Multiple Products | 01/31/2024 | 0.00180 | 7.0 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213530, https://support.apple.com/en-us/HT213532, https://support.apple.com/en-us/HT213535, https://support.apple.com/en-us/HT213536; https://nvd.nist.gov/vuln/detail/CVE-2022-48618 | ||||
CVE-2023-22527 | Atlassian | Confluence Data Center and Server | 01/24/2024 | 0.94363 | 10.0 | https://viz.greynoise.io/tag/atlassian-confluence-template-injection-rce-attempt-cve-2023-22527||https://viz.greynoise.io/tag/atlassian-confluence-template-injection-rce-attempt-cve-2023-22527 | 22 | TRUE | TRUE | FALSE | https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22527 | https://vulncheck.com/xdb/b86f8af644dc||https://vulncheck.com/xdb/b86f8af644dc , https://vulncheck.com/xdb/66eb62ffb562||https://vulncheck.com/xdb/66eb62ffb562 , https://vulncheck.com/xdb/2054e543b959||https://vulncheck.com/xdb/2054e543b959 , https://vulncheck.com/xdb/95ac0d7b87c9||https://vulncheck.com/xdb/95ac0d7b87c9 , https://vulncheck.com/xdb/2868521052d3||https://vulncheck.com/xdb/2868521052d3 , https://vulncheck.com/xdb/4875746a557f||https://vulncheck.com/xdb/4875746a557f , https://vulncheck.com/xdb/eddca0c3b6bf||https://vulncheck.com/xdb/eddca0c3b6bf , https://vulncheck.com/xdb/d6ff5abefc7e||https://vulncheck.com/xdb/d6ff5abefc7e , https://vulncheck.com/xdb/4530fd2e7aec||https://vulncheck.com/xdb/4530fd2e7aec , https://vulncheck.com/xdb/30047c15e01d||https://vulncheck.com/xdb/30047c15e01d , https://vulncheck.com/xdb/121a6655f702||https://vulncheck.com/xdb/121a6655f702 , https://vulncheck.com/xdb/6165cec850cd||https://vulncheck.com/xdb/6165cec850cd , https://vulncheck.com/xdb/528b0751eadd||https://vulncheck.com/xdb/528b0751eadd , https://vulncheck.com/xdb/a3677d9bae7f||https://vulncheck.com/xdb/a3677d9bae7f , https://vulncheck.com/xdb/f3c6ccae29ce||https://vulncheck.com/xdb/f3c6ccae29ce , https://vulncheck.com/xdb/0d89d6d2a198||https://vulncheck.com/xdb/0d89d6d2a198 , https://vulncheck.com/xdb/b6e41e9efa89||https://vulncheck.com/xdb/b6e41e9efa89 , https://vulncheck.com/xdb/7f5b35a2c887||https://vulncheck.com/xdb/7f5b35a2c887 , https://vulncheck.com/xdb/30d9851d825e||https://vulncheck.com/xdb/30d9851d825e , https://vulncheck.com/xdb/80a004854d64||https://vulncheck.com/xdb/80a004854d64 , https://vulncheck.com/xdb/e16ed61a4005||https://vulncheck.com/xdb/e16ed61a4005 | |
CVE-2024-23222 | Apple | Multiple Products | 01/23/2024 | 0.00197 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23222 | ||||
CVE-2023-34048 | VMware | vCenter Server | 01/22/2024 | 0.91917 | 9.8 | FALSE | FALSE | FALSE | https://www.vmware.com/security/advisories/VMSA-2023-0023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-34048 | ||||
CVE-2023-35082 | Ivanti | Endpoint Manager Mobile (EPMM) and MobileIron Core | 01/18/2024 | 0.94468 | 10.0 | https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt||https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt | 4 | TRUE | TRUE | FALSE | https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older; https://nvd.nist.gov/vuln/detail/CVE-2023-35082 | https://vulncheck.com/xdb/396a3c81afe8 | |
CVE-2024-0519 | Chromium V8 | 01/17/2024 | 0.00211 | 8.8 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2024-0519 | |||||
CVE-2023-6549 | Citrix | NetScaler ADC and NetScaler Gateway | 01/17/2024 | 0.14677 | 8.2 | https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt | FALSE | FALSE | FALSE | https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6549 | |||
CVE-2023-6548 | Citrix | NetScaler ADC and NetScaler Gateway | 01/17/2024 | 0.23433 | 5.5 | https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt | FALSE | FALSE | FALSE | https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6548 | |||
CVE-2018-15133 | Laravel | Laravel Framework | 01/16/2024 | 0.79990 | 8.1 | FALSE | TRUE | FALSE | https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30; https://nvd.nist.gov/vuln/detail/CVE-2018-15133 | https://vulncheck.com/xdb/45e7d1957c7f||https://vulncheck.com/xdb/45e7d1957c7f , https://vulncheck.com/xdb/3004cb8714e9||https://vulncheck.com/xdb/3004cb8714e9 , https://vulncheck.com/xdb/0a29cfc05e95||https://vulncheck.com/xdb/0a29cfc05e95 , https://vulncheck.com/xdb/8027eabdd92d||https://vulncheck.com/xdb/8027eabdd92d , https://vulncheck.com/xdb/b31ca993356f||https://vulncheck.com/xdb/b31ca993356f , https://vulncheck.com/xdb/be7a45b53d16||https://vulncheck.com/xdb/be7a45b53d16 , https://vulncheck.com/xdb/b1064b8f348a||https://vulncheck.com/xdb/b1064b8f348a , https://vulncheck.com/xdb/bb622dfa8b57||https://vulncheck.com/xdb/bb622dfa8b57 , https://vulncheck.com/xdb/2c6de6585be5||https://vulncheck.com/xdb/2c6de6585be5 , https://vulncheck.com/xdb/7fa45a25cb32||https://vulncheck.com/xdb/7fa45a25cb32 | |||
CVE-2023-46805 | Ivanti | Connect Secure and Policy Secure | 01/10/2024 | 0.94398 | 8.2 | https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt | 2 | TRUE | TRUE | FALSE | Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-46805 | https://vulncheck.com/xdb/94604f97e3be||https://vulncheck.com/xdb/94604f97e3be , https://vulncheck.com/xdb/861831be04bb||https://vulncheck.com/xdb/861831be04bb , https://vulncheck.com/xdb/7d5d8ce1a955||https://vulncheck.com/xdb/7d5d8ce1a955 , https://vulncheck.com/xdb/676e0bcf48b8||https://vulncheck.com/xdb/676e0bcf48b8 , https://vulncheck.com/xdb/c6e9fbe8f33b||https://vulncheck.com/xdb/c6e9fbe8f33b , https://vulncheck.com/xdb/8aaf3b1980d0||https://vulncheck.com/xdb/8aaf3b1980d0 , https://vulncheck.com/xdb/d3238b74c459||https://vulncheck.com/xdb/d3238b74c459 , https://vulncheck.com/xdb/a797febede5b||https://vulncheck.com/xdb/a797febede5b | |
CVE-2024-21887 | Ivanti | Connect Secure and Policy Secure | 01/10/2024 | 0.94416 | 9.1 | https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt | 9 | TRUE | TRUE | FALSE | Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-21887 | https://vulncheck.com/xdb/ec7c4cca84d9||https://vulncheck.com/xdb/ec7c4cca84d9 , https://vulncheck.com/xdb/a227bd0afc26||https://vulncheck.com/xdb/a227bd0afc26 , https://vulncheck.com/xdb/a72604a4ced0||https://vulncheck.com/xdb/a72604a4ced0 , https://vulncheck.com/xdb/ecf3cf71be36||https://vulncheck.com/xdb/ecf3cf71be36 , https://vulncheck.com/xdb/983f05b4d88d||https://vulncheck.com/xdb/983f05b4d88d , https://vulncheck.com/xdb/e6f386d5d54f||https://vulncheck.com/xdb/e6f386d5d54f | |
CVE-2023-29357 | Microsoft | SharePoint Server | 01/10/2024 | 0.94356 | 9.8 | https://viz.greynoise.io/tag/sharepoint-cve-2023-29357-check||https://viz.greynoise.io/tag/sharepoint-cve-2023-29357-check | 2 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357; https://nvd.nist.gov/vuln/detail/CVE-2023-29357 | https://vulncheck.com/xdb/5a18945a6a42||https://vulncheck.com/xdb/5a18945a6a42 , https://vulncheck.com/xdb/c611323c5060||https://vulncheck.com/xdb/c611323c5060 , https://vulncheck.com/xdb/fd8cdbf188d1||https://vulncheck.com/xdb/fd8cdbf188d1 | |
CVE-2023-27524 | Apache | Superset | 01/08/2024 | 0.80255 | 8.9 | https://viz.greynoise.io/tag/apache-superset-authentication-bypass-attempt||https://viz.greynoise.io/tag/apache-superset-authentication-bypass-attempt | FALSE | TRUE | FALSE | https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk; https://nvd.nist.gov/vuln/detail/CVE-2023-27524 | https://vulncheck.com/xdb/3f3b3474bcd8||https://vulncheck.com/xdb/3f3b3474bcd8 , https://vulncheck.com/xdb/a2f39ee2e959||https://vulncheck.com/xdb/a2f39ee2e959 , https://vulncheck.com/xdb/49026b01a9e8||https://vulncheck.com/xdb/49026b01a9e8 , https://vulncheck.com/xdb/a4304932f8c7||https://vulncheck.com/xdb/a4304932f8c7 , https://vulncheck.com/xdb/d23c099d5d89||https://vulncheck.com/xdb/d23c099d5d89 , https://vulncheck.com/xdb/7b3694a59dcc||https://vulncheck.com/xdb/7b3694a59dcc , https://vulncheck.com/xdb/d258b47e2ea9||https://vulncheck.com/xdb/d258b47e2ea9 , https://vulncheck.com/xdb/96ea12e77e80||https://vulncheck.com/xdb/96ea12e77e80 , https://vulncheck.com/xdb/3a6a4fb601a4||https://vulncheck.com/xdb/3a6a4fb601a4 , https://vulncheck.com/xdb/925cc8f34b1d||https://vulncheck.com/xdb/925cc8f34b1d , https://vulncheck.com/xdb/4abf848aca22||https://vulncheck.com/xdb/4abf848aca22 | ||
CVE-2023-38203 | Adobe | ColdFusion | 01/08/2024 | 0.94264 | 9.8 | https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38203-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38203-rce-attempt | TRUE | FALSE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38203 | |||
CVE-2023-41990 | Apple | Multiple Products | 01/08/2024 | 0.04103 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213599, https://support.apple.com/en-us/HT213601, https://support.apple.com/en-us/HT213605, https://support.apple.com/en-us/HT213606, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213844, https://support.apple.com/en-us/HT213845 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41990 | ||||
CVE-2023-23752 | Joomla! | Joomla! | 01/08/2024 | 0.94532 | 5.3 | https://viz.greynoise.io/tag/joomla-credential-disclosure-cve-2023-23752-attempt||https://viz.greynoise.io/tag/joomla-credential-disclosure-cve-2023-23752-attempt | 13 | FALSE | TRUE | FALSE | https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html; https://nvd.nist.gov/vuln/detail/CVE-2023-23752 | https://vulncheck.com/xdb/761b2b5d20c0||https://vulncheck.com/xdb/761b2b5d20c0 , https://vulncheck.com/xdb/992ddc9eaf34||https://vulncheck.com/xdb/992ddc9eaf34 , https://vulncheck.com/xdb/73bb74556ea0||https://vulncheck.com/xdb/73bb74556ea0 , https://vulncheck.com/xdb/bb793678a4c1||https://vulncheck.com/xdb/bb793678a4c1 , https://vulncheck.com/xdb/e6753746f8b7||https://vulncheck.com/xdb/e6753746f8b7 , https://vulncheck.com/xdb/4fcef0954175||https://vulncheck.com/xdb/4fcef0954175 , https://vulncheck.com/xdb/7522628c4302||https://vulncheck.com/xdb/7522628c4302 , https://vulncheck.com/xdb/96a2ba3662e2||https://vulncheck.com/xdb/96a2ba3662e2 , https://vulncheck.com/xdb/eb2e3ecc6d40||https://vulncheck.com/xdb/eb2e3ecc6d40 , https://vulncheck.com/xdb/9fd61fea3bcd||https://vulncheck.com/xdb/9fd61fea3bcd , https://vulncheck.com/xdb/a0e1c1067de0||https://vulncheck.com/xdb/a0e1c1067de0 , https://vulncheck.com/xdb/cb289c9b68c0||https://vulncheck.com/xdb/cb289c9b68c0 , https://vulncheck.com/xdb/7abe8dabe0ec||https://vulncheck.com/xdb/7abe8dabe0ec , https://vulncheck.com/xdb/14f43e8a9127||https://vulncheck.com/xdb/14f43e8a9127 , https://vulncheck.com/xdb/8a58bbcc46df||https://vulncheck.com/xdb/8a58bbcc46df , https://vulncheck.com/xdb/7d4f2880c446||https://vulncheck.com/xdb/7d4f2880c446 , https://vulncheck.com/xdb/e4c6e9cbdaef||https://vulncheck.com/xdb/e4c6e9cbdaef , https://vulncheck.com/xdb/0688e24d7079||https://vulncheck.com/xdb/0688e24d7079 , https://vulncheck.com/xdb/bc3b64de1018||https://vulncheck.com/xdb/bc3b64de1018 , https://vulncheck.com/xdb/8cf7bc735c45||https://vulncheck.com/xdb/8cf7bc735c45 , https://vulncheck.com/xdb/05ec071c3006||https://vulncheck.com/xdb/05ec071c3006 , https://vulncheck.com/xdb/0dad9517c791||https://vulncheck.com/xdb/0dad9517c791 , https://vulncheck.com/xdb/b5de15491c97||https://vulncheck.com/xdb/b5de15491c97 , https://vulncheck.com/xdb/d351d4959b91||https://vulncheck.com/xdb/d351d4959b91 , https://vulncheck.com/xdb/043a525ec0e4||https://vulncheck.com/xdb/043a525ec0e4 , https://vulncheck.com/xdb/ae3ff3c0e355||https://vulncheck.com/xdb/ae3ff3c0e355 , https://vulncheck.com/xdb/b46b379891c7||https://vulncheck.com/xdb/b46b379891c7 , https://vulncheck.com/xdb/a5535be52699||https://vulncheck.com/xdb/a5535be52699 , https://vulncheck.com/xdb/4567f3a2525d||https://vulncheck.com/xdb/4567f3a2525d , https://vulncheck.com/xdb/c33ca6ed39f6||https://vulncheck.com/xdb/c33ca6ed39f6 , https://vulncheck.com/xdb/a5e6c33317ae||https://vulncheck.com/xdb/a5e6c33317ae , https://vulncheck.com/xdb/fef258e57e22||https://vulncheck.com/xdb/fef258e57e22 , https://vulncheck.com/xdb/2210c76b12f5||https://vulncheck.com/xdb/2210c76b12f5 , https://vulncheck.com/xdb/e8a1bd301814||https://vulncheck.com/xdb/e8a1bd301814 , https://vulncheck.com/xdb/ae30c8d7f152||https://vulncheck.com/xdb/ae30c8d7f152 , https://vulncheck.com/xdb/5ccc05d276eb||https://vulncheck.com/xdb/5ccc05d276eb , https://vulncheck.com/xdb/13105a603082||https://vulncheck.com/xdb/13105a603082 , https://vulncheck.com/xdb/318208166f71||https://vulncheck.com/xdb/318208166f71 , https://vulncheck.com/xdb/45955df3e0df||https://vulncheck.com/xdb/45955df3e0df , https://vulncheck.com/xdb/554b62cc1b8c||https://vulncheck.com/xdb/554b62cc1b8c , https://vulncheck.com/xdb/a21e9dba9052||https://vulncheck.com/xdb/a21e9dba9052 , https://vulncheck.com/xdb/7b3bb7626ede||https://vulncheck.com/xdb/7b3bb7626ede , https://vulncheck.com/xdb/0c0007f3a9a4||https://vulncheck.com/xdb/0c0007f3a9a4 , https://vulncheck.com/xdb/d6ec7cba19ca||https://vulncheck.com/xdb/d6ec7cba19ca , https://vulncheck.com/xdb/df4325f0bd6d||https://vulncheck.com/xdb/df4325f0bd6d , https://vulncheck.com/xdb/ce466865c2f6||https://vulncheck.com/xdb/ce466865c2f6 | |
CVE-2016-20017 | D-Link | DSL-2750B Devices | 01/08/2024 | 0.85525 | 9.8 | https://viz.greynoise.io/tag/d-link-dsl-2750b-rce-attempt||https://viz.greynoise.io/tag/d-link-dsl-2750b-rce-attempt | FALSE | FALSE | FALSE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088; https://nvd.nist.gov/vuln/detail/CVE-2016-20017 | |||
CVE-2023-29300 | Adobe | ColdFusion | 01/08/2024 | 0.92907 | 9.8 | https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29300-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29300-rce-attempt | 2 | TRUE | TRUE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29300 | ||
CVE-2023-7024 | Chromium WebRTC | 01/02/2024 | 0.01632 | 8.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html; https://nvd.nist.gov/vuln/detail/CVE-2023-7024 | |||||
CVE-2023-7101 | Spreadsheet::ParseExcel | Spreadsheet::ParseExcel | 01/02/2024 | 0.89983 | 7.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and fix for their downstream issue CVE-2023-7102 at https://www.barracuda.com/company/legal/esg-vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2023-7101 | ||||
CVE-2023-47565 | QNAP | VioStor NVR | 12/21/2023 | 0.74660 | 8.0 | FALSE | FALSE | FALSE | https://www.qnap.com/en/security-advisory/qsa-23-48 ; https://nvd.nist.gov/vuln/detail/CVE-2023-47565 | ||||
CVE-2023-49897 | FXC | AE1021, AE1021PE | 12/21/2023 | 0.31328 | 8.8 | FALSE | FALSE | FALSE | https://www.fxc.jp/news/20231206 ; https://nvd.nist.gov/vuln/detail/CVE-2023-49897 | ||||
CVE-2023-6448 | Unitronics | Vision PLC and HMI | 12/11/2023 | 0.10289 | 9.8 | FALSE | FALSE | FALSE | Note that while it is possible to change the default password, implementors are encouraged to remove affected controllers from public networks and update the affected firmware: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf; https://nvd.nist.gov/vuln/detail/CVE-2023-6448 | ||||
CVE-2023-41265 | Qlik | Sense | 12/07/2023 | 0.91791 | 9.6 | https://viz.greynoise.io/tag/qlik-sense-http-tunneling-attempt||https://viz.greynoise.io/tag/qlik-sense-http-tunneling-attempt | 2 | TRUE | TRUE | FALSE | https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801; https://nvd.nist.gov/vuln/detail/CVE-2023-41265 | https://vulncheck.com/xdb/bc387b725d20 | |
CVE-2023-41266 | Qlik | Sense | 12/07/2023 | 0.94246 | 8.2 | https://viz.greynoise.io/tag/qlik-sense-auth-bypass-attempt||https://viz.greynoise.io/tag/qlik-sense-auth-bypass-attempt | TRUE | TRUE | FALSE | https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41266 | https://vulncheck.com/xdb/ced858f75509 | ||
CVE-2022-22071 | Qualcomm | Multiple Chipsets | 12/05/2023 | 0.00636 | 8.4 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.4/-/commit/586840fde350d7b8563df9889c8ce397e2c20dda; https://nvd.nist.gov/vuln/detail/CVE-2022-22071 | ||||
CVE-2023-33063 | Qualcomm | Multiple Chipsets | 12/05/2023 | 0.00234 | 7.8 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.15/-/commit/2643808ddbedfaabbb334741873fb2857f78188a, https://git.codelinaro.org/clo/la/kernel/msm-4.14/-/commit/d43222efda5a01c9804d74a541e3c1be9b7fe110; https://nvd.nist.gov/vuln/detail/CVE-2023-33063 | ||||
CVE-2023-33107 | Qualcomm | Multiple Chipsets | 12/05/2023 | 0.00096 | 8.4 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/d66b799c804083ea5226cfffac6d6c4e7ad4968b; https://nvd.nist.gov/vuln/detail/CVE-2023-33107 | ||||
CVE-2023-33106 | Qualcomm | Multiple Chipsets | 12/05/2023 | 0.00062 | 8.4 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/1e46e81dbeb69aafd5842ce779f07e617680fd58; https://nvd.nist.gov/vuln/detail/CVE-2023-33106 | ||||
CVE-2023-42917 | Apple | Multiple Products | 12/04/2023 | 0.00040 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42917 | ||||
CVE-2023-42916 | Apple | Multiple Products | 12/04/2023 | 0.00046 | 6.5 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42916 | ||||
CVE-2023-6345 | Chromium Skia | 11/30/2023 | 0.00670 | 9.6 | FALSE | FALSE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-6345 | |||||
CVE-2023-49103 | ownCloud | ownCloud graphapi | 11/30/2023 | 0.94366 | 10.0 | https://viz.greynoise.io/tag/owncloud-graph-api-information-disclosure||https://viz.greynoise.io/tag/owncloud-graph-api-information-disclosure | 13 | FALSE | TRUE | FALSE | https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-49103 | https://vulncheck.com/xdb/832500fb0a96||https://vulncheck.com/xdb/832500fb0a96 , https://vulncheck.com/xdb/86bc597345c5||https://vulncheck.com/xdb/86bc597345c5 | |
CVE-2023-4911 | GNU | GNU C Library | 11/21/2023 | 0.70561 | 7.8 | TRUE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8fa, https://access.redhat.com/security/cve/cve-2023-4911, https://www.debian.org/security/2023/dsa-5514 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4911 | https://vulncheck.com/xdb/e9cc8a9653c6||https://vulncheck.com/xdb/e9cc8a9653c6 , https://vulncheck.com/xdb/7154c8a75572||https://vulncheck.com/xdb/7154c8a75572 , https://vulncheck.com/xdb/794f2256b177||https://vulncheck.com/xdb/794f2256b177 , https://vulncheck.com/xdb/7386501edb9e||https://vulncheck.com/xdb/7386501edb9e , https://vulncheck.com/xdb/847bf09204ca||https://vulncheck.com/xdb/847bf09204ca , https://vulncheck.com/xdb/270ec9b3f4c1||https://vulncheck.com/xdb/270ec9b3f4c1 , https://vulncheck.com/xdb/60ac54a2a53a||https://vulncheck.com/xdb/60ac54a2a53a , https://vulncheck.com/xdb/24a3ae6b3ae0||https://vulncheck.com/xdb/24a3ae6b3ae0 , https://vulncheck.com/xdb/e8ba401a5397||https://vulncheck.com/xdb/e8ba401a5397 , https://vulncheck.com/xdb/4a0f3cecfcf5||https://vulncheck.com/xdb/4a0f3cecfcf5 , https://vulncheck.com/xdb/208283cc4e70||https://vulncheck.com/xdb/208283cc4e70 , https://vulncheck.com/xdb/b43d5e2b6b33||https://vulncheck.com/xdb/b43d5e2b6b33 , https://vulncheck.com/xdb/c66f71d05ca3||https://vulncheck.com/xdb/c66f71d05ca3 , https://vulncheck.com/xdb/6dd56d3450b7||https://vulncheck.com/xdb/6dd56d3450b7 , https://vulncheck.com/xdb/0bfd16ee5c6e||https://vulncheck.com/xdb/0bfd16ee5c6e , https://vulncheck.com/xdb/1bf2c7948d0a||https://vulncheck.com/xdb/1bf2c7948d0a , https://vulncheck.com/xdb/6ddd35f752a2||https://vulncheck.com/xdb/6ddd35f752a2 , https://vulncheck.com/xdb/847b8ad5421f||https://vulncheck.com/xdb/847b8ad5421f , https://vulncheck.com/xdb/d7f283c48b1a||https://vulncheck.com/xdb/d7f283c48b1a , https://vulncheck.com/xdb/c1e2b0d1e872||https://vulncheck.com/xdb/c1e2b0d1e872 , https://vulncheck.com/xdb/d9dc0002293f||https://vulncheck.com/xdb/d9dc0002293f | |||
CVE-2023-1671 | Sophos | Web Appliance | 11/16/2023 | 0.94290 | 9.8 | https://viz.greynoise.io/tag/sophos-web-appliance-rce-attempt||https://viz.greynoise.io/tag/sophos-web-appliance-rce-attempt | 2 | FALSE | TRUE | FALSE | https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce; https://nvd.nist.gov/vuln/detail/CVE-2023-1671 | https://vulncheck.com/xdb/9e7a7266eb72||https://vulncheck.com/xdb/9e7a7266eb72 , https://vulncheck.com/xdb/5075178f5d0a||https://vulncheck.com/xdb/5075178f5d0a , https://vulncheck.com/xdb/6c909a4dbb22||https://vulncheck.com/xdb/6c909a4dbb22 , https://vulncheck.com/xdb/f42bfbb2ab42||https://vulncheck.com/xdb/f42bfbb2ab42 | |
CVE-2023-36584 | Microsoft | Windows | 11/16/2023 | 0.20094 | 5.4 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36584 | ||||
CVE-2020-2551 | Oracle | Fusion Middleware | 11/16/2023 | 0.94393 | 9.8 | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpujan2020.html; https://nvd.nist.gov/vuln/detail/CVE-2020-2551 | https://vulncheck.com/xdb/593ea0948a71||https://vulncheck.com/xdb/593ea0948a71 , https://vulncheck.com/xdb/331c7b695711||https://vulncheck.com/xdb/331c7b695711 , https://vulncheck.com/xdb/0f71a5e7f06e||https://vulncheck.com/xdb/0f71a5e7f06e , https://vulncheck.com/xdb/3041ae129674||https://vulncheck.com/xdb/3041ae129674 , https://vulncheck.com/xdb/8dc42355d38d||https://vulncheck.com/xdb/8dc42355d38d , https://vulncheck.com/xdb/993743176260||https://vulncheck.com/xdb/993743176260 , https://vulncheck.com/xdb/ebf92f4c5d9b||https://vulncheck.com/xdb/ebf92f4c5d9b , https://vulncheck.com/xdb/f6dd1753be29||https://vulncheck.com/xdb/f6dd1753be29 | |||
CVE-2023-36033 | Microsoft | Windows | 11/14/2023 | 0.00249 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36033 | ||||
CVE-2023-36036 | Microsoft | Windows | 11/14/2023 | 0.00968 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36036 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36036 | ||||
CVE-2023-36025 | Microsoft | Windows | 11/14/2023 | 0.90662 | 8.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36025; https://nvd.nist.gov/vuln/detail/CVE-2023-36025 | https://vulncheck.com/xdb/dc28e49a6acf | |||
CVE-2023-47246 | SysAid | SysAid Server | 11/13/2023 | 0.94380 | 9.8 | https://viz.greynoise.io/tag/sysaid-path-traversal-attempt||https://viz.greynoise.io/tag/sysaid-path-traversal-attempt | 2 | TRUE | TRUE | FALSE | https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification; https://nvd.nist.gov/vuln/detail/CVE-2023-47246 | https://vulncheck.com/xdb/e8ff64a53910||https://vulncheck.com/xdb/e8ff64a53910 , https://vulncheck.com/xdb/d306acc109ee||https://vulncheck.com/xdb/d306acc109ee , https://vulncheck.com/xdb/35d58d1d70ee||https://vulncheck.com/xdb/35d58d1d70ee | |
CVE-2023-36846 | Juniper | Junos OS | 11/13/2023 | 0.94278 | 5.3 | https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt||https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt | FALSE | TRUE | FALSE | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36846 | https://vulncheck.com/xdb/83a248c63cdc||https://vulncheck.com/xdb/83a248c63cdc , https://vulncheck.com/xdb/869a78bb22b0||https://vulncheck.com/xdb/869a78bb22b0 , https://vulncheck.com/xdb/2b08c3ae7d02||https://vulncheck.com/xdb/2b08c3ae7d02 , https://vulncheck.com/xdb/4826ed6161ea||https://vulncheck.com/xdb/4826ed6161ea | ||
CVE-2023-36845 | Juniper | Junos OS | 11/13/2023 | 0.94355 | 9.8 | https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt||https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt | 0 | FALSE | TRUE | FALSE | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36845 | https://vulncheck.com/xdb/7f3ac2cfdf5a||https://vulncheck.com/xdb/7f3ac2cfdf5a , https://vulncheck.com/xdb/4fae7ca850e5||https://vulncheck.com/xdb/4fae7ca850e5 , https://vulncheck.com/xdb/40881a555da5||https://vulncheck.com/xdb/40881a555da5 , https://vulncheck.com/xdb/a2f2dd7e0a50||https://vulncheck.com/xdb/a2f2dd7e0a50 , https://vulncheck.com/xdb/f1599fa5e102||https://vulncheck.com/xdb/f1599fa5e102 , https://vulncheck.com/xdb/23f413cb1c62||https://vulncheck.com/xdb/23f413cb1c62 , https://vulncheck.com/xdb/bea8d1e01668||https://vulncheck.com/xdb/bea8d1e01668 , https://vulncheck.com/xdb/f2e8c180103f||https://vulncheck.com/xdb/f2e8c180103f , https://vulncheck.com/xdb/539fa0525155||https://vulncheck.com/xdb/539fa0525155 , https://vulncheck.com/xdb/549b4b2e791e||https://vulncheck.com/xdb/549b4b2e791e , https://vulncheck.com/xdb/f715efbe5fe8||https://vulncheck.com/xdb/f715efbe5fe8 , https://vulncheck.com/xdb/eb307a27c46c||https://vulncheck.com/xdb/eb307a27c46c , https://vulncheck.com/xdb/861198e6f367||https://vulncheck.com/xdb/861198e6f367 , https://vulncheck.com/xdb/f6208bcc8206||https://vulncheck.com/xdb/f6208bcc8206 , https://vulncheck.com/xdb/db1e7b347773||https://vulncheck.com/xdb/db1e7b347773 , https://vulncheck.com/xdb/fcb027407d46||https://vulncheck.com/xdb/fcb027407d46 , https://vulncheck.com/xdb/c5b62df0eae0||https://vulncheck.com/xdb/c5b62df0eae0 | |
CVE-2023-36847 | Juniper | Junos OS | 11/13/2023 | 0.94278 | 5.3 | https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt||https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt | TRUE | TRUE | FALSE | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-36847 | https://vulncheck.com/xdb/2bdcb74510c6||https://vulncheck.com/xdb/2bdcb74510c6 , https://vulncheck.com/xdb/93522de431d0||https://vulncheck.com/xdb/93522de431d0 | ||
CVE-2023-36851 | Juniper | Junos OS | 11/13/2023 | 0.11397 | 5.3 | FALSE | FALSE | FALSE | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36851 | ||||
CVE-2023-36844 | Juniper | Junos OS | 11/13/2023 | 0.94297 | 5.3 | https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt||https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt | 1 | TRUE | TRUE | FALSE | https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36844 | https://vulncheck.com/xdb/4b17b4566e33||https://vulncheck.com/xdb/4b17b4566e33 , https://vulncheck.com/xdb/5ed5b7ad2c78||https://vulncheck.com/xdb/5ed5b7ad2c78 , https://vulncheck.com/xdb/0bb1b8378b4d||https://vulncheck.com/xdb/0bb1b8378b4d | |
CVE-2023-29552 | IETF | Service Location Protocol (SLP) | 11/08/2023 | 0.93709 | 7.5 | TRUE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552 | https://vulncheck.com/xdb/ab8547d12ef8 | |||
CVE-2023-22518 | Atlassian | Confluence Data Center and Server | 11/07/2023 | 0.94375 | 10.0 | https://viz.greynoise.io/tag/atlassian-confluence-server-authentication-bypass-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-authentication-bypass-attempt | 3 | TRUE | TRUE | FALSE | https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518 | https://vulncheck.com/xdb/7b2944722fc9||https://vulncheck.com/xdb/7b2944722fc9 , https://vulncheck.com/xdb/173b8501bb56||https://vulncheck.com/xdb/173b8501bb56 , https://vulncheck.com/xdb/9d50ab6135b4||https://vulncheck.com/xdb/9d50ab6135b4 , https://vulncheck.com/xdb/af7ef38c0b58||https://vulncheck.com/xdb/af7ef38c0b58 , https://vulncheck.com/xdb/b112c9f575e9||https://vulncheck.com/xdb/b112c9f575e9 , https://vulncheck.com/xdb/9577c6fee8f6||https://vulncheck.com/xdb/9577c6fee8f6 | |
CVE-2023-46604 | Apache | ActiveMQ | 11/02/2023 | 0.94436 | 10.0 | https://viz.greynoise.io/tag/apache-activemq-rce-attempt||https://viz.greynoise.io/tag/apache-activemq-rce-attempt | TRUE | TRUE | FALSE | https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt; https://nvd.nist.gov/vuln/detail/CVE-2023-46604 | https://vulncheck.com/xdb/c1ad06a8233f||https://vulncheck.com/xdb/c1ad06a8233f , https://vulncheck.com/xdb/26ec274f11a6||https://vulncheck.com/xdb/26ec274f11a6 , https://vulncheck.com/xdb/bd01e441da28||https://vulncheck.com/xdb/bd01e441da28 , https://vulncheck.com/xdb/adc63f08a561||https://vulncheck.com/xdb/adc63f08a561 , https://vulncheck.com/xdb/1e134f0874f8||https://vulncheck.com/xdb/1e134f0874f8 , https://vulncheck.com/xdb/bf84564c744c||https://vulncheck.com/xdb/bf84564c744c , https://vulncheck.com/xdb/e3eff001f1db||https://vulncheck.com/xdb/e3eff001f1db , https://vulncheck.com/xdb/f688c01da056||https://vulncheck.com/xdb/f688c01da056 , https://vulncheck.com/xdb/111d5aa9554f||https://vulncheck.com/xdb/111d5aa9554f , https://vulncheck.com/xdb/7adf2c60412f||https://vulncheck.com/xdb/7adf2c60412f , https://vulncheck.com/xdb/453453dd752f||https://vulncheck.com/xdb/453453dd752f , https://vulncheck.com/xdb/cc4ca3b4d289||https://vulncheck.com/xdb/cc4ca3b4d289 , https://vulncheck.com/xdb/7d454efa423f||https://vulncheck.com/xdb/7d454efa423f , https://vulncheck.com/xdb/9af52ad961ce||https://vulncheck.com/xdb/9af52ad961ce , https://vulncheck.com/xdb/f5d0e2739b8c||https://vulncheck.com/xdb/f5d0e2739b8c , https://vulncheck.com/xdb/90299d8578e8||https://vulncheck.com/xdb/90299d8578e8 , https://vulncheck.com/xdb/8ce9f74afedc||https://vulncheck.com/xdb/8ce9f74afedc , https://vulncheck.com/xdb/9c19a15a7306||https://vulncheck.com/xdb/9c19a15a7306 , https://vulncheck.com/xdb/c01880ea274b||https://vulncheck.com/xdb/c01880ea274b , https://vulncheck.com/xdb/2a263bac5fa9||https://vulncheck.com/xdb/2a263bac5fa9 , https://vulncheck.com/xdb/d6b987f7cb4c||https://vulncheck.com/xdb/d6b987f7cb4c , https://vulncheck.com/xdb/5f38a93c3fe0||https://vulncheck.com/xdb/5f38a93c3fe0 | ||
CVE-2023-46748 | F5 | BIG-IP Configuration Utility | 10/31/2023 | 0.04042 | 8.8 | FALSE | FALSE | FALSE | https://my.f5.com/manage/s/article/K000137365 ; https://nvd.nist.gov/vuln/detail/CVE-2023-46748 | ||||
CVE-2023-46747 | F5 | BIG-IP Configuration Utility | 10/31/2023 | 0.94441 | 9.8 | https://viz.greynoise.io/tag/f5-big-ip-cve-2023-46747-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-cve-2023-46747-rce-attempt | 2 | TRUE | TRUE | FALSE | https://my.f5.com/manage/s/article/K000137353; https://nvd.nist.gov/vuln/detail/CVE-2023-46747 | https://vulncheck.com/xdb/9d0696424c70||https://vulncheck.com/xdb/9d0696424c70 , https://vulncheck.com/xdb/88ce0f9aef32||https://vulncheck.com/xdb/88ce0f9aef32 , https://vulncheck.com/xdb/b52643f70db2||https://vulncheck.com/xdb/b52643f70db2 , https://vulncheck.com/xdb/b56c51787c69||https://vulncheck.com/xdb/b56c51787c69 , https://vulncheck.com/xdb/c694e014985b||https://vulncheck.com/xdb/c694e014985b , https://vulncheck.com/xdb/834010b85f13||https://vulncheck.com/xdb/834010b85f13 | |
CVE-2023-5631 | Roundcube | Webmail | 10/26/2023 | 0.90987 | 6.1 | FALSE | FALSE | FALSE | https://roundcube.net/news/2023/10/16/security-update-1.6.4-released, https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15 ; https://nvd.nist.gov/vuln/detail/CVE-2023-5631 | ||||
CVE-2023-20273 | Cisco | Cisco IOS XE Web UI | 10/23/2023 | 0.92717 | 7.2 | https://viz.greynoise.io/tag/cisco-ios-xe-rce-cve-2023-20273-attempt||https://viz.greynoise.io/tag/cisco-ios-xe-rce-cve-2023-20273-attempt | FALSE | TRUE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z; https://nvd.nist.gov/vuln/detail/CVE-2023-20273 | https://vulncheck.com/xdb/397a0b3fc5a1 | ||
CVE-2021-1435 | Cisco | Cisco IOS XE Web UI | 10/19/2023 | 0.00384 | 6.6 | FALSE | FALSE | FALSE | https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/ | ||||
CVE-2023-4966 | Citrix | NetScaler ADC and NetScaler Gateway | 10/18/2023 | 0.94378 | 9.4 | https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-attempt , https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-check||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-check | 5 | TRUE | TRUE | FALSE | https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/, https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4966 | https://vulncheck.com/xdb/d0f56bd97312||https://vulncheck.com/xdb/d0f56bd97312 , https://vulncheck.com/xdb/eda602714add||https://vulncheck.com/xdb/eda602714add , https://vulncheck.com/xdb/1730dedb1e6c||https://vulncheck.com/xdb/1730dedb1e6c , https://vulncheck.com/xdb/6d5dd2374b9a||https://vulncheck.com/xdb/6d5dd2374b9a , https://vulncheck.com/xdb/8eb103a2c3b0||https://vulncheck.com/xdb/8eb103a2c3b0 , https://vulncheck.com/xdb/71f6515411fa||https://vulncheck.com/xdb/71f6515411fa , https://vulncheck.com/xdb/583a12f31374||https://vulncheck.com/xdb/583a12f31374 , https://vulncheck.com/xdb/10b2c72de037||https://vulncheck.com/xdb/10b2c72de037 , https://vulncheck.com/xdb/fad40eedba5f||https://vulncheck.com/xdb/fad40eedba5f , https://vulncheck.com/xdb/f0d1f1f65636||https://vulncheck.com/xdb/f0d1f1f65636 , https://vulncheck.com/xdb/4329c3c26f5c||https://vulncheck.com/xdb/4329c3c26f5c , https://vulncheck.com/xdb/fd87f38c3710||https://vulncheck.com/xdb/fd87f38c3710 | |
CVE-2023-20198 | Cisco | IOS XE Web UI | 10/16/2023 | 0.94162 | 10.0 | https://viz.greynoise.io/tag/cisco-ios-xe-cve-2023-20198-scanner||https://viz.greynoise.io/tag/cisco-ios-xe-cve-2023-20198-scanner , https://viz.greynoise.io/tag/cisco-ios-xe-privilege-escalation-attempt||https://viz.greynoise.io/tag/cisco-ios-xe-privilege-escalation-attempt | 236 | TRUE | TRUE | FALSE | https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198 | https://vulncheck.com/xdb/776fa8a7922c||https://vulncheck.com/xdb/776fa8a7922c , https://vulncheck.com/xdb/5ddefc8f6c3a||https://vulncheck.com/xdb/5ddefc8f6c3a , https://vulncheck.com/xdb/dd7c031f8763||https://vulncheck.com/xdb/dd7c031f8763 , https://vulncheck.com/xdb/6628d3a046f1||https://vulncheck.com/xdb/6628d3a046f1 , https://vulncheck.com/xdb/ff6ce06a2c5a||https://vulncheck.com/xdb/ff6ce06a2c5a , https://vulncheck.com/xdb/7cec6c4757e7||https://vulncheck.com/xdb/7cec6c4757e7 , https://vulncheck.com/xdb/d7c1f4c82bb7||https://vulncheck.com/xdb/d7c1f4c82bb7 , https://vulncheck.com/xdb/1281b61abcb0||https://vulncheck.com/xdb/1281b61abcb0 | |
CVE-2023-41763 | Microsoft | Skype for Business | 10/10/2023 | 0.19791 | 5.3 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-41763; https://nvd.nist.gov/vuln/detail/CVE-2023-41763 | ||||
CVE-2023-44487 | IETF | HTTP/2 | 10/10/2023 | 0.94437 | 7.5 | FALSE | TRUE | FALSE | This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487; https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/; https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | https://vulncheck.com/xdb/a64a9ab88fd5||https://vulncheck.com/xdb/a64a9ab88fd5 , https://vulncheck.com/xdb/34690740d2d3||https://vulncheck.com/xdb/34690740d2d3 , https://vulncheck.com/xdb/6dd9a135b0d8||https://vulncheck.com/xdb/6dd9a135b0d8 , https://vulncheck.com/xdb/f0fe97192105||https://vulncheck.com/xdb/f0fe97192105 , https://vulncheck.com/xdb/b3d01bf4f362||https://vulncheck.com/xdb/b3d01bf4f362 , https://vulncheck.com/xdb/c3bd71694fc8||https://vulncheck.com/xdb/c3bd71694fc8 , https://vulncheck.com/xdb/de08f4feae4c||https://vulncheck.com/xdb/de08f4feae4c , https://vulncheck.com/xdb/dcaf0e10df00||https://vulncheck.com/xdb/dcaf0e10df00 , https://vulncheck.com/xdb/2a1d7187487e||https://vulncheck.com/xdb/2a1d7187487e , https://vulncheck.com/xdb/78fb05ded384||https://vulncheck.com/xdb/78fb05ded384 , https://vulncheck.com/xdb/54af2e2a4404||https://vulncheck.com/xdb/54af2e2a4404 , https://vulncheck.com/xdb/f5782b81dab1||https://vulncheck.com/xdb/f5782b81dab1 , https://vulncheck.com/xdb/0f9d4f2a05f8||https://vulncheck.com/xdb/0f9d4f2a05f8 , https://vulncheck.com/xdb/1a4725458b4a||https://vulncheck.com/xdb/1a4725458b4a , https://vulncheck.com/xdb/95898a14699a||https://vulncheck.com/xdb/95898a14699a | |||
CVE-2023-36563 | Microsoft | WordPad | 10/10/2023 | 0.00745 | 6.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36563; https://nvd.nist.gov/vuln/detail/CVE-2023-36563 | ||||
CVE-2023-20109 | Cisco | IOS and IOS XE | 10/10/2023 | 0.00879 | 6.6 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx; https://nvd.nist.gov/vuln/detail/CVE-2023-20109 | ||||
CVE-2023-21608 | Adobe | Acrobat and Reader | 10/10/2023 | 0.88960 | 7.8 | FALSE | TRUE | FALSE | https://helpx.adobe.com/security/products/acrobat/apsb23-01.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21608 | https://vulncheck.com/xdb/0717f1503e66||https://vulncheck.com/xdb/0717f1503e66 , https://vulncheck.com/xdb/29d414efa30d||https://vulncheck.com/xdb/29d414efa30d | |||
CVE-2023-42824 | Apple | iOS and iPadOS | 10/05/2023 | 0.00515 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213961; https://nvd.nist.gov/vuln/detail/CVE-2023-42824 | ||||
CVE-2023-22515 | Atlassian | Confluence Data Center and Server | 10/05/2023 | 0.94365 | 10.0 | https://viz.greynoise.io/tag/atlassian-confluence-server-privilege-escalation-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-privilege-escalation-attempt | 18 | TRUE | TRUE | FALSE | https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515 | https://vulncheck.com/xdb/d1a7360ad4aa||https://vulncheck.com/xdb/d1a7360ad4aa , https://vulncheck.com/xdb/1476d745bdd8||https://vulncheck.com/xdb/1476d745bdd8 , https://vulncheck.com/xdb/331998b69600||https://vulncheck.com/xdb/331998b69600 , https://vulncheck.com/xdb/60c1f99992ac||https://vulncheck.com/xdb/60c1f99992ac , https://vulncheck.com/xdb/fa96709f1aff||https://vulncheck.com/xdb/fa96709f1aff , https://vulncheck.com/xdb/b179feb841ca||https://vulncheck.com/xdb/b179feb841ca , https://vulncheck.com/xdb/d52ac20466b2||https://vulncheck.com/xdb/d52ac20466b2 , https://vulncheck.com/xdb/63759da36933||https://vulncheck.com/xdb/63759da36933 , https://vulncheck.com/xdb/101896665425||https://vulncheck.com/xdb/101896665425 , https://vulncheck.com/xdb/c3834d7050f1||https://vulncheck.com/xdb/c3834d7050f1 , https://vulncheck.com/xdb/4482a214bee0||https://vulncheck.com/xdb/4482a214bee0 , https://vulncheck.com/xdb/9c39f6bf800c||https://vulncheck.com/xdb/9c39f6bf800c , https://vulncheck.com/xdb/bd7912683190||https://vulncheck.com/xdb/bd7912683190 , https://vulncheck.com/xdb/dd10c7ed859e||https://vulncheck.com/xdb/dd10c7ed859e , https://vulncheck.com/xdb/62d32405c6da||https://vulncheck.com/xdb/62d32405c6da , https://vulncheck.com/xdb/2c6f91286eac||https://vulncheck.com/xdb/2c6f91286eac , https://vulncheck.com/xdb/ce588e7e7050||https://vulncheck.com/xdb/ce588e7e7050 , https://vulncheck.com/xdb/a9f8f396455c||https://vulncheck.com/xdb/a9f8f396455c , https://vulncheck.com/xdb/d75adb32bcb4||https://vulncheck.com/xdb/d75adb32bcb4 , https://vulncheck.com/xdb/cd9c98c483ee||https://vulncheck.com/xdb/cd9c98c483ee | |
CVE-2023-40044 | Progress | WS_FTP Server | 10/05/2023 | 0.94427 | 10.0 | https://viz.greynoise.io/tag/progress-ws-ftp-server-scanner||https://viz.greynoise.io/tag/progress-ws-ftp-server-scanner , https://viz.greynoise.io/tag/progress-ws-ftp-server-cve-2023-40044-rce-attempt||https://viz.greynoise.io/tag/progress-ws-ftp-server-cve-2023-40044-rce-attempt | 0 | TRUE | TRUE | FALSE | https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023; https://nvd.nist.gov/vuln/detail/CVE-2023-40044 | ||
CVE-2023-28229 | Microsoft | Windows CNG Key Isolation Service | 10/04/2023 | 0.07065 | 7.0 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229; https://nvd.nist.gov/vuln/detail/CVE-2023-28229 | https://vulncheck.com/xdb/2a3dcdd65fe2||https://vulncheck.com/xdb/2a3dcdd65fe2 , https://vulncheck.com/xdb/389ef9618afd||https://vulncheck.com/xdb/389ef9618afd | |||
CVE-2023-42793 | JetBrains | TeamCity | 10/04/2023 | 0.94584 | 9.8 | https://viz.greynoise.io/tag/jetbrains-teamcity-authentication-bypass-attempt||https://viz.greynoise.io/tag/jetbrains-teamcity-authentication-bypass-attempt | 4 | TRUE | TRUE | FALSE | https://blog.jetbrains.com/teamcity/2023/09/critical-security-issue-affecting-teamcity-on-premises-update-to-2023-05-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-42793 | https://vulncheck.com/xdb/ee24de727fe4||https://vulncheck.com/xdb/ee24de727fe4 , https://vulncheck.com/xdb/8adc4eabd25a||https://vulncheck.com/xdb/8adc4eabd25a , https://vulncheck.com/xdb/c3ff544301c1||https://vulncheck.com/xdb/c3ff544301c1 , https://vulncheck.com/xdb/0bad07d29b7f||https://vulncheck.com/xdb/0bad07d29b7f , https://vulncheck.com/xdb/934bc956f553||https://vulncheck.com/xdb/934bc956f553 , https://vulncheck.com/xdb/10fd4d91a094||https://vulncheck.com/xdb/10fd4d91a094 , https://vulncheck.com/xdb/9b0f25203e7a||https://vulncheck.com/xdb/9b0f25203e7a , https://vulncheck.com/xdb/4a3db2dbc4c2||https://vulncheck.com/xdb/4a3db2dbc4c2 , https://vulncheck.com/xdb/5e4deb6fe264||https://vulncheck.com/xdb/5e4deb6fe264 , https://vulncheck.com/xdb/bc5a2b0e1d27||https://vulncheck.com/xdb/bc5a2b0e1d27 , https://vulncheck.com/xdb/cd1c718f6e87||https://vulncheck.com/xdb/cd1c718f6e87 , https://vulncheck.com/xdb/5559dd30ebb6||https://vulncheck.com/xdb/5559dd30ebb6 | |
CVE-2023-4211 | Arm | Mali GPU Kernel Driver | 10/03/2023 | 0.00052 | 5.5 | FALSE | FALSE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-4211 | ||||
CVE-2023-5217 | Chromium libvpx | 10/02/2023 | 0.02030 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2023-5217 | https://vulncheck.com/xdb/2bac536dad72 | ||||
CVE-2018-14667 | Red Hat | JBoss RichFaces Framework | 09/28/2023 | 0.88444 | 9.8 | https://viz.greynoise.io/tag/richfaces-rce-scanning||https://viz.greynoise.io/tag/richfaces-rce-scanning | FALSE | TRUE | FALSE | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667; https://nvd.nist.gov/vuln/detail/CVE-2018-14667 | https://vulncheck.com/xdb/484aa7ad502f||https://vulncheck.com/xdb/484aa7ad502f , https://vulncheck.com/xdb/19e2dcdd6dd0||https://vulncheck.com/xdb/19e2dcdd6dd0 | ||
CVE-2023-41993 | Apple | Multiple Products | 09/25/2023 | 0.08952 | 8.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213930; https://nvd.nist.gov/vuln/detail/CVE-2023-41993 | https://vulncheck.com/xdb/8065f39b344f||https://vulncheck.com/xdb/8065f39b344f , https://vulncheck.com/xdb/7b279092940a||https://vulncheck.com/xdb/7b279092940a , https://vulncheck.com/xdb/a1262876e3e8||https://vulncheck.com/xdb/a1262876e3e8 , https://vulncheck.com/xdb/87f86676e025||https://vulncheck.com/xdb/87f86676e025 | |||
CVE-2023-41992 | Apple | Multiple Products | 09/25/2023 | 0.00388 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931, https://support.apple.com/en-us/HT213932; https://nvd.nist.gov/vuln/detail/CVE-2023-41992 | ||||
CVE-2023-41991 | Apple | Multiple Products | 09/25/2023 | 0.06198 | 5.5 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41991 | https://vulncheck.com/xdb/895e960cb008 | |||
CVE-2023-41179 | Trend Micro | Apex One and Worry-Free Business Security | 09/21/2023 | 0.01510 | 7.2 | FALSE | FALSE | FALSE | https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179 | ||||
CVE-2023-28434 | MinIO | MinIO | 09/19/2023 | 0.33706 | 8.8 | FALSE | TRUE | FALSE | https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c; https://nvd.nist.gov/vuln/detail/CVE-2023-28434 | https://vulncheck.com/xdb/ba8d8634a7d1||https://vulncheck.com/xdb/ba8d8634a7d1 , https://vulncheck.com/xdb/ed33127b0327||https://vulncheck.com/xdb/ed33127b0327 | |||
CVE-2022-31461 | Owl Labs | Meeting Owl | 09/18/2023 | 0.00097 | 7.4 | FALSE | FALSE | FALSE | This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update | ||||
CVE-2022-31459 | Owl Labs | Meeting Owl | 09/18/2023 | 0.00090 | 7.4 | FALSE | FALSE | FALSE | This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update | ||||
CVE-2014-8361 | Realtek | SDK | 09/18/2023 | 0.94038 | 9.8 | https://viz.greynoise.io/tag/realtek-miniigd-upnp-worm-attempt||https://viz.greynoise.io/tag/realtek-miniigd-upnp-worm-attempt | 224 | FALSE | TRUE | TRUE | https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361 | ||
CVE-2022-22265 | Samsung | Mobile Devices | 09/18/2023 | 0.00211 | 5.0 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1; https://nvd.nist.gov/vuln/detail/CVE-2022-22265 | ||||
CVE-2021-3129 | Laravel | Ignition | 09/18/2023 | 0.94287 | 9.8 | https://viz.greynoise.io/tag/ignition-debug-rce-vuln-check||https://viz.greynoise.io/tag/ignition-debug-rce-vuln-check , https://viz.greynoise.io/tag/ignition-debug-rce-attempt||https://viz.greynoise.io/tag/ignition-debug-rce-attempt | 7 | TRUE | TRUE | FALSE | https://github.com/facade/ignition/releases/tag/2.5.2; https://nvd.nist.gov/vuln/detail/CVE-2021-3129 | https://vulncheck.com/xdb/ca8748e2b909||https://vulncheck.com/xdb/ca8748e2b909 , https://vulncheck.com/xdb/78b35be1dc24||https://vulncheck.com/xdb/78b35be1dc24 , https://vulncheck.com/xdb/3a52a9c9227f||https://vulncheck.com/xdb/3a52a9c9227f , https://vulncheck.com/xdb/76a6df778206||https://vulncheck.com/xdb/76a6df778206 , https://vulncheck.com/xdb/8773f8dc585a||https://vulncheck.com/xdb/8773f8dc585a , https://vulncheck.com/xdb/504b16c118c4||https://vulncheck.com/xdb/504b16c118c4 , https://vulncheck.com/xdb/f500f5c13d9c||https://vulncheck.com/xdb/f500f5c13d9c , https://vulncheck.com/xdb/633a39ff42e5||https://vulncheck.com/xdb/633a39ff42e5 , https://vulncheck.com/xdb/0f3a032cb75b||https://vulncheck.com/xdb/0f3a032cb75b , https://vulncheck.com/xdb/a310e9e90d01||https://vulncheck.com/xdb/a310e9e90d01 , https://vulncheck.com/xdb/47a1b3108a7c||https://vulncheck.com/xdb/47a1b3108a7c , https://vulncheck.com/xdb/d69431f93556||https://vulncheck.com/xdb/d69431f93556 , https://vulncheck.com/xdb/9a17d0a89e57||https://vulncheck.com/xdb/9a17d0a89e57 , https://vulncheck.com/xdb/3f630a9ea757||https://vulncheck.com/xdb/3f630a9ea757 , https://vulncheck.com/xdb/5f4cc8cb7fe8||https://vulncheck.com/xdb/5f4cc8cb7fe8 , https://vulncheck.com/xdb/d6fabfe71d88||https://vulncheck.com/xdb/d6fabfe71d88 , https://vulncheck.com/xdb/8168517a0701||https://vulncheck.com/xdb/8168517a0701 , https://vulncheck.com/xdb/d4c406d658a9||https://vulncheck.com/xdb/d4c406d658a9 , https://vulncheck.com/xdb/b58398140e57||https://vulncheck.com/xdb/b58398140e57 , https://vulncheck.com/xdb/686106caeaab||https://vulncheck.com/xdb/686106caeaab , https://vulncheck.com/xdb/570147c7cbc0||https://vulncheck.com/xdb/570147c7cbc0 , https://vulncheck.com/xdb/87edd3bbabdf||https://vulncheck.com/xdb/87edd3bbabdf , https://vulncheck.com/xdb/9612bcbc8150||https://vulncheck.com/xdb/9612bcbc8150 , https://vulncheck.com/xdb/fcb02bd261db||https://vulncheck.com/xdb/fcb02bd261db , https://vulncheck.com/xdb/067f7c923e08||https://vulncheck.com/xdb/067f7c923e08 , https://vulncheck.com/xdb/ef7d2df1ab88||https://vulncheck.com/xdb/ef7d2df1ab88 , https://vulncheck.com/xdb/35724c55fdc0||https://vulncheck.com/xdb/35724c55fdc0 , https://vulncheck.com/xdb/e9d83dcde53d||https://vulncheck.com/xdb/e9d83dcde53d | |
CVE-2022-31463 | Owl Labs | Meeting Owl | 09/18/2023 | 0.00147 | 8.2 | FALSE | FALSE | FALSE | This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update | ||||
CVE-2017-6884 | Zyxel | EMG2926 Routers | 09/18/2023 | 0.90748 | 8.8 | https://viz.greynoise.io/tag/zyxel-cve-2017-6884-rce-attempt||https://viz.greynoise.io/tag/zyxel-cve-2017-6884-rce-attempt | TRUE | TRUE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https://www.zyxelguard.com/Zyxel-EOL.asp; https://nvd.nist.gov/vuln/detail/CVE-2017-6884 | |||
CVE-2022-31462 | Owl Labs | Meeting Owl | 09/18/2023 | 0.00104 | 9.3 | FALSE | FALSE | FALSE | This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update | ||||
CVE-2023-26369 | Adobe | Acrobat and Reader | 09/14/2023 | 0.00430 | 7.8 | FALSE | FALSE | FALSE | https://helpx.adobe.com/security/products/acrobat/apsb23-34.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26369 | ||||
CVE-2023-4863 | Chromium WebP | 09/13/2023 | 0.93991 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2023-4863 | https://vulncheck.com/xdb/e14284c48cde||https://vulncheck.com/xdb/e14284c48cde , https://vulncheck.com/xdb/6ae5ac416de8||https://vulncheck.com/xdb/6ae5ac416de8 | ||||
CVE-2023-20269 | Cisco | Adaptive Security Appliance and Firepower Threat Defense | 09/13/2023 | 0.00282 | 5.0 | TRUE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC; https://nvd.nist.gov/vuln/detail/CVE-2023-20269 | ||||
CVE-2023-35674 | Android | Framework | 09/13/2023 | 0.00056 | 7.8 | FALSE | FALSE | FALSE | https://source.android.com/docs/security/bulletin/2023-09-01; https://nvd.nist.gov/vuln/detail/CVE-2023-35674 | ||||
CVE-2023-36802 | Microsoft | Streaming Service Proxy | 09/12/2023 | 0.72574 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802; https://nvd.nist.gov/vuln/detail/CVE-2023-36802 | https://vulncheck.com/xdb/79a67f937c90||https://vulncheck.com/xdb/79a67f937c90 , https://vulncheck.com/xdb/1d0208a3fc70||https://vulncheck.com/xdb/1d0208a3fc70 , https://vulncheck.com/xdb/14df2dd4eaa7||https://vulncheck.com/xdb/14df2dd4eaa7 , https://vulncheck.com/xdb/2dc4169fabc7||https://vulncheck.com/xdb/2dc4169fabc7 | |||
CVE-2023-36761 | Microsoft | Word | 09/12/2023 | 0.03710 | 6.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761; https://nvd.nist.gov/vuln/detail/CVE-2023-36761 | ||||
CVE-2023-41064 | Apple | iOS, iPadOS, and macOS | 09/11/2023 | 0.92560 | 7.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213905, https://support.apple.com/en-us/HT213906; https://nvd.nist.gov/vuln/detail/CVE-2023-41064 | https://vulncheck.com/xdb/7800a7854005||https://vulncheck.com/xdb/7800a7854005 , https://vulncheck.com/xdb/031f9a980a40||https://vulncheck.com/xdb/031f9a980a40 | |||
CVE-2023-41061 | Apple | iOS, iPadOS, and watchOS | 09/11/2023 | 0.04104 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213905, https://support.apple.com/kb/HT213907; https://nvd.nist.gov/vuln/detail/CVE-2023-41061 | ||||
CVE-2023-33246 | Apache | RocketMQ | 09/06/2023 | 0.94388 | 9.8 | https://viz.greynoise.io/tag/apache-rocketmq-rce-attempt||https://viz.greynoise.io/tag/apache-rocketmq-rce-attempt | 2 | FALSE | TRUE | FALSE | https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp; https://nvd.nist.gov/vuln/detail/CVE-2023-33246 | https://vulncheck.com/xdb/3068e2f9ef10||https://vulncheck.com/xdb/3068e2f9ef10 , https://vulncheck.com/xdb/d4697400457f||https://vulncheck.com/xdb/d4697400457f , https://vulncheck.com/xdb/6a010bfe0097||https://vulncheck.com/xdb/6a010bfe0097 , https://vulncheck.com/xdb/de034939c964||https://vulncheck.com/xdb/de034939c964 , https://vulncheck.com/xdb/b486dcf3f31d||https://vulncheck.com/xdb/b486dcf3f31d , https://vulncheck.com/xdb/cf4f1e593dfc||https://vulncheck.com/xdb/cf4f1e593dfc | |
CVE-2023-38831 | RARLAB | WinRAR | 08/24/2023 | 0.93630 | 7.8 | TRUE | TRUE | FALSE | http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa; https://nvd.nist.gov/vuln/detail/CVE-2023-38831 | https://vulncheck.com/xdb/6208ddae83ea||https://vulncheck.com/xdb/6208ddae83ea , https://vulncheck.com/xdb/961810ec007a||https://vulncheck.com/xdb/961810ec007a , https://vulncheck.com/xdb/d704a3a58e0d||https://vulncheck.com/xdb/d704a3a58e0d , https://vulncheck.com/xdb/ca38deed9702||https://vulncheck.com/xdb/ca38deed9702 , https://vulncheck.com/xdb/b966bed92174||https://vulncheck.com/xdb/b966bed92174 , https://vulncheck.com/xdb/7dcca41be653||https://vulncheck.com/xdb/7dcca41be653 , https://vulncheck.com/xdb/a75f196603f7||https://vulncheck.com/xdb/a75f196603f7 , https://vulncheck.com/xdb/19a60291e736||https://vulncheck.com/xdb/19a60291e736 , https://vulncheck.com/xdb/d05f5cb3bfb3||https://vulncheck.com/xdb/d05f5cb3bfb3 , https://vulncheck.com/xdb/2ca9a374acca||https://vulncheck.com/xdb/2ca9a374acca , https://vulncheck.com/xdb/79f7f6337617||https://vulncheck.com/xdb/79f7f6337617 , https://vulncheck.com/xdb/09fa7b37a7b1||https://vulncheck.com/xdb/09fa7b37a7b1 , https://vulncheck.com/xdb/e63676267c2b||https://vulncheck.com/xdb/e63676267c2b , https://vulncheck.com/xdb/e71319d3a28f||https://vulncheck.com/xdb/e71319d3a28f , https://vulncheck.com/xdb/d33335e6c044||https://vulncheck.com/xdb/d33335e6c044 , https://vulncheck.com/xdb/068a817a11af||https://vulncheck.com/xdb/068a817a11af , https://vulncheck.com/xdb/475dd98e97c6||https://vulncheck.com/xdb/475dd98e97c6 , https://vulncheck.com/xdb/96f0b49ccafb||https://vulncheck.com/xdb/96f0b49ccafb , https://vulncheck.com/xdb/11b438e8125e||https://vulncheck.com/xdb/11b438e8125e , https://vulncheck.com/xdb/0c5387964f92||https://vulncheck.com/xdb/0c5387964f92 , https://vulncheck.com/xdb/4902c64dcdcc||https://vulncheck.com/xdb/4902c64dcdcc , https://vulncheck.com/xdb/49b8da5dd1b3||https://vulncheck.com/xdb/49b8da5dd1b3 , https://vulncheck.com/xdb/43e31d83b0d2||https://vulncheck.com/xdb/43e31d83b0d2 , https://vulncheck.com/xdb/477e160f5f9e||https://vulncheck.com/xdb/477e160f5f9e , https://vulncheck.com/xdb/35f40b8462a2||https://vulncheck.com/xdb/35f40b8462a2 , https://vulncheck.com/xdb/6ddb49c0b30f||https://vulncheck.com/xdb/6ddb49c0b30f , https://vulncheck.com/xdb/ed6dc92dcb52||https://vulncheck.com/xdb/ed6dc92dcb52 , https://vulncheck.com/xdb/8e66511c03f9||https://vulncheck.com/xdb/8e66511c03f9 , https://vulncheck.com/xdb/78c5d047fc26||https://vulncheck.com/xdb/78c5d047fc26 , https://vulncheck.com/xdb/12c5984d5f98||https://vulncheck.com/xdb/12c5984d5f98 , https://vulncheck.com/xdb/13a6362b2a83||https://vulncheck.com/xdb/13a6362b2a83 , https://vulncheck.com/xdb/f3b016e52591||https://vulncheck.com/xdb/f3b016e52591 , https://vulncheck.com/xdb/d4284b00ae4f||https://vulncheck.com/xdb/d4284b00ae4f , https://vulncheck.com/xdb/0d73a5eda2f5||https://vulncheck.com/xdb/0d73a5eda2f5 , https://vulncheck.com/xdb/3e5e3d32361a||https://vulncheck.com/xdb/3e5e3d32361a | |||
CVE-2023-32315 | Ignite Realtime | Openfire | 08/24/2023 | 0.94439 | 8.6 | https://viz.greynoise.io/tag/openfire-path-traversal-attempt||https://viz.greynoise.io/tag/openfire-path-traversal-attempt | 0 | TRUE | TRUE | FALSE | https://www.igniterealtime.org/downloads/#openfire; https://nvd.nist.gov/vuln/detail/CVE-2023-32315 | https://vulncheck.com/xdb/b5629fbcb899||https://vulncheck.com/xdb/b5629fbcb899 , https://vulncheck.com/xdb/ce355fc71318||https://vulncheck.com/xdb/ce355fc71318 , https://vulncheck.com/xdb/ff8717c9e924||https://vulncheck.com/xdb/ff8717c9e924 , https://vulncheck.com/xdb/cb2e44728680||https://vulncheck.com/xdb/cb2e44728680 , https://vulncheck.com/xdb/f482f234a7ad||https://vulncheck.com/xdb/f482f234a7ad , https://vulncheck.com/xdb/8bc67e139e7f||https://vulncheck.com/xdb/8bc67e139e7f , https://vulncheck.com/xdb/780f73b8ce90||https://vulncheck.com/xdb/780f73b8ce90 , https://vulncheck.com/xdb/a5e7325d7024||https://vulncheck.com/xdb/a5e7325d7024 , https://vulncheck.com/xdb/ec0dcf4feee2||https://vulncheck.com/xdb/ec0dcf4feee2 , https://vulncheck.com/xdb/9b3c465efeb8||https://vulncheck.com/xdb/9b3c465efeb8 | |
CVE-2023-38035 | Ivanti | Sentry | 08/22/2023 | 0.94435 | 9.8 | https://viz.greynoise.io/tag/ivanti-mobileiron-sentry-auth-bypass-attempt||https://viz.greynoise.io/tag/ivanti-mobileiron-sentry-auth-bypass-attempt | 0 | TRUE | TRUE | FALSE | https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-38035 | https://vulncheck.com/xdb/fe81f7d04639||https://vulncheck.com/xdb/fe81f7d04639 , https://vulncheck.com/xdb/c3f8192d108d||https://vulncheck.com/xdb/c3f8192d108d , https://vulncheck.com/xdb/36d6ae60bcbf||https://vulncheck.com/xdb/36d6ae60bcbf | |
CVE-2023-27532 | Veeam | Backup & Replication | 08/22/2023 | 0.76645 | 7.5 | https://viz.greynoise.io/tag/veeam-backup-and-replication-credentials-retrieval-attempt||https://viz.greynoise.io/tag/veeam-backup-and-replication-credentials-retrieval-attempt | TRUE | TRUE | FALSE | https://www.veeam.com/kb4424; https://nvd.nist.gov/vuln/detail/CVE-2023-27532 | https://vulncheck.com/xdb/a0eedd90601f||https://vulncheck.com/xdb/a0eedd90601f , https://vulncheck.com/xdb/be7830da6e38||https://vulncheck.com/xdb/be7830da6e38 , https://vulncheck.com/xdb/70b9158e5d47||https://vulncheck.com/xdb/70b9158e5d47 | ||
CVE-2023-26359 | Adobe | ColdFusion | 08/21/2023 | 0.87826 | 9.8 | https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt | FALSE | FALSE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26359 | |||
CVE-2023-24489 | Citrix | Content Collaboration | 08/16/2023 | 0.94389 | 9.8 | https://viz.greynoise.io/tag/citrix-sharefile-rce-attempt||https://viz.greynoise.io/tag/citrix-sharefile-rce-attempt | 0 | TRUE | TRUE | FALSE | https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489; https://nvd.nist.gov/vuln/detail/CVE-2023-24489 | https://vulncheck.com/xdb/8475d791cb21||https://vulncheck.com/xdb/8475d791cb21 , https://vulncheck.com/xdb/4339d2e00b3e||https://vulncheck.com/xdb/4339d2e00b3e , https://vulncheck.com/xdb/7ccdbf38419f||https://vulncheck.com/xdb/7ccdbf38419f | |
CVE-2023-38180 | Microsoft | .NET Core and Visual Studio | 08/09/2023 | 0.00133 | 7.5 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-38180; https://nvd.nist.gov/vuln/detail/CVE-2023-38180 | ||||
CVE-2017-18368 | Zyxel | P660HN-T1A Routers | 08/07/2023 | 0.93738 | 9.8 | https://viz.greynoise.io/tag/zyxel-router-worm-attempt||https://viz.greynoise.io/tag/zyxel-router-worm-attempt | 12 | FALSE | TRUE | TRUE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-a-new-variant-of-gafgyt-malware; https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-p660hn-t1a-dsl-cpe; https://nvd.nist.gov/vuln/detail/CVE-2017-18368 | https://vulncheck.com/xdb/c2436c7a0a65 | |
CVE-2023-35081 | Ivanti | Endpoint Manager Mobile (EPMM) | 07/31/2023 | 0.93208 | 7.2 | 3 | FALSE | FALSE | FALSE | https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35081 | |||
CVE-2023-37580 | Synacor | Zimbra Collaboration Suite (ZCS) | 07/27/2023 | 0.93864 | 6.1 | FALSE | FALSE | FALSE | https://wiki.zimbra.com/wiki/Security_Center ; https://nvd.nist.gov/vuln/detail/CVE-2023-37580 | ||||
CVE-2023-38606 | Apple | Multiple Products | 07/26/2023 | 0.00170 | 5.5 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213843,https://support.apple.com/en-us/HT213844,https://support.apple.com/en-us/HT213845,https://support.apple.com/en-us/HT213846,https://support.apple.com/en-us/HT213848 ; https://nvd.nist.gov/vuln/detail/CVE-2023-38606 | ||||
CVE-2023-35078 | Ivanti | Endpoint Manager Mobile (EPMM) | 07/25/2023 | 0.94485 | 10.0 | https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt||https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt | 5 | TRUE | TRUE | FALSE | https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35078 | https://vulncheck.com/xdb/a192b5ef44a0||https://vulncheck.com/xdb/a192b5ef44a0 , https://vulncheck.com/xdb/12c05897b78d||https://vulncheck.com/xdb/12c05897b78d , https://vulncheck.com/xdb/3b672a96ad67||https://vulncheck.com/xdb/3b672a96ad67 , https://vulncheck.com/xdb/e1a88c6220da||https://vulncheck.com/xdb/e1a88c6220da , https://vulncheck.com/xdb/f6d6db77b679||https://vulncheck.com/xdb/f6d6db77b679 | |
CVE-2023-38205 | Adobe | ColdFusion | 07/20/2023 | 0.94298 | 7.5 | https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38205-security-feature-bypass-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38205-security-feature-bypass-attempt | 1 | FALSE | FALSE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38205 | ||
CVE-2023-29298 | Adobe | ColdFusion | 07/20/2023 | 0.94310 | 7.5 | https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29298-access-control-bypass-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29298-access-control-bypass-attempt | 1 | FALSE | FALSE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29298 | ||
CVE-2023-3519 | Citrix | NetScaler ADC and NetScaler Gateway | 07/19/2023 | 0.92260 | 9.8 | https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-3519-rce-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-3519-rce-attempt | 0 | TRUE | TRUE | FALSE | https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467; https://nvd.nist.gov/vuln/detail/CVE-2023-3519 | https://vulncheck.com/xdb/2c8a25fd6e83||https://vulncheck.com/xdb/2c8a25fd6e83 , https://vulncheck.com/xdb/8bdcf32f9f84||https://vulncheck.com/xdb/8bdcf32f9f84 , https://vulncheck.com/xdb/1ff61bc7f252||https://vulncheck.com/xdb/1ff61bc7f252 , https://vulncheck.com/xdb/1f43ba642b00||https://vulncheck.com/xdb/1f43ba642b00 , https://vulncheck.com/xdb/1dceea81abe0||https://vulncheck.com/xdb/1dceea81abe0 , https://vulncheck.com/xdb/a40d42ae400a||https://vulncheck.com/xdb/a40d42ae400a , https://vulncheck.com/xdb/d8dc36e352eb||https://vulncheck.com/xdb/d8dc36e352eb , https://vulncheck.com/xdb/9e9c040fa62e||https://vulncheck.com/xdb/9e9c040fa62e | |
CVE-2023-36884 | Microsoft | Windows | 07/17/2023 | 0.93099 | 7.5 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884; https://nvd.nist.gov/vuln/detail/CVE-2023-36884 | https://vulncheck.com/xdb/ca6e5038ebdc | |||
CVE-2022-29303 | SolarView | Compact | 07/13/2023 | 0.94368 | 9.8 | https://viz.greynoise.io/tag/solarview-compact-6-rce-attempt||https://viz.greynoise.io/tag/solarview-compact-6-rce-attempt | 3 | FALSE | TRUE | TRUE | https://jvn.jp/en/vu/JVNVU92327282/; https://nvd.nist.gov/vuln/detail/CVE-2022-29303 | ||
CVE-2023-37450 | Apple | Multiple Products | 07/13/2023 | 0.00014 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213826, https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213843, https://support.apple.com/en-us/HT213846, https://support.apple.com/en-us/HT213848; https://nvd.nist.gov/vuln/detail/CVE-2023-37450 | ||||
CVE-2023-32046 | Microsoft | Windows | 07/11/2023 | 0.81240 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32046; https://nvd.nist.gov/vuln/detail/CVE-2023-32046 | ||||
CVE-2022-31199 | Netwrix | Auditor | 07/11/2023 | 0.06288 | 9.8 | https://viz.greynoise.io/tag/netwrix-auditor-user-activity-video-recording-rce-cve-2022-31199-attempt||https://viz.greynoise.io/tag/netwrix-auditor-user-activity-video-recording-rce-cve-2022-31199-attempt | TRUE | FALSE | FALSE | Patch application requires login to customer portal: https://security.netwrix.com/Account/SignIn?ReturnUrl=%2FAdvisories%2FADV-2022-003; https://nvd.nist.gov/vuln/detail/CVE-2022-31199 | |||
CVE-2023-35311 | Microsoft | Outlook | 07/11/2023 | 0.01272 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35311; https://nvd.nist.gov/vuln/detail/CVE-2023-35311 | ||||
CVE-2023-36874 | Microsoft | Windows | 07/11/2023 | 0.52563 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36874; https://nvd.nist.gov/vuln/detail/CVE-2023-36874 | https://vulncheck.com/xdb/280c2ac034a6||https://vulncheck.com/xdb/280c2ac034a6 , https://vulncheck.com/xdb/6218c1637bc9||https://vulncheck.com/xdb/6218c1637bc9 , https://vulncheck.com/xdb/87527a477737||https://vulncheck.com/xdb/87527a477737 , https://vulncheck.com/xdb/e688302f0377||https://vulncheck.com/xdb/e688302f0377 | |||
CVE-2023-32049 | Microsoft | Windows | 07/11/2023 | 0.11774 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32049; https://nvd.nist.gov/vuln/detail/CVE-2023-32049 | ||||
CVE-2021-29256 | Arm | Mali Graphics Processing Unit (GPU) | 07/07/2023 | 0.00965 | 8.8 | FALSE | FALSE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2021-29256 | ||||
CVE-2021-25394 | Samsung | Mobile Devices | 06/29/2023 | 0.00927 | 6.4 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5; https://nvd.nist.gov/vuln/detail/CVE-2021-25394 | ||||
CVE-2021-25487 | Samsung | Mobile Devices | 06/29/2023 | 0.00926 | 7.3 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10; https://nvd.nist.gov/vuln/detail/CVE-2021-25487 | ||||
CVE-2019-20500 | D-Link | DWL-2600AP Access Point | 06/29/2023 | 0.93662 | 7.8 | https://viz.greynoise.io/tag/d-link-dwl-2600ap-rce-attempt||https://viz.greynoise.io/tag/d-link-dwl-2600ap-rce-attempt | FALSE | TRUE | FALSE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113; https://nvd.nist.gov/vuln/detail/CVE-2019-20500 | |||
CVE-2021-25372 | Samsung | Mobile Devices | 06/29/2023 | 0.01872 | 6.1 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=3; https://nvd.nist.gov/vuln/detail/CVE-2021-25372 | ||||
CVE-2021-25489 | Samsung | Mobile Devices | 06/29/2023 | 0.00289 | 3.3 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10; https://nvd.nist.gov/vuln/detail/CVE-2021-25489 | ||||
CVE-2021-25371 | Samsung | Mobile Devices | 06/29/2023 | 0.02521 | 6.1 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=3; https://nvd.nist.gov/vuln/detail/CVE-2021-25371 | ||||
CVE-2019-17621 | D-Link | DIR-859 Router | 06/29/2023 | 0.93194 | 9.8 | https://viz.greynoise.io/tag/d-link-dir-859-gena-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-859-gena-rce-attempt | 0 | FALSE | TRUE | TRUE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147; https://nvd.nist.gov/vuln/detail/CVE-2019-17621 | https://vulncheck.com/xdb/84b463cab7cd | |
CVE-2021-25395 | Samsung | Mobile Devices | 06/29/2023 | 0.00203 | 6.4 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5; https://nvd.nist.gov/vuln/detail/CVE-2021-25395 | ||||
CVE-2023-32435 | Apple | Multiple Products | 06/23/2023 | 0.00888 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213670, https://support.apple.com/en-us/HT213671, https://support.apple.com/en-us/HT213676, https://support.apple.com/en-us/HT213811; https://nvd.nist.gov/vuln/detail/CVE-2023-32435 | ||||
CVE-2023-32439 | Apple | Multiple Products | 06/23/2023 | 0.00386 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213813, https://support.apple.com/en-us/HT213811, https://support.apple.com/en-us/HT213814, https://support.apple.com/en-us/HT213816; https://nvd.nist.gov/vuln/detail/CVE-2023-32439 | ||||
CVE-2023-32434 | Apple | Multiple Products | 06/23/2023 | 0.84022 | 7.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213808, https://support.apple.com/en-us/HT213812, https://support.apple.com/en-us/HT213809, https://support.apple.com/en-us/HT213810, https://support.apple.com/en-us/HT213813, https://support.apple.com/en-us/HT213811, https://support.apple.com/en-us/HT213814; https://nvd.nist.gov/vuln/detail/CVE-2023-32434 | https://vulncheck.com/xdb/57fa976907c4 | |||
CVE-2023-20867 | VMware | Tools | 06/23/2023 | 0.00514 | 3.9 | TRUE | FALSE | FALSE | https://www.vmware.com/security/advisories/VMSA-2023-0013.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20867 | ||||
CVE-2023-27992 | Zyxel | Multiple Network-Attached Storage (NAS) Devices | 06/23/2023 | 0.88459 | 9.8 | https://viz.greynoise.io/tag/zyxel-nas-rce-cve-2023-27992-attempt||https://viz.greynoise.io/tag/zyxel-nas-rce-cve-2023-27992-attempt | 0 | FALSE | FALSE | TRUE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-pre-authentication-command-injection-vulnerability-in-nas-products; https://nvd.nist.gov/vuln/detail/CVE-2023-27992 | ||
CVE-2016-9079 | Mozilla | Firefox, Firefox ESR, and Thunderbird | 06/22/2023 | 0.84964 | 7.5 | FALSE | TRUE | FALSE | https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/#CVE-2016-9079; https://nvd.nist.gov/vuln/detail/CVE-2016-9079 | https://vulncheck.com/xdb/9171867a941e||https://vulncheck.com/xdb/9171867a941e , https://vulncheck.com/xdb/ea2825280c25||https://vulncheck.com/xdb/ea2825280c25 , https://vulncheck.com/xdb/f7a2358079b0||https://vulncheck.com/xdb/f7a2358079b0 | |||
CVE-2023-20887 | VMware | Aria Operations for Networks | 06/22/2023 | 0.94389 | 9.8 | https://viz.greynoise.io/tag/vmware-aria-operations-for-networks-rce-attempt||https://viz.greynoise.io/tag/vmware-aria-operations-for-networks-rce-attempt | 2 | FALSE | TRUE | FALSE | https://www.vmware.com/security/advisories/VMSA-2023-0012.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20887 | https://vulncheck.com/xdb/ed2571767837||https://vulncheck.com/xdb/ed2571767837 , https://vulncheck.com/xdb/8d653e739f78||https://vulncheck.com/xdb/8d653e739f78 , https://vulncheck.com/xdb/c3a61a4c0873||https://vulncheck.com/xdb/c3a61a4c0873 | |
CVE-2016-0165 | Microsoft | Win32k | 06/22/2023 | 0.11623 | 7.8 | FALSE | TRUE | FALSE | https://learn.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039; https://nvd.nist.gov/vuln/detail/CVE-2016-0165 | ||||
CVE-2021-44026 | Roundcube | Roundcube Webmail | 06/22/2023 | 0.71497 | 9.8 | FALSE | TRUE | FALSE | https://roundcube.net/news/2021/11/12/security-updates-1.4.12-and-1.3.17-released; https://nvd.nist.gov/vuln/detail/CVE-2021-44026 | https://vulncheck.com/xdb/c472c99d6420||https://vulncheck.com/xdb/c472c99d6420 , https://vulncheck.com/xdb/810f8d092dd5||https://vulncheck.com/xdb/810f8d092dd5 | |||
CVE-2020-35730 | Roundcube | Roundcube Webmail | 06/22/2023 | 0.73952 | 6.1 | FALSE | TRUE | FALSE | https://roundcube.net/news/2020/12/27/security-updates-1.4.10-1.3.16-and-1.2.13; https://nvd.nist.gov/vuln/detail/CVE-2020-35730 | https://vulncheck.com/xdb/bc7c78af2f10 | |||
CVE-2020-12641 | Roundcube | Roundcube Webmail | 06/22/2023 | 0.93688 | 9.8 | https://viz.greynoise.io/tag/roundcube-webmail-rce-attempt||https://viz.greynoise.io/tag/roundcube-webmail-rce-attempt | FALSE | FALSE | FALSE | https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10; https://nvd.nist.gov/vuln/detail/CVE-2020-12641 | |||
CVE-2023-27997 | Fortinet | FortiOS and FortiProxy SSL-VPN | 06/13/2023 | 0.90471 | 9.8 | https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-cve-2023-27997-attempt||https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-cve-2023-27997-attempt | TRUE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-23-097; https://nvd.nist.gov/vuln/detail/CVE-2023-27997 | https://vulncheck.com/xdb/c21297b5f565||https://vulncheck.com/xdb/c21297b5f565 , https://vulncheck.com/xdb/ad5db6a3b215||https://vulncheck.com/xdb/ad5db6a3b215 , https://vulncheck.com/xdb/2d8501b18677||https://vulncheck.com/xdb/2d8501b18677 , https://vulncheck.com/xdb/58ad1cabba09||https://vulncheck.com/xdb/58ad1cabba09 , https://vulncheck.com/xdb/261997d3bd2f||https://vulncheck.com/xdb/261997d3bd2f , https://vulncheck.com/xdb/7257b7541300||https://vulncheck.com/xdb/7257b7541300 , https://vulncheck.com/xdb/c42e440bbfba||https://vulncheck.com/xdb/c42e440bbfba , https://vulncheck.com/xdb/a4ee616f0f8d||https://vulncheck.com/xdb/a4ee616f0f8d | ||
CVE-2023-3079 | Chromium V8 | 06/07/2023 | 0.00612 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-3079 | https://vulncheck.com/xdb/3c2b1c7c45b7 | ||||
CVE-2023-33010 | Zyxel | Multiple Firewalls | 06/05/2023 | 0.07196 | 9.8 | FALSE | FALSE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33010 | ||||
CVE-2023-33009 | Zyxel | Multiple Firewalls | 06/05/2023 | 0.04637 | 9.8 | FALSE | FALSE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33009 | ||||
CVE-2023-34362 | Progress | MOVEit Transfer | 06/02/2023 | 0.94485 | 9.8 | https://viz.greynoise.io/tag/moveit-transfer-scanner||https://viz.greynoise.io/tag/moveit-transfer-scanner , https://viz.greynoise.io/tag/moveit-sql-injection-attempt||https://viz.greynoise.io/tag/moveit-sql-injection-attempt , https://viz.greynoise.io/tag/moveit-csrf-spoof-attempt||https://viz.greynoise.io/tag/moveit-csrf-spoof-attempt , https://viz.greynoise.io/tag/moveit-cve-2023-34362-attempt||https://viz.greynoise.io/tag/moveit-cve-2023-34362-attempt | 0 | TRUE | TRUE | FALSE | This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023.; https://nvd.nist.gov/vuln/detail/CVE-2023-34362 | https://vulncheck.com/xdb/cf79e9f8e1ec||https://vulncheck.com/xdb/cf79e9f8e1ec , https://vulncheck.com/xdb/11c34e25ffba||https://vulncheck.com/xdb/11c34e25ffba , https://vulncheck.com/xdb/0fae161dfedc||https://vulncheck.com/xdb/0fae161dfedc , https://vulncheck.com/xdb/5b8de9df4561||https://vulncheck.com/xdb/5b8de9df4561 , https://vulncheck.com/xdb/cd4489a09748||https://vulncheck.com/xdb/cd4489a09748 | |
CVE-2023-28771 | Zyxel | Multiple Firewalls | 05/31/2023 | 0.94350 | 9.8 | https://viz.greynoise.io/tag/zyxel-ike-server-rce-cve-2023-28771-attempt||https://viz.greynoise.io/tag/zyxel-ike-server-rce-cve-2023-28771-attempt | 8 | FALSE | TRUE | FALSE | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-28771 | ||
CVE-2023-2868 | Barracuda Networks | Email Security Gateway (ESG) Appliance | 05/26/2023 | 0.90104 | 9.4 | FALSE | TRUE | FALSE | https://status.barracuda.com/incidents/34kx82j5n4q9; https://nvd.nist.gov/vuln/detail/CVE-2023-2868 | https://vulncheck.com/xdb/eb964d29bc36 | |||
CVE-2023-28204 | Apple | Multiple Products | 05/22/2023 | 0.00042 | 6.5 | FALSE | FALSE | FALSE | https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-28204 | ||||
CVE-2023-32373 | Apple | Multiple Products | 05/22/2023 | 0.00014 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-32373 | ||||
CVE-2023-32409 | Apple | Multiple Products | 05/22/2023 | 0.00354 | 8.6 | FALSE | FALSE | FALSE | https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-32409 | ||||
CVE-2004-1464 | Cisco | IOS | 05/19/2023 | 0.01257 | 5.9 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464 | ||||
CVE-2023-21492 | Samsung | Mobile Devices | 05/19/2023 | 0.00494 | 4.4 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2023-21492 | ||||
CVE-2016-6415 | Cisco | IOS, IOS XR, and IOS XE | 05/19/2023 | 0.92948 | 7.5 | FALSE | TRUE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1; https://nvd.nist.gov/vuln/detail/CVE-2016-6415 | https://vulncheck.com/xdb/e720a3447e7a||https://vulncheck.com/xdb/e720a3447e7a , https://vulncheck.com/xdb/196b3cc71710||https://vulncheck.com/xdb/196b3cc71710 | |||
CVE-2016-8735 | Apache | Tomcat | 05/12/2023 | 0.94096 | 9.8 | FALSE | FALSE | FALSE | https://tomcat.apache.org/security-9.html; https://nvd.nist.gov/vuln/detail/CVE-2016-8735 | ||||
CVE-2016-3427 | Oracle | Java SE and JRockit | 05/12/2023 | 0.93934 | 9.8 | FALSE | FALSE | FALSE | https://www.oracle.com/security-alerts/cpuapr2016v3.html; https://nvd.nist.gov/vuln/detail/CVE-2016-3427 | ||||
CVE-2021-3560 | Red Hat | Polkit | 05/12/2023 | 0.05351 | 7.8 | FALSE | TRUE | FALSE | https://bugzilla.redhat.com/show_bug.cgi?id=1961710; https://nvd.nist.gov/vuln/detail/CVE-2021-3560 | https://vulncheck.com/xdb/5458d4a55c6f||https://vulncheck.com/xdb/5458d4a55c6f , https://vulncheck.com/xdb/201ca3f02f33||https://vulncheck.com/xdb/201ca3f02f33 , https://vulncheck.com/xdb/635680273494||https://vulncheck.com/xdb/635680273494 , https://vulncheck.com/xdb/f006252e1faa||https://vulncheck.com/xdb/f006252e1faa , https://vulncheck.com/xdb/e55338406838||https://vulncheck.com/xdb/e55338406838 , https://vulncheck.com/xdb/4c9042d8ae10||https://vulncheck.com/xdb/4c9042d8ae10 , https://vulncheck.com/xdb/b9083d54f435||https://vulncheck.com/xdb/b9083d54f435 , https://vulncheck.com/xdb/eb01bdf5882c||https://vulncheck.com/xdb/eb01bdf5882c , https://vulncheck.com/xdb/fe5ce90a026f||https://vulncheck.com/xdb/fe5ce90a026f , https://vulncheck.com/xdb/1a9fd1b14178||https://vulncheck.com/xdb/1a9fd1b14178 , https://vulncheck.com/xdb/b9903bce0f77||https://vulncheck.com/xdb/b9903bce0f77 , https://vulncheck.com/xdb/d89126ce6bd4||https://vulncheck.com/xdb/d89126ce6bd4 , https://vulncheck.com/xdb/cd90ec71f715||https://vulncheck.com/xdb/cd90ec71f715 , https://vulncheck.com/xdb/25e4e99ad519||https://vulncheck.com/xdb/25e4e99ad519 , https://vulncheck.com/xdb/ab99d39a10ae||https://vulncheck.com/xdb/ab99d39a10ae , https://vulncheck.com/xdb/3c3962d97923||https://vulncheck.com/xdb/3c3962d97923 , https://vulncheck.com/xdb/bed1611a3e31||https://vulncheck.com/xdb/bed1611a3e31 , https://vulncheck.com/xdb/0d4f1d0b0a97||https://vulncheck.com/xdb/0d4f1d0b0a97 , https://vulncheck.com/xdb/9e693b05320b||https://vulncheck.com/xdb/9e693b05320b , https://vulncheck.com/xdb/dd1aeadeb04f||https://vulncheck.com/xdb/dd1aeadeb04f , https://vulncheck.com/xdb/e4e946e08867||https://vulncheck.com/xdb/e4e946e08867 , https://vulncheck.com/xdb/d61c55d40a53||https://vulncheck.com/xdb/d61c55d40a53 | |||
CVE-2014-0196 | Linux | Kernel | 05/12/2023 | 0.60264 | 5.5 | FALSE | TRUE | FALSE | https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196 | https://vulncheck.com/xdb/dc9022508ef9||https://vulncheck.com/xdb/dc9022508ef9 , https://vulncheck.com/xdb/cd9f2a0f1fca||https://vulncheck.com/xdb/cd9f2a0f1fca | |||
CVE-2015-5317 | Jenkins | Jenkins User Interface (UI) | 05/12/2023 | 0.28615 | 7.5 | FALSE | FALSE | FALSE | https://www.jenkins.io/security/advisory/2015-11-11/; https://nvd.nist.gov/vuln/detail/CVE-2015-5317 | ||||
CVE-2010-3904 | Linux | Kernel | 05/12/2023 | 0.02116 | 7.8 | FALSE | TRUE | FALSE | https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904 | https://vulncheck.com/xdb/5cf258448d69 | |||
CVE-2023-25717 | Ruckus Wireless | Multiple Products | 05/12/2023 | 0.94354 | 9.8 | https://viz.greynoise.io/tag/ruckus-wireless-admin-rce-attempt||https://viz.greynoise.io/tag/ruckus-wireless-admin-rce-attempt | 0 | FALSE | FALSE | TRUE | https://support.ruckuswireless.com/security_bulletins/315; https://nvd.nist.gov/vuln/detail/CVE-2023-25717 | ||
CVE-2023-29336 | Microsoft | Win32k | 05/09/2023 | 0.74584 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29336; https://nvd.nist.gov/vuln/detail/CVE-2023-29336 | https://vulncheck.com/xdb/79154f41d6e7||https://vulncheck.com/xdb/79154f41d6e7 , https://vulncheck.com/xdb/3661f8004753||https://vulncheck.com/xdb/3661f8004753 | |||
CVE-2023-21839 | Oracle | WebLogic Server | 05/01/2023 | 0.93259 | 7.5 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2023-21839-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2023-21839-rce-attempt | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpujan2023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21839 | https://vulncheck.com/xdb/996186ddaca6||https://vulncheck.com/xdb/996186ddaca6 , https://vulncheck.com/xdb/592e612813ca||https://vulncheck.com/xdb/592e612813ca , https://vulncheck.com/xdb/da2508c4c86e||https://vulncheck.com/xdb/da2508c4c86e , https://vulncheck.com/xdb/cd2f75e7d0eb||https://vulncheck.com/xdb/cd2f75e7d0eb | ||
CVE-2021-45046 | Apache | Log4j2 | 05/01/2023 | 0.94340 | 9.0 | https://viz.greynoise.io/tag/apache-log4j-rce-attempt||https://viz.greynoise.io/tag/apache-log4j-rce-attempt | TRUE | TRUE | FALSE | https://logging.apache.org/log4j/2.x/security.html; https://nvd.nist.gov/vuln/detail/CVE-2021-45046 | https://vulncheck.com/xdb/be66907d213a||https://vulncheck.com/xdb/be66907d213a , https://vulncheck.com/xdb/0c7bc7dc64b4||https://vulncheck.com/xdb/0c7bc7dc64b4 | ||
CVE-2023-1389 | TP-Link | Archer AX21 | 05/01/2023 | 0.93893 | 8.8 | https://viz.greynoise.io/tag/tplink-archer-ax21-cij-scan||https://viz.greynoise.io/tag/tplink-archer-ax21-cij-scan | 4 | FALSE | TRUE | TRUE | https://www.tp-link.com/us/support/download/archer-ax21/v3/#Firmware; https://nvd.nist.gov/vuln/detail/CVE-2023-1389 | https://vulncheck.com/xdb/ab6c386fe91a||https://vulncheck.com/xdb/ab6c386fe91a , https://vulncheck.com/xdb/62ee86041daf||https://vulncheck.com/xdb/62ee86041daf , https://vulncheck.com/xdb/de122ba820a3||https://vulncheck.com/xdb/de122ba820a3 | |
CVE-2023-2136 | Chromium Skia | 04/21/2023 | 0.00289 | 9.6 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2136 | |||||
CVE-2023-28432 | MinIO | MinIO | 04/21/2023 | 0.93860 | 7.5 | https://viz.greynoise.io/tag/minio-information-disclosure-attempt||https://viz.greynoise.io/tag/minio-information-disclosure-attempt | 1 | FALSE | TRUE | FALSE | https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q; https://nvd.nist.gov/vuln/detail/CVE-2023-28432 | https://vulncheck.com/xdb/b5a191fe1548||https://vulncheck.com/xdb/b5a191fe1548 , https://vulncheck.com/xdb/2f2181c8c371||https://vulncheck.com/xdb/2f2181c8c371 , https://vulncheck.com/xdb/265e34c2d00b||https://vulncheck.com/xdb/265e34c2d00b , https://vulncheck.com/xdb/135cba389f2d||https://vulncheck.com/xdb/135cba389f2d , https://vulncheck.com/xdb/88c33874c8a8||https://vulncheck.com/xdb/88c33874c8a8 , https://vulncheck.com/xdb/8a90a12dbb9d||https://vulncheck.com/xdb/8a90a12dbb9d , https://vulncheck.com/xdb/b03d61e273cd||https://vulncheck.com/xdb/b03d61e273cd , https://vulncheck.com/xdb/b297acbd5c68||https://vulncheck.com/xdb/b297acbd5c68 , https://vulncheck.com/xdb/2bce5ce3653d||https://vulncheck.com/xdb/2bce5ce3653d , https://vulncheck.com/xdb/c098a3a1e4d1||https://vulncheck.com/xdb/c098a3a1e4d1 , https://vulncheck.com/xdb/3fa0cfa7912a||https://vulncheck.com/xdb/3fa0cfa7912a , https://vulncheck.com/xdb/ddf25a501579||https://vulncheck.com/xdb/ddf25a501579 , https://vulncheck.com/xdb/362042b30e53||https://vulncheck.com/xdb/362042b30e53 , https://vulncheck.com/xdb/ce019ea1d113||https://vulncheck.com/xdb/ce019ea1d113 , https://vulncheck.com/xdb/f8d3bffd0b5f||https://vulncheck.com/xdb/f8d3bffd0b5f | |
CVE-2023-27350 | PaperCut | MF/NG | 04/21/2023 | 0.94257 | 9.8 | https://viz.greynoise.io/tag/papercut-rce-attempt||https://viz.greynoise.io/tag/papercut-rce-attempt , https://viz.greynoise.io/tag/papercut-authentication-bypass-check||https://viz.greynoise.io/tag/papercut-authentication-bypass-check | 2 | TRUE | TRUE | FALSE | https://www.papercut.com/kb/Main/PO-1216-and-PO-1219; https://nvd.nist.gov/vuln/detail/CVE-2023-27350 | https://vulncheck.com/xdb/1c0718580d28||https://vulncheck.com/xdb/1c0718580d28 , https://vulncheck.com/xdb/bd68c4a2099b||https://vulncheck.com/xdb/bd68c4a2099b , https://vulncheck.com/xdb/40e9921e9645||https://vulncheck.com/xdb/40e9921e9645 , https://vulncheck.com/xdb/5436303f61fa||https://vulncheck.com/xdb/5436303f61fa , https://vulncheck.com/xdb/c6701956d915||https://vulncheck.com/xdb/c6701956d915 , https://vulncheck.com/xdb/26313d6db3f2||https://vulncheck.com/xdb/26313d6db3f2 , https://vulncheck.com/xdb/e218f81318d4||https://vulncheck.com/xdb/e218f81318d4 | |
CVE-2017-6742 | Cisco | IOS and IOS XE Software | 04/19/2023 | 0.05565 | 8.8 | FALSE | FALSE | FALSE | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742 | ||||
CVE-2019-8526 | Apple | macOS | 04/17/2023 | 0.00349 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT209600; https://nvd.nist.gov/vuln/detail/CVE-2019-8526 | ||||
CVE-2023-2033 | Chromium V8 | 04/17/2023 | 0.05697 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2033 | https://vulncheck.com/xdb/d26f2d5a3b34||https://vulncheck.com/xdb/d26f2d5a3b34 , https://vulncheck.com/xdb/c1a7e545bc7d||https://vulncheck.com/xdb/c1a7e545bc7d | ||||
CVE-2023-20963 | Android | Framework | 04/13/2023 | 0.03721 | 7.8 | FALSE | TRUE | FALSE | https://source.android.com/docs/security/bulletin/2023-03-01; https://nvd.nist.gov/vuln/detail/CVE-2023-20963 | https://vulncheck.com/xdb/b65e107ed569||https://vulncheck.com/xdb/b65e107ed569 , https://vulncheck.com/xdb/ab7e394561a2||https://vulncheck.com/xdb/ab7e394561a2 | |||
CVE-2023-29492 | Novi Survey | Novi Survey | 04/13/2023 | 0.25529 | 9.8 | FALSE | FALSE | FALSE | https://novisurvey.net/blog/novi-survey-security-advisory-apr-2023.aspx; https://nvd.nist.gov/vuln/detail/CVE-2023-29492 | ||||
CVE-2023-28252 | Microsoft | Windows | 04/11/2023 | 0.52956 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252; https://nvd.nist.gov/vuln/detail/CVE-2023-28252 | https://vulncheck.com/xdb/18c023678d14||https://vulncheck.com/xdb/18c023678d14 , https://vulncheck.com/xdb/6f57704a8749||https://vulncheck.com/xdb/6f57704a8749 , https://vulncheck.com/xdb/98d4738b82f7||https://vulncheck.com/xdb/98d4738b82f7 , https://vulncheck.com/xdb/c433f2e8bd59||https://vulncheck.com/xdb/c433f2e8bd59 | |||
CVE-2023-28206 | Apple | iOS, iPadOS, and macOS | 04/10/2023 | 0.23339 | 8.6 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213720, https://support.apple.com/en-us/HT213721; https://nvd.nist.gov/vuln/detail/CVE-2023-28206 | https://vulncheck.com/xdb/431fb00495f9 | |||
CVE-2023-28205 | Apple | Multiple Products | 04/10/2023 | 0.00120 | 8.8 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT213720,https://support.apple.com/en-us/HT213721,https://support.apple.com/en-us/HT213722,https://support.apple.com/en-us/HT213723; https://nvd.nist.gov/vuln/detail/CVE-2023-28205 | https://vulncheck.com/xdb/9a944fb94c97 | |||
CVE-2021-27877 | Veritas | Backup Exec Agent | 04/07/2023 | 0.00970 | 8.2 | TRUE | TRUE | FALSE | https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27877 | ||||
CVE-2019-1388 | Microsoft | Windows | 04/07/2023 | 0.03381 | 7.8 | TRUE | TRUE | FALSE | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1388; https://nvd.nist.gov/vuln/detail/CVE-2019-1388 | https://vulncheck.com/xdb/ffc4f0f49488 | |||
CVE-2021-27878 | Veritas | Backup Exec Agent | 04/07/2023 | 0.00976 | 8.8 | TRUE | TRUE | FALSE | https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27878 | ||||
CVE-2023-26083 | Arm | Mali Graphics Processing Unit (GPU) | 04/07/2023 | 0.00466 | 3.3 | FALSE | FALSE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-26083 | ||||
CVE-2021-27876 | Veritas | Backup Exec Agent | 04/07/2023 | 0.00640 | 8.1 | TRUE | TRUE | FALSE | https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27876 | ||||
CVE-2022-27926 | Synacor | Zimbra Collaboration Suite (ZCS) | 04/03/2023 | 0.94239 | 6.1 | https://viz.greynoise.io/tag/zimbra-collaboration-suite-rxss||https://viz.greynoise.io/tag/zimbra-collaboration-suite-rxss | FALSE | FALSE | FALSE | https://wiki.zimbra.com/wiki/Security_Center; https://nvd.nist.gov/vuln/detail/CVE-2022-27926 | |||
CVE-2022-38181 | Arm | Mali Graphics Processing Unit (GPU) | 03/30/2023 | 0.20978 | 8.8 | FALSE | TRUE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2022-38181 | https://vulncheck.com/xdb/0ea5523595cc||https://vulncheck.com/xdb/0ea5523595cc , https://vulncheck.com/xdb/36b7eb9b6e72||https://vulncheck.com/xdb/36b7eb9b6e72 , https://vulncheck.com/xdb/3d6d1c7d139e||https://vulncheck.com/xdb/3d6d1c7d139e | |||
CVE-2017-7494 | Samba | Samba | 03/30/2023 | 0.94300 | 9.8 | TRUE | TRUE | FALSE | https://www.samba.org/samba/security/CVE-2017-7494.html; https://nvd.nist.gov/vuln/detail/CVE-2017-7494 | https://vulncheck.com/xdb/874bfa3f41cc||https://vulncheck.com/xdb/874bfa3f41cc , https://vulncheck.com/xdb/e6971e9715d0||https://vulncheck.com/xdb/e6971e9715d0 , https://vulncheck.com/xdb/6b2fdeea9b0e||https://vulncheck.com/xdb/6b2fdeea9b0e , https://vulncheck.com/xdb/6095b3679d4f||https://vulncheck.com/xdb/6095b3679d4f , https://vulncheck.com/xdb/57e3c5583e71||https://vulncheck.com/xdb/57e3c5583e71 , https://vulncheck.com/xdb/b4a79e992993||https://vulncheck.com/xdb/b4a79e992993 , https://vulncheck.com/xdb/d60f0bdd37ca||https://vulncheck.com/xdb/d60f0bdd37ca , https://vulncheck.com/xdb/5febf3930e17||https://vulncheck.com/xdb/5febf3930e17 , https://vulncheck.com/xdb/0e1687dfba66||https://vulncheck.com/xdb/0e1687dfba66 , https://vulncheck.com/xdb/5192c6b266c3||https://vulncheck.com/xdb/5192c6b266c3 , https://vulncheck.com/xdb/03f724914e5d||https://vulncheck.com/xdb/03f724914e5d | |||
CVE-2022-22706 | Arm | Mali Graphics Processing Unit (GPU) | 03/30/2023 | 0.00052 | 7.8 | FALSE | FALSE | FALSE | https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2022-22706 | ||||
CVE-2013-3163 | Microsoft | Internet Explorer | 03/30/2023 | 0.85365 | 8.8 | FALSE | TRUE | FALSE | https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055; https://nvd.nist.gov/vuln/detail/CVE-2013-3163 | ||||
CVE-2022-42948 | Fortra | Cobalt Strike | 03/30/2023 | 0.12130 | 9.8 | FALSE | FALSE | FALSE | https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-2/; https://nvd.nist.gov/vuln/detail/CVE-2022-42948 | ||||
CVE-2022-39197 | Fortra | Cobalt Strike | 03/30/2023 | 0.10252 | 6.1 | FALSE | TRUE | FALSE | https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/; https://nvd.nist.gov/vuln/detail/CVE-2022-39197 | https://vulncheck.com/xdb/4af7d16aa28e||https://vulncheck.com/xdb/4af7d16aa28e , https://vulncheck.com/xdb/2cbdcb7cc5f9||https://vulncheck.com/xdb/2cbdcb7cc5f9 , https://vulncheck.com/xdb/2167a9246991||https://vulncheck.com/xdb/2167a9246991 , https://vulncheck.com/xdb/e27264b8a97a||https://vulncheck.com/xdb/e27264b8a97a , https://vulncheck.com/xdb/e6228f53d546||https://vulncheck.com/xdb/e6228f53d546 , https://vulncheck.com/xdb/c4a0f56cf3e1||https://vulncheck.com/xdb/c4a0f56cf3e1 , https://vulncheck.com/xdb/828e9a4bb798||https://vulncheck.com/xdb/828e9a4bb798 | |||
CVE-2021-30900 | Apple | iOS, iPadOS, and macOS | 03/30/2023 | 0.01375 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT21286, https://support.apple.com/en-us/HT212868, https://support.apple.com/kb/HT212872; https://nvd.nist.gov/vuln/detail/CVE-2021-30900 | ||||
CVE-2023-0266 | Linux | Kernel | 03/30/2023 | 0.00022 | 7.9 | FALSE | FALSE | FALSE | https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4; https://nvd.nist.gov/vuln/detail/CVE-2023-0266 | ||||
CVE-2022-3038 | Chromium Network Service | 03/30/2023 | 0.81619 | 8.8 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html; https://nvd.nist.gov/vuln/detail/CVE-2022-3038 | |||||
CVE-2023-26360 | Adobe | ColdFusion | 03/15/2023 | 0.94326 | 8.6 | https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt | 0 | FALSE | TRUE | FALSE | https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26360 | https://vulncheck.com/xdb/cea794a31955||https://vulncheck.com/xdb/cea794a31955 , https://vulncheck.com/xdb/857e746a829b||https://vulncheck.com/xdb/857e746a829b | |
CVE-2023-24880 | Microsoft | Windows | 03/14/2023 | 0.90535 | 4.4 | TRUE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24880; https://nvd.nist.gov/vuln/detail/CVE-2023-24880 | ||||
CVE-2023-23397 | Microsoft | Office | 03/14/2023 | 0.93547 | 9.8 | https://viz.greynoise.io/tag/microsoft-outlook-rce-attempt||https://viz.greynoise.io/tag/microsoft-outlook-rce-attempt | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23397, https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/, ; https://nvd.nist.gov/vuln/detail/CVE-2023-23397 | https://vulncheck.com/xdb/d75a920b3234||https://vulncheck.com/xdb/d75a920b3234 , https://vulncheck.com/xdb/c0620b5dfee4||https://vulncheck.com/xdb/c0620b5dfee4 , https://vulncheck.com/xdb/92069e59a002||https://vulncheck.com/xdb/92069e59a002 , https://vulncheck.com/xdb/6b1515a227c5||https://vulncheck.com/xdb/6b1515a227c5 , https://vulncheck.com/xdb/7c5622c2d3a6||https://vulncheck.com/xdb/7c5622c2d3a6 , https://vulncheck.com/xdb/dc500bda81a1||https://vulncheck.com/xdb/dc500bda81a1 , https://vulncheck.com/xdb/99246ea573d0||https://vulncheck.com/xdb/99246ea573d0 , https://vulncheck.com/xdb/8983cd572882||https://vulncheck.com/xdb/8983cd572882 , https://vulncheck.com/xdb/2c4a55aaa42a||https://vulncheck.com/xdb/2c4a55aaa42a , https://vulncheck.com/xdb/d597159f1565||https://vulncheck.com/xdb/d597159f1565 , https://vulncheck.com/xdb/7d72184f22bf||https://vulncheck.com/xdb/7d72184f22bf , https://vulncheck.com/xdb/645d3afa21d8||https://vulncheck.com/xdb/645d3afa21d8 , https://vulncheck.com/xdb/d533570ebdfa||https://vulncheck.com/xdb/d533570ebdfa , https://vulncheck.com/xdb/6f2546c042ef||https://vulncheck.com/xdb/6f2546c042ef , https://vulncheck.com/xdb/e7dac301aad2||https://vulncheck.com/xdb/e7dac301aad2 , https://vulncheck.com/xdb/205fe7e2ef61||https://vulncheck.com/xdb/205fe7e2ef61 , https://vulncheck.com/xdb/baaf8b3e5c4b||https://vulncheck.com/xdb/baaf8b3e5c4b , https://vulncheck.com/xdb/4a869df48f74||https://vulncheck.com/xdb/4a869df48f74 , https://vulncheck.com/xdb/d81f13d3b637||https://vulncheck.com/xdb/d81f13d3b637 , https://vulncheck.com/xdb/fe69ab5a1930||https://vulncheck.com/xdb/fe69ab5a1930 | ||
CVE-2022-41328 | Fortinet | FortiOS | 03/14/2023 | 0.00135 | 6.7 | FALSE | FALSE | FALSE | https://www.fortiguard.com/psirt/FG-IR-22-369; https://nvd.nist.gov/vuln/detail/CVE-2022-41328 | ||||
CVE-2020-5741 | Plex | Media Server | 03/10/2023 | 0.44383 | 7.2 | https://viz.greynoise.io/tag/plex-media-server-unpickle-rce-attempt||https://viz.greynoise.io/tag/plex-media-server-unpickle-rce-attempt | FALSE | TRUE | FALSE | https://forums.plex.tv/t/security-regarding-cve-2020-5741/586819; https://nvd.nist.gov/vuln/detail/CVE-2020-5741 | |||
CVE-2021-39144 | XStream | XStream | 03/10/2023 | 0.94412 | 8.5 | https://viz.greynoise.io/tag/vmware-nsx-manager-xstream-rce-attempt||https://viz.greynoise.io/tag/vmware-nsx-manager-xstream-rce-attempt | 0 | FALSE | TRUE | FALSE | https://www.vmware.com/security/advisories/VMSA-2022-0027.html, https://x-stream.github.io/CVE-2021-39144.html; https://nvd.nist.gov/vuln/detail/CVE-2021-39144 | ||
CVE-2022-33891 | Apache | Spark | 03/07/2023 | 0.94275 | 8.8 | https://viz.greynoise.io/tag/apache-spark-rce-attempt||https://viz.greynoise.io/tag/apache-spark-rce-attempt | 1 | FALSE | TRUE | FALSE | https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc; https://nvd.nist.gov/vuln/detail/CVE-2022-33891 | https://vulncheck.com/xdb/b58818c44ca8||https://vulncheck.com/xdb/b58818c44ca8 , https://vulncheck.com/xdb/6cbb30123977||https://vulncheck.com/xdb/6cbb30123977 , https://vulncheck.com/xdb/fb4fa1df680f||https://vulncheck.com/xdb/fb4fa1df680f , https://vulncheck.com/xdb/06189b8556e5||https://vulncheck.com/xdb/06189b8556e5 , https://vulncheck.com/xdb/b69bedfcaf5e||https://vulncheck.com/xdb/b69bedfcaf5e , https://vulncheck.com/xdb/9d36b80b7382||https://vulncheck.com/xdb/9d36b80b7382 , https://vulncheck.com/xdb/32b655f1ada0||https://vulncheck.com/xdb/32b655f1ada0 | |
CVE-2022-28810 | Zoho | ManageEngine | 03/07/2023 | 0.91665 | 6.8 | https://viz.greynoise.io/tag/zoho-manageengine-adselfservice-plus-cve-2022-28810-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-adselfservice-plus-cve-2022-28810-rce-attempt | FALSE | TRUE | FALSE | https://www.manageengine.com/products/self-service-password/advisory/CVE-2022-28810.html; https://nvd.nist.gov/vuln/detail/CVE-2022-28810 | |||
CVE-2022-35914 | Teclib | GLPI | 03/07/2023 | 0.94395 | 9.8 | https://viz.greynoise.io/tag/glpi-remote-code-execution-attmempt||https://viz.greynoise.io/tag/glpi-remote-code-execution-attmempt | 3 | FALSE | TRUE | FALSE | https://glpi-project.org/fr/glpi-10-0-3-disponible/, http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?&Sfs=htmLawedTest.php&Sl=.%2Finternal_utilities%2FhtmLawed.; https://nvd.nist.gov/vuln/detail/CVE-2022-35914 | https://vulncheck.com/xdb/af7f5f766475||https://vulncheck.com/xdb/af7f5f766475 , https://vulncheck.com/xdb/8a8a19d6a785||https://vulncheck.com/xdb/8a8a19d6a785 , https://vulncheck.com/xdb/bd875145c829||https://vulncheck.com/xdb/bd875145c829 , https://vulncheck.com/xdb/c61286d5aed7||https://vulncheck.com/xdb/c61286d5aed7 , https://vulncheck.com/xdb/c9b94cb0248e||https://vulncheck.com/xdb/c9b94cb0248e , https://vulncheck.com/xdb/b18a1f9302c3||https://vulncheck.com/xdb/b18a1f9302c3 , https://vulncheck.com/xdb/fcbba9e81eb7||https://vulncheck.com/xdb/fcbba9e81eb7 , https://vulncheck.com/xdb/e6fd88586096||https://vulncheck.com/xdb/e6fd88586096 | |
CVE-2022-36537 | ZK Framework | AuUploader | 02/27/2023 | 0.93948 | 7.5 | https://viz.greynoise.io/tag/zk-framework-information-disclosure-attempt||https://viz.greynoise.io/tag/zk-framework-information-disclosure-attempt | TRUE | TRUE | FALSE | https://tracker.zkoss.org/browse/ZK-5150; https://nvd.nist.gov/vuln/detail/CVE-2022-36537 | https://vulncheck.com/xdb/0508bf2f3fce||https://vulncheck.com/xdb/0508bf2f3fce , https://vulncheck.com/xdb/5ba33e292bd5||https://vulncheck.com/xdb/5ba33e292bd5 | ||
CVE-2022-40765 | Mitel | MiVoice Connect | 02/21/2023 | 0.02747 | 6.8 | TRUE | FALSE | FALSE | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0007; https://nvd.nist.gov/vuln/detail/CVE-2022-40765 | ||||
CVE-2022-47986 | IBM | Aspera Faspex | 02/21/2023 | 0.94345 | 9.8 | https://viz.greynoise.io/tag/ibm-aspera-faspex-rce-attempt||https://viz.greynoise.io/tag/ibm-aspera-faspex-rce-attempt | 2 | TRUE | TRUE | FALSE | https://exchange.xforce.ibmcloud.com/vulnerabilities/243512?_ga=2.189195179.1800390251.1676559338-700333034.1676325890; https://nvd.nist.gov/vuln/detail/CVE-2022-47986 | https://vulncheck.com/xdb/92809581e13d||https://vulncheck.com/xdb/92809581e13d , https://vulncheck.com/xdb/c1baa4196326||https://vulncheck.com/xdb/c1baa4196326 , https://vulncheck.com/xdb/6b17ce52fb0d||https://vulncheck.com/xdb/6b17ce52fb0d , https://vulncheck.com/xdb/3d189791c438||https://vulncheck.com/xdb/3d189791c438 | |
CVE-2022-41223 | Mitel | MiVoice Connect | 02/21/2023 | 0.03808 | 6.8 | TRUE | FALSE | FALSE | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008; https://nvd.nist.gov/vuln/detail/CVE-2022-41223 | ||||
CVE-2022-46169 | Cacti | Cacti | 02/16/2023 | 0.94469 | 9.8 | https://viz.greynoise.io/tag/cacti-remote-agent-php-unauthenticated-command-injection-attempt||https://viz.greynoise.io/tag/cacti-remote-agent-php-unauthenticated-command-injection-attempt | 2 | FALSE | TRUE | FALSE | https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf; https://nvd.nist.gov/vuln/detail/CVE-2022-46169 | https://vulncheck.com/xdb/8889d02a2c92||https://vulncheck.com/xdb/8889d02a2c92 , https://vulncheck.com/xdb/62e4658694fe||https://vulncheck.com/xdb/62e4658694fe , https://vulncheck.com/xdb/a55dda03e4e8||https://vulncheck.com/xdb/a55dda03e4e8 , https://vulncheck.com/xdb/adcb07c757a5||https://vulncheck.com/xdb/adcb07c757a5 , https://vulncheck.com/xdb/42e7e3d26487||https://vulncheck.com/xdb/42e7e3d26487 , https://vulncheck.com/xdb/5c3c4797be34||https://vulncheck.com/xdb/5c3c4797be34 , https://vulncheck.com/xdb/6281e1eb6950||https://vulncheck.com/xdb/6281e1eb6950 , https://vulncheck.com/xdb/e0af26285da6||https://vulncheck.com/xdb/e0af26285da6 , https://vulncheck.com/xdb/d6bfae898370||https://vulncheck.com/xdb/d6bfae898370 , https://vulncheck.com/xdb/de179daeb01f||https://vulncheck.com/xdb/de179daeb01f , https://vulncheck.com/xdb/1ea0dc48f935||https://vulncheck.com/xdb/1ea0dc48f935 , https://vulncheck.com/xdb/1f8fe00d0251||https://vulncheck.com/xdb/1f8fe00d0251 , https://vulncheck.com/xdb/e1a4679413d3||https://vulncheck.com/xdb/e1a4679413d3 , https://vulncheck.com/xdb/678315c2b725||https://vulncheck.com/xdb/678315c2b725 , https://vulncheck.com/xdb/9cc18470fe06||https://vulncheck.com/xdb/9cc18470fe06 , https://vulncheck.com/xdb/34a258cbb84e||https://vulncheck.com/xdb/34a258cbb84e , https://vulncheck.com/xdb/033e24c697ac||https://vulncheck.com/xdb/033e24c697ac , https://vulncheck.com/xdb/fe2d74ab12b3||https://vulncheck.com/xdb/fe2d74ab12b3 , https://vulncheck.com/xdb/77058a66967d||https://vulncheck.com/xdb/77058a66967d , https://vulncheck.com/xdb/78ba3372d176||https://vulncheck.com/xdb/78ba3372d176 , https://vulncheck.com/xdb/ab7dd53a6032||https://vulncheck.com/xdb/ab7dd53a6032 , https://vulncheck.com/xdb/18c497dc094d||https://vulncheck.com/xdb/18c497dc094d , https://vulncheck.com/xdb/8ef8e9059276||https://vulncheck.com/xdb/8ef8e9059276 , https://vulncheck.com/xdb/564568ef13c1||https://vulncheck.com/xdb/564568ef13c1 , https://vulncheck.com/xdb/7e40710254da||https://vulncheck.com/xdb/7e40710254da , https://vulncheck.com/xdb/b42b36e9f070||https://vulncheck.com/xdb/b42b36e9f070 , https://vulncheck.com/xdb/4174b70e7788||https://vulncheck.com/xdb/4174b70e7788 , https://vulncheck.com/xdb/1f2f47fde662||https://vulncheck.com/xdb/1f2f47fde662 , https://vulncheck.com/xdb/ced8bc131b4a||https://vulncheck.com/xdb/ced8bc131b4a , https://vulncheck.com/xdb/c3426a18652b||https://vulncheck.com/xdb/c3426a18652b , https://vulncheck.com/xdb/f6ffcfbeab8c||https://vulncheck.com/xdb/f6ffcfbeab8c , https://vulncheck.com/xdb/8b4444ba432d||https://vulncheck.com/xdb/8b4444ba432d , https://vulncheck.com/xdb/a131913950fb||https://vulncheck.com/xdb/a131913950fb | |
CVE-2023-21823 | Microsoft | Windows | 02/14/2023 | 0.02438 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823; https://nvd.nist.gov/vuln/detail/CVE-2023-21823 | ||||
CVE-2023-23376 | Microsoft | Windows | 02/14/2023 | 0.12460 | 7.8 | TRUE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376; https://nvd.nist.gov/vuln/detail/CVE-2023-23376 | ||||
CVE-2023-21715 | Microsoft | Office | 02/14/2023 | 0.00505 | 7.3 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715; https://nvd.nist.gov/vuln/detail/CVE-2023-21715 | ||||
CVE-2023-23529 | Apple | Multiple Products | 02/14/2023 | 0.00091 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213635, https://support.apple.com/en-us/HT213633, https://support.apple.com/en-us/HT213638; https://nvd.nist.gov/vuln/detail/CVE-2023-23529 | ||||
CVE-2015-2291 | Intel | Ethernet Diagnostics Driver for Windows | 02/10/2023 | 0.03152 | 7.8 | TRUE | TRUE | FALSE | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html; https://nvd.nist.gov/vuln/detail/CVE-2015-2291 | https://vulncheck.com/xdb/9cedf5dc5031 | |||
CVE-2023-0669 | Fortra | GoAnywhere MFT | 02/10/2023 | 0.94364 | 7.2 | https://viz.greynoise.io/tag/goanywhere-mft-command-injection-attempt||https://viz.greynoise.io/tag/goanywhere-mft-command-injection-attempt | 9 | TRUE | TRUE | FALSE | This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://my.goanywhere.com/webclient/DownloadProductFiles.xhtml. Fortra users must have an account in order to login and access the patch.; https://nvd.nist.gov/vuln/detail/CVE-2023-0669 | https://vulncheck.com/xdb/7b70d10333a3||https://vulncheck.com/xdb/7b70d10333a3 , https://vulncheck.com/xdb/49e1cc44b9bb||https://vulncheck.com/xdb/49e1cc44b9bb | |
CVE-2022-24990 | TerraMaster | TerraMaster OS | 02/10/2023 | 0.94401 | 7.5 | https://viz.greynoise.io/tag/terramaster-nas-api-php-rce-check||https://viz.greynoise.io/tag/terramaster-nas-api-php-rce-check | 1 | TRUE | TRUE | TRUE | https://forum.terra-master.com/en/viewtopic.php?t=3030; https://nvd.nist.gov/vuln/detail/CVE-2022-24990 | https://vulncheck.com/xdb/25b052136658||https://vulncheck.com/xdb/25b052136658 , https://vulncheck.com/xdb/7b15adc7f2a9||https://vulncheck.com/xdb/7b15adc7f2a9 , https://vulncheck.com/xdb/ddb92a8e6f44||https://vulncheck.com/xdb/ddb92a8e6f44 | |
CVE-2022-21587 | Oracle | E-Business Suite | 02/02/2023 | 0.94393 | 9.8 | https://viz.greynoise.io/tag/oracle-web-applications-integrator-rce-attempt||https://viz.greynoise.io/tag/oracle-web-applications-integrator-rce-attempt | 2 | TRUE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpuoct2022.html; https://nvd.nist.gov/vuln/detail/CVE-2022-21587 | https://vulncheck.com/xdb/ae3226ff5bc2||https://vulncheck.com/xdb/ae3226ff5bc2 , https://vulncheck.com/xdb/e5086a4de697||https://vulncheck.com/xdb/e5086a4de697 , https://vulncheck.com/xdb/f0d1bff36115||https://vulncheck.com/xdb/f0d1bff36115 , https://vulncheck.com/xdb/59e3339ef54c||https://vulncheck.com/xdb/59e3339ef54c | |
CVE-2023-22952 | SugarCRM | Multiple Products | 02/02/2023 | 0.93756 | 8.8 | https://viz.greynoise.io/tag/sugarcrm-auth-bypass-rce-attempt||https://viz.greynoise.io/tag/sugarcrm-auth-bypass-rce-attempt | 0 | FALSE | TRUE | FALSE | https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-001/; https://nvd.nist.gov/vuln/detail/CVE-2023-22952 | ||
CVE-2017-11357 | Telerik | User Interface (UI) for ASP.NET AJAX | 01/26/2023 | 0.93419 | 9.8 | TRUE | TRUE | FALSE | https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/asyncupload-insecure-direct-object-reference; https://nvd.nist.gov/vuln/detail/CVE-2017-11357 | https://vulncheck.com/xdb/ab7968edc0f3 | |||
CVE-2022-47966 | Zoho | ManageEngine | 01/23/2023 | 0.94421 | 9.8 | https://viz.greynoise.io/tag/zoho-manageengine-rce-cve-2022-47966-attempt||https://viz.greynoise.io/tag/zoho-manageengine-rce-cve-2022-47966-attempt | 2 | TRUE | TRUE | FALSE | https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html; https://nvd.nist.gov/vuln/detail/CVE-2022-47966 | https://vulncheck.com/xdb/c50d25ff81f2||https://vulncheck.com/xdb/c50d25ff81f2 , https://vulncheck.com/xdb/ef4910f82e02||https://vulncheck.com/xdb/ef4910f82e02 , https://vulncheck.com/xdb/ad16f2bea338||https://vulncheck.com/xdb/ad16f2bea338 , https://vulncheck.com/xdb/556d0f5a7136||https://vulncheck.com/xdb/556d0f5a7136 | |
CVE-2022-44877 | CWP | Control Web Panel | 01/17/2023 | 0.94434 | 9.8 | https://viz.greynoise.io/tag/centos-web-panel-rce-cve-2022-44877-attempt||https://viz.greynoise.io/tag/centos-web-panel-rce-cve-2022-44877-attempt | FALSE | TRUE | FALSE | https://control-webpanel.com/changelog#1669855527714-450fb335-6194; https://nvd.nist.gov/vuln/detail/CVE-2022-44877 | https://vulncheck.com/xdb/500e8a0e02e1||https://vulncheck.com/xdb/500e8a0e02e1 , https://vulncheck.com/xdb/8af08da7a934||https://vulncheck.com/xdb/8af08da7a934 , https://vulncheck.com/xdb/c7c9b96ed2ce||https://vulncheck.com/xdb/c7c9b96ed2ce , https://vulncheck.com/xdb/9bd08aaee5d4||https://vulncheck.com/xdb/9bd08aaee5d4 , https://vulncheck.com/xdb/d1a80792b675||https://vulncheck.com/xdb/d1a80792b675 , https://vulncheck.com/xdb/112b1d817777||https://vulncheck.com/xdb/112b1d817777 , https://vulncheck.com/xdb/4cbc25e487aa||https://vulncheck.com/xdb/4cbc25e487aa | ||
CVE-2022-41080 | Microsoft | Exchange Server | 01/10/2023 | 0.93743 | 8.8 | https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt||https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41080; https://nvd.nist.gov/vuln/detail/CVE-2022-41080 | https://vulncheck.com/xdb/3e1c1c7ad5b2||https://vulncheck.com/xdb/3e1c1c7ad5b2 , https://vulncheck.com/xdb/96274752561d||https://vulncheck.com/xdb/96274752561d | ||
CVE-2023-21674 | Microsoft | Windows | 01/10/2023 | 0.09979 | 8.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21674; https://nvd.nist.gov/vuln/detail/CVE-2023-21674 | https://vulncheck.com/xdb/5b660d198fe3 | |||
CVE-2018-5430 | TIBCO | JasperReports | 12/29/2022 | 0.54599 | 7.7 | https://viz.greynoise.io/tag/tibco-jasperreports-path-traversal-attempt||https://viz.greynoise.io/tag/tibco-jasperreports-path-traversal-attempt | FALSE | TRUE | FALSE | https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430;https://nvd.nist.gov/vuln/detail/CVE-2018-5430 | |||
CVE-2018-18809 | TIBCO | JasperReports | 12/29/2022 | 0.94056 | 9.9 | https://viz.greynoise.io/tag/tibco-jaspersoft-path-traversal-attempt||https://viz.greynoise.io/tag/tibco-jaspersoft-path-traversal-attempt | FALSE | FALSE | FALSE | https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809; https://nvd.nist.gov/vuln/detail/CVE-2018-18809 | |||
CVE-2022-42856 | Apple | iOS | 12/14/2022 | 0.00157 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213516; https://nvd.nist.gov/vuln/detail/CVE-2022-42856 | ||||
CVE-2022-26500 | Veeam | Backup & Replication | 12/13/2022 | 0.20430 | 8.8 | https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check||https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check | TRUE | FALSE | FALSE | https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26500 | |||
CVE-2022-44698 | Microsoft | Defender | 12/13/2022 | 0.88727 | 5.4 | TRUE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698; https://nvd.nist.gov/vuln/detail/CVE-2022-44698 | ||||
CVE-2022-27518 | Citrix | Application Delivery Controller (ADC) and Gateway | 12/13/2022 | 0.11238 | 9.8 | FALSE | FALSE | FALSE | https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/; https://nvd.nist.gov/vuln/detail/CVE-2022-27518 | ||||
CVE-2022-42475 | Fortinet | FortiOS | 12/13/2022 | 0.93196 | 9.8 | https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-attempt||https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-attempt | TRUE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-22-398; https://nvd.nist.gov/vuln/detail/CVE-2022-42475 | https://vulncheck.com/xdb/276c2d2f8553||https://vulncheck.com/xdb/276c2d2f8553 , https://vulncheck.com/xdb/cd08caecebf5||https://vulncheck.com/xdb/cd08caecebf5 , https://vulncheck.com/xdb/c058dffc5d81||https://vulncheck.com/xdb/c058dffc5d81 , https://vulncheck.com/xdb/bf45a56af2ba||https://vulncheck.com/xdb/bf45a56af2ba , https://vulncheck.com/xdb/d8adbeedff1b||https://vulncheck.com/xdb/d8adbeedff1b , https://vulncheck.com/xdb/c670713df10f||https://vulncheck.com/xdb/c670713df10f | ||
CVE-2022-26501 | Veeam | Backup & Replication | 12/13/2022 | 0.84659 | 9.8 | https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check||https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check | TRUE | TRUE | FALSE | https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26501 | https://vulncheck.com/xdb/0e3a221258e9 | ||
CVE-2022-4262 | Chromium V8 | 12/05/2022 | 0.04354 | 8.8 | FALSE | TRUE | FALSE | https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2022-4262 | https://vulncheck.com/xdb/b8e4029b5cec||https://vulncheck.com/xdb/b8e4029b5cec , https://vulncheck.com/xdb/0ab67251faee||https://vulncheck.com/xdb/0ab67251faee , https://vulncheck.com/xdb/39379e9096d7||https://vulncheck.com/xdb/39379e9096d7 | ||||
CVE-2021-35587 | Oracle | Fusion Middleware | 11/28/2022 | 0.94235 | 9.8 | https://viz.greynoise.io/tag/oracle-access-manager-rce-attempt||https://viz.greynoise.io/tag/oracle-access-manager-rce-attempt , https://viz.greynoise.io/tag/oracle-access-manager-rce-check||https://viz.greynoise.io/tag/oracle-access-manager-rce-check | 2 | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpujan2022.html; https://nvd.nist.gov/vuln/detail/CVE-2021-35587 | ||
CVE-2022-4135 | Chromium GPU | 11/28/2022 | 0.00132 | 9.6 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html; https://nvd.nist.gov/vuln/detail/CVE-2022-4135 | |||||
CVE-2022-41049 | Microsoft | Windows | 11/14/2022 | 0.29966 | 5.4 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41049; https://nvd.nist.gov/vuln/detail/CVE-2022-41049 | ||||
CVE-2021-25370 | Samsung | Mobile Devices | 11/08/2022 | 0.00879 | 6.1 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370 | ||||
CVE-2021-25337 | Samsung | Mobile Devices | 11/08/2022 | 0.00349 | 4.4 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25337 | ||||
CVE-2021-25369 | Samsung | Mobile Devices | 11/08/2022 | 0.00214 | 6.2 | FALSE | FALSE | FALSE | https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25369 | ||||
CVE-2022-41073 | Microsoft | Windows | 11/08/2022 | 0.00699 | 7.8 | TRUE | FALSE | FALSE | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41073; https://nvd.nist.gov/vuln/detail/CVE-2022-41073 | ||||
CVE-2022-41125 | Microsoft | Windows | 11/08/2022 | 0.00529 | 7.8 | FALSE | FALSE | FALSE | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41125; https://nvd.nist.gov/vuln/detail/CVE-2022-41125 | ||||
CVE-2022-41091 | Microsoft | Windows | 11/08/2022 | 0.06229 | 5.4 | TRUE | FALSE | FALSE | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41091; https://nvd.nist.gov/vuln/detail/CVE-2022-41091 | ||||
CVE-2022-41128 | Microsoft | Windows | 11/08/2022 | 0.75375 | 8.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128; https://nvd.nist.gov/vuln/detail/CVE-2022-41128 | ||||
CVE-2022-3723 | Chromium V8 | 10/28/2022 | 0.00599 | 8.8 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2022-3723 | |||||
CVE-2022-42827 | Apple | iOS and iPadOS | 10/25/2022 | 0.00381 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213489; https://nvd.nist.gov/vuln/detail/CVE-2022-42827 | ||||
CVE-2020-3153 | Cisco | AnyConnect Secure | 10/24/2022 | 0.43482 | 6.5 | TRUE | TRUE | FALSE | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj; https://nvd.nist.gov/vuln/detail/CVE-2020-3153 | https://vulncheck.com/xdb/6f8fc16d4a3f||https://vulncheck.com/xdb/6f8fc16d4a3f , https://vulncheck.com/xdb/beb12bd9f715||https://vulncheck.com/xdb/beb12bd9f715 | |||
CVE-2018-19321 | GIGABYTE | Multiple Products | 10/24/2022 | 0.21036 | 7.8 | TRUE | TRUE | FALSE | https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19321 | https://vulncheck.com/xdb/74650e8a4a65 | |||
CVE-2020-3433 | Cisco | AnyConnect Secure | 10/24/2022 | 0.06347 | 7.8 | TRUE | TRUE | FALSE | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW; https://nvd.nist.gov/vuln/detail/CVE-2020-3433 | https://vulncheck.com/xdb/ef8f0e3c268e | |||
CVE-2018-19320 | GIGABYTE | Multiple Products | 10/24/2022 | 0.18855 | 7.8 | TRUE | TRUE | FALSE | https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19320 | https://vulncheck.com/xdb/9f7285db8cd7||https://vulncheck.com/xdb/9f7285db8cd7 , https://vulncheck.com/xdb/60a5b5fb8d11||https://vulncheck.com/xdb/60a5b5fb8d11 , https://vulncheck.com/xdb/30b1dd7f2714||https://vulncheck.com/xdb/30b1dd7f2714 | |||
CVE-2018-19323 | GIGABYTE | Multiple Products | 10/24/2022 | 0.23126 | 9.8 | TRUE | FALSE | FALSE | https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19323 | ||||
CVE-2018-19322 | GIGABYTE | Multiple Products | 10/24/2022 | 0.03957 | 7.8 | TRUE | FALSE | FALSE | https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19322 | ||||
CVE-2022-41352 | Synacor | Zimbra Collaboration Suite (ZCS) | 10/20/2022 | 0.79129 | 9.8 | TRUE | TRUE | FALSE | https://wiki.zimbra.com/wiki/Security_Center; https://nvd.nist.gov/vuln/detail/CVE-2022-41352 | https://vulncheck.com/xdb/77c50ee3ab48||https://vulncheck.com/xdb/77c50ee3ab48 , https://vulncheck.com/xdb/c78c78269dc3||https://vulncheck.com/xdb/c78c78269dc3 | |||
CVE-2021-3493 | Linux | Kernel | 10/20/2022 | 0.73876 | 8.8 | FALSE | TRUE | FALSE | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52; https://nvd.nist.gov/vuln/detail/CVE-2021-3493 | https://vulncheck.com/xdb/ed42677360ba||https://vulncheck.com/xdb/ed42677360ba , https://vulncheck.com/xdb/b1b3a8751d53||https://vulncheck.com/xdb/b1b3a8751d53 , https://vulncheck.com/xdb/8bc3c24df427||https://vulncheck.com/xdb/8bc3c24df427 , https://vulncheck.com/xdb/53855273d7f8||https://vulncheck.com/xdb/53855273d7f8 , https://vulncheck.com/xdb/bf6732e3daca||https://vulncheck.com/xdb/bf6732e3daca , https://vulncheck.com/xdb/f8390219793f||https://vulncheck.com/xdb/f8390219793f , https://vulncheck.com/xdb/44567c4bebd7||https://vulncheck.com/xdb/44567c4bebd7 , https://vulncheck.com/xdb/93af15d63cbb||https://vulncheck.com/xdb/93af15d63cbb , https://vulncheck.com/xdb/39754c7f28a6||https://vulncheck.com/xdb/39754c7f28a6 , https://vulncheck.com/xdb/9f1aa472b331||https://vulncheck.com/xdb/9f1aa472b331 , https://vulncheck.com/xdb/f90698fb4173||https://vulncheck.com/xdb/f90698fb4173 , https://vulncheck.com/xdb/260ad0a548b5||https://vulncheck.com/xdb/260ad0a548b5 , https://vulncheck.com/xdb/80b50ee28342||https://vulncheck.com/xdb/80b50ee28342 , https://vulncheck.com/xdb/2ab470a88220||https://vulncheck.com/xdb/2ab470a88220 , https://vulncheck.com/xdb/165ca931536b||https://vulncheck.com/xdb/165ca931536b , https://vulncheck.com/xdb/c90d13040f2a||https://vulncheck.com/xdb/c90d13040f2a , https://vulncheck.com/xdb/586ebe33df5f||https://vulncheck.com/xdb/586ebe33df5f , https://vulncheck.com/xdb/df20ad5b82e3||https://vulncheck.com/xdb/df20ad5b82e3 , https://vulncheck.com/xdb/76f421f52f8f||https://vulncheck.com/xdb/76f421f52f8f , https://vulncheck.com/xdb/f3abef618150||https://vulncheck.com/xdb/f3abef618150 | |||
CVE-2022-40684 | Fortinet | Multiple Products | 10/11/2022 | 0.94427 | 9.8 | https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt||https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt | 13 | TRUE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-22-377; https://nvd.nist.gov/vuln/detail/CVE-2022-40684 | https://vulncheck.com/xdb/0f732bdee343||https://vulncheck.com/xdb/0f732bdee343 , https://vulncheck.com/xdb/db8ccd288f72||https://vulncheck.com/xdb/db8ccd288f72 , https://vulncheck.com/xdb/b6787ce31611||https://vulncheck.com/xdb/b6787ce31611 , https://vulncheck.com/xdb/2e43eee43157||https://vulncheck.com/xdb/2e43eee43157 , https://vulncheck.com/xdb/dc9f6a9f6c27||https://vulncheck.com/xdb/dc9f6a9f6c27 , https://vulncheck.com/xdb/a36497ad5dd2||https://vulncheck.com/xdb/a36497ad5dd2 , https://vulncheck.com/xdb/6a6f9b30827f||https://vulncheck.com/xdb/6a6f9b30827f , https://vulncheck.com/xdb/76441680e6b1||https://vulncheck.com/xdb/76441680e6b1 , https://vulncheck.com/xdb/b30548fd63d6||https://vulncheck.com/xdb/b30548fd63d6 , https://vulncheck.com/xdb/1315787605ec||https://vulncheck.com/xdb/1315787605ec , https://vulncheck.com/xdb/0037fa291764||https://vulncheck.com/xdb/0037fa291764 , https://vulncheck.com/xdb/94e9ab177128||https://vulncheck.com/xdb/94e9ab177128 , https://vulncheck.com/xdb/a29d24addb6d||https://vulncheck.com/xdb/a29d24addb6d , https://vulncheck.com/xdb/b1bf53fd758d||https://vulncheck.com/xdb/b1bf53fd758d , https://vulncheck.com/xdb/e7be9b40e314||https://vulncheck.com/xdb/e7be9b40e314 , https://vulncheck.com/xdb/9f2799649c05||https://vulncheck.com/xdb/9f2799649c05 , https://vulncheck.com/xdb/687ac29ec096||https://vulncheck.com/xdb/687ac29ec096 , https://vulncheck.com/xdb/006745572ba2||https://vulncheck.com/xdb/006745572ba2 , https://vulncheck.com/xdb/38b52c3e8812||https://vulncheck.com/xdb/38b52c3e8812 , https://vulncheck.com/xdb/ae0c71764619||https://vulncheck.com/xdb/ae0c71764619 , https://vulncheck.com/xdb/37fe630b4cc1||https://vulncheck.com/xdb/37fe630b4cc1 | |
CVE-2022-41033 | Microsoft | Windows COM+ Event System Service | 10/11/2022 | 0.00234 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41033; https://nvd.nist.gov/vuln/detail/CVE-2022-41033 | ||||
CVE-2022-36804 | Atlassian | Bitbucket Server and Data Center | 09/30/2022 | 0.94429 | 8.8 | https://viz.greynoise.io/tag/atlassian-bitbucket-server-rce-attempt||https://viz.greynoise.io/tag/atlassian-bitbucket-server-rce-attempt | 0 | FALSE | TRUE | FALSE | https://jira.atlassian.com/browse/BSERV-13438; https://nvd.nist.gov/vuln/detail/CVE-2022-36804 | https://vulncheck.com/xdb/9acca76e1447||https://vulncheck.com/xdb/9acca76e1447 , https://vulncheck.com/xdb/a3d1dc5fac30||https://vulncheck.com/xdb/a3d1dc5fac30 , https://vulncheck.com/xdb/78e356140b29||https://vulncheck.com/xdb/78e356140b29 , https://vulncheck.com/xdb/0b7d76c7611b||https://vulncheck.com/xdb/0b7d76c7611b , https://vulncheck.com/xdb/232d2df2698d||https://vulncheck.com/xdb/232d2df2698d , https://vulncheck.com/xdb/f437b6e9f563||https://vulncheck.com/xdb/f437b6e9f563 , https://vulncheck.com/xdb/6e85e1c51f7e||https://vulncheck.com/xdb/6e85e1c51f7e , https://vulncheck.com/xdb/af7d6ba3c236||https://vulncheck.com/xdb/af7d6ba3c236 , https://vulncheck.com/xdb/8a763ff2ccf9||https://vulncheck.com/xdb/8a763ff2ccf9 , https://vulncheck.com/xdb/9828f81b9d39||https://vulncheck.com/xdb/9828f81b9d39 , https://vulncheck.com/xdb/104d7f8f5541||https://vulncheck.com/xdb/104d7f8f5541 , https://vulncheck.com/xdb/e6120ad8c2fa||https://vulncheck.com/xdb/e6120ad8c2fa , https://vulncheck.com/xdb/0efacd5def82||https://vulncheck.com/xdb/0efacd5def82 | |
CVE-2022-41082 | Microsoft | Exchange Server | 09/30/2022 | 0.92453 | 8.0 | https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt||https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check | 85 | TRUE | TRUE | FALSE | https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/; https://nvd.nist.gov/vuln/detail/CVE-2022-41082 | https://vulncheck.com/xdb/fce0b6801443||https://vulncheck.com/xdb/fce0b6801443 , https://vulncheck.com/xdb/0ae82720da9d||https://vulncheck.com/xdb/0ae82720da9d , https://vulncheck.com/xdb/7774cccb028e||https://vulncheck.com/xdb/7774cccb028e , https://vulncheck.com/xdb/e9a822b336ed||https://vulncheck.com/xdb/e9a822b336ed , https://vulncheck.com/xdb/0b916230c113||https://vulncheck.com/xdb/0b916230c113 , https://vulncheck.com/xdb/e84e1c26f420||https://vulncheck.com/xdb/e84e1c26f420 , https://vulncheck.com/xdb/15f159f290df||https://vulncheck.com/xdb/15f159f290df , https://vulncheck.com/xdb/33385974e77d||https://vulncheck.com/xdb/33385974e77d , https://vulncheck.com/xdb/376b7c31c8cc||https://vulncheck.com/xdb/376b7c31c8cc | |
CVE-2022-41040 | Microsoft | Exchange Server | 09/30/2022 | 0.94229 | 8.8 | https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check | TRUE | TRUE | FALSE | https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/; https://nvd.nist.gov/vuln/detail/CVE-2022-41040 | https://vulncheck.com/xdb/565a6ab56ed1||https://vulncheck.com/xdb/565a6ab56ed1 , https://vulncheck.com/xdb/79d4403bdb61||https://vulncheck.com/xdb/79d4403bdb61 , https://vulncheck.com/xdb/fa8fd853a94c||https://vulncheck.com/xdb/fa8fd853a94c , https://vulncheck.com/xdb/db559cb540cd||https://vulncheck.com/xdb/db559cb540cd , https://vulncheck.com/xdb/7a4e1c3bf38a||https://vulncheck.com/xdb/7a4e1c3bf38a , https://vulncheck.com/xdb/843adb0cff04||https://vulncheck.com/xdb/843adb0cff04 , https://vulncheck.com/xdb/ed9b509bae9a||https://vulncheck.com/xdb/ed9b509bae9a | ||
CVE-2022-3236 | Sophos | Firewall | 09/23/2022 | 0.92697 | 9.8 | https://viz.greynoise.io/tag/sophos-firewall-rce-cve-2022-3236-attempt||https://viz.greynoise.io/tag/sophos-firewall-rce-cve-2022-3236-attempt | FALSE | FALSE | FALSE | https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce; https://nvd.nist.gov/vuln/detail/CVE-2022-3236 | |||
CVE-2022-35405 | Zoho | ManageEngine | 09/22/2022 | 0.94412 | 9.8 | https://viz.greynoise.io/tag/zoho-password-manager-pro-xml-rpc-rce-attempt||https://viz.greynoise.io/tag/zoho-password-manager-pro-xml-rpc-rce-attempt | FALSE | TRUE | FALSE | https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html; https://nvd.nist.gov/vuln/detail/CVE-2022-35405 | https://vulncheck.com/xdb/b3c77689953e | ||
CVE-2013-2094 | Linux | Kernel | 09/15/2022 | 0.63396 | 8.4 | FALSE | TRUE | FALSE | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8176cced706b5e5d15887584150764894e94e02f; https://nvd.nist.gov/vuln/detail/CVE-2013-2094 | https://vulncheck.com/xdb/9dbfce6b00bc||https://vulncheck.com/xdb/9dbfce6b00bc , https://vulncheck.com/xdb/553d40d9c74c||https://vulncheck.com/xdb/553d40d9c74c , https://vulncheck.com/xdb/1b5a2f6d40ca||https://vulncheck.com/xdb/1b5a2f6d40ca | |||
CVE-2013-2596 | Linux | Kernel | 09/15/2022 | 0.00589 | 7.8 | FALSE | TRUE | FALSE | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc9bbca8f650e5f738af8806317c0a041a48ae4a; https://nvd.nist.gov/vuln/detail/CVE-2013-2596 | https://vulncheck.com/xdb/2cf915667038 | |||
CVE-2013-2597 | Code Aurora | ACDB Audio Driver | 09/15/2022 | 0.04612 | 8.4 | FALSE | FALSE | FALSE | https://web.archive.org/web/20161226013354/https:/www.codeaurora.org/news/security-advisories/stack-based-buffer-overflow-acdb-audio-driver-cve-2013-2597; https://nvd.nist.gov/vuln/detail/CVE-2013-2597 | ||||
CVE-2013-6282 | Linux | Kernel | 09/15/2022 | 0.46916 | 8.8 | FALSE | TRUE | FALSE | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04; https://nvd.nist.gov/vuln/detail/CVE-2013-6282 | https://vulncheck.com/xdb/b71a08d20773||https://vulncheck.com/xdb/b71a08d20773 , https://vulncheck.com/xdb/8dbca12d6df7||https://vulncheck.com/xdb/8dbca12d6df7 | |||
CVE-2022-40139 | Trend Micro | Apex One and Apex One as a Service | 09/15/2022 | 0.18386 | 7.2 | FALSE | FALSE | FALSE | https://success.trendmicro.com/dcx/s/solution/000291528?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2022-40139 | ||||
CVE-2010-2568 | Microsoft | Windows | 09/15/2022 | 0.93403 | 7.8 | FALSE | TRUE | FALSE | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568 | ||||
CVE-2022-32917 | Apple | iOS, iPadOS, and macOS | 09/14/2022 | 0.00091 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT213445, https://support.apple.com/en-us/HT213444; https://nvd.nist.gov/vuln/detail/CVE-2022-32917 | ||||
CVE-2022-37969 | Microsoft | Windows | 09/14/2022 | 0.04824 | 7.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37969; https://nvd.nist.gov/vuln/detail/CVE-2022-37969 | https://vulncheck.com/xdb/fd0780f4f9c6 | |||
CVE-2022-27593 | QNAP | Photo Station | 09/08/2022 | 0.93613 | 10.0 | https://viz.greynoise.io/tag/qnap-cve-2022-27593-attempt||https://viz.greynoise.io/tag/qnap-cve-2022-27593-attempt | 3 | TRUE | FALSE | TRUE | https://www.qnap.com/en/security-advisory/qsa-22-24; https://nvd.nist.gov/vuln/detail/CVE-2022-27593 | ||
CVE-2022-26258 | D-Link | DIR-820L | 09/08/2022 | 0.89422 | 9.8 | https://viz.greynoise.io/tag/dlink-820l-rce-attempt||https://viz.greynoise.io/tag/dlink-820l-rce-attempt | FALSE | FALSE | FALSE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10295; https://nvd.nist.gov/vuln/detail/CVE-2022-26258 | |||
CVE-2018-2628 | Oracle | WebLogic Server | 09/08/2022 | 0.94422 | 9.8 | https://viz.greynoise.io/tag/oracle-weblogic-rce-cve-2018-2628-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-rce-cve-2018-2628-rce-attempt | FALSE | TRUE | FALSE | https://www.oracle.com/security-alerts/cpuapr2018.html; https://nvd.nist.gov/vuln/detail/CVE-2018-2628 | https://vulncheck.com/xdb/efdf79b80de3||https://vulncheck.com/xdb/efdf79b80de3 , https://vulncheck.com/xdb/9bb8a4f5bcd7||https://vulncheck.com/xdb/9bb8a4f5bcd7 , https://vulncheck.com/xdb/9897ff7f2048||https://vulncheck.com/xdb/9897ff7f2048 , https://vulncheck.com/xdb/1502741aa6e5||https://vulncheck.com/xdb/1502741aa6e5 , https://vulncheck.com/xdb/b96cd5cb34d6||https://vulncheck.com/xdb/b96cd5cb34d6 , https://vulncheck.com/xdb/d6dc32e5b5af||https://vulncheck.com/xdb/d6dc32e5b5af , https://vulncheck.com/xdb/9568d7a3210d||https://vulncheck.com/xdb/9568d7a3210d , https://vulncheck.com/xdb/2d7c1b752013||https://vulncheck.com/xdb/2d7c1b752013 , https://vulncheck.com/xdb/b7a4c562d6cc||https://vulncheck.com/xdb/b7a4c562d6cc , https://vulncheck.com/xdb/7459b9092084||https://vulncheck.com/xdb/7459b9092084 , https://vulncheck.com/xdb/50c18de3d86a||https://vulncheck.com/xdb/50c18de3d86a , https://vulncheck.com/xdb/f5c1eb50cf55||https://vulncheck.com/xdb/f5c1eb50cf55 , https://vulncheck.com/xdb/eed7ace69d37||https://vulncheck.com/xdb/eed7ace69d37 , https://vulncheck.com/xdb/d5a92dce5856||https://vulncheck.com/xdb/d5a92dce5856 , https://vulncheck.com/xdb/c7bbf0a3a56c||https://vulncheck.com/xdb/c7bbf0a3a56c , https://vulncheck.com/xdb/a0a66287ef5b||https://vulncheck.com/xdb/a0a66287ef5b | ||
CVE-2018-6530 | D-Link | Multiple Routers | 09/08/2022 | 0.93760 | 9.8 | https://viz.greynoise.io/tag/d-link-soap-cgi-cve-2018-6530-command-injection-attempt||https://viz.greynoise.io/tag/d-link-soap-cgi-cve-2018-6530-command-injection-attempt | 3 | TRUE | FALSE | TRUE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10105; https://nvd.nist.gov/vuln/detail/CVE-2018-6530 | ||
CVE-2022-28958 | D-Link | DIR-816L | 09/08/2022 | 0.00967 | 9.8 | https://viz.greynoise.io/tag/dlink-dir816-rce-attempt||https://viz.greynoise.io/tag/dlink-dir816-rce-attempt | FALSE | FALSE | FALSE | https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10300 | |||
CVE-2018-13374 | Fortinet | FortiOS and FortiADC | 09/08/2022 | 0.02722 | 4.3 | TRUE | TRUE | FALSE | https://www.fortiguard.com/psirt/FG-IR-18-157; https://nvd.nist.gov/vuln/detail/CVE-2018-13374 | ||||
CVE-2022-3075 | Chromium Mojo | 09/08/2022 | 0.01332 | 9.6 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3075; https://nvd.nist.gov/vuln/detail/CVE-2022-3075 | |||||
CVE-2018-7445 | MikroTik | RouterOS | 09/08/2022 | 0.86030 | 9.8 | https://viz.greynoise.io/tag/mikrotik-routeros-smb-buffer-overflow-attempt||https://viz.greynoise.io/tag/mikrotik-routeros-smb-buffer-overflow-attempt | FALSE | TRUE | FALSE | https://www.coresecurity.com/core-labs/advisories/mikrotik-routeros-smb-buffer-overflow#vendor_update, https://mikrotik.com/download; https://nvd.nist.gov/vuln/detail/CVE-2018-7445 | https://vulncheck.com/xdb/a4ebb4cef4b7 | ||
CVE-2017-5521 | NETGEAR | Multiple Devices | 09/08/2022 | 0.94171 | 8.1 | https://viz.greynoise.io/tag/netgear-password-disclosure-attempt||https://viz.greynoise.io/tag/netgear-password-disclosure-attempt | 1 | FALSE | TRUE | TRUE | https://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2017-5521 | ||
CVE-2011-4723 | D-Link | DIR-300 Router | 09/08/2022 | 0.08706 | 5.7 | FALSE | FALSE | FALSE | https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723 | ||||
CVE-2020-9934 | Apple | iOS, iPadOS, and macOS | 09/08/2022 | 0.01965 | 5.5 | FALSE | TRUE | FALSE | https://support.apple.com/en-us/HT211288, https://support.apple.com/en-us/HT211289; https://nvd.nist.gov/vuln/detail/CVE-2020-9934 | ||||
CVE-2011-1823 | Android | Android OS | 09/08/2022 | 0.73728 | 7.8 | FALSE | FALSE | FALSE | https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823 | ||||
CVE-2021-39226 | Grafana Labs | Grafana | 08/25/2022 | 0.94350 | 9.8 | 1 | FALSE | FALSE | FALSE | https://grafana.com/blog/2021/10/05/grafana-7.5.11-and-8.1.6-released-with-critical-security-fix/; https://nvd.nist.gov/vuln/detail/CVE-2021-39226 | |||
CVE-2020-36193 | PEAR | Archive_Tar | 08/25/2022 | 0.79342 | 7.5 | TRUE | FALSE | FALSE | https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193; https://nvd.nist.gov/vuln/detail/CVE-2020-36193 | ||||
CVE-2022-26352 | dotCMS | dotCMS | 08/25/2022 | 0.94264 | 9.8 | https://viz.greynoise.io/tag/dotcms-file-upload-attempt||https://viz.greynoise.io/tag/dotcms-file-upload-attempt | 2 | TRUE | TRUE | FALSE | https://www.dotcms.com/security/SI-62; https://nvd.nist.gov/vuln/detail/CVE-2022-26352 | ||
CVE-2022-22963 | VMware Tanzu | Spring Cloud | 08/25/2022 | 0.94474 | 9.8 | https://viz.greynoise.io/tag/spring-cloud-function-spel-rce-attempt||https://viz.greynoise.io/tag/spring-cloud-function-spel-rce-attempt | 0 | FALSE | TRUE | FALSE | https://tanzu.vmware.com/security/cve-2022-22963; https://nvd.nist.gov/vuln/detail/CVE-2022-22963 | https://vulncheck.com/xdb/e735e076c22d||https://vulncheck.com/xdb/e735e076c22d , https://vulncheck.com/xdb/1066ae419f9b||https://vulncheck.com/xdb/1066ae419f9b , https://vulncheck.com/xdb/28f51035796b||https://vulncheck.com/xdb/28f51035796b , https://vulncheck.com/xdb/c00844238ab5||https://vulncheck.com/xdb/c00844238ab5 , https://vulncheck.com/xdb/8182bb40e66a||https://vulncheck.com/xdb/8182bb40e66a , https://vulncheck.com/xdb/698c9d96f1d6||https://vulncheck.com/xdb/698c9d96f1d6 , https://vulncheck.com/xdb/25acfb6faf58||https://vulncheck.com/xdb/25acfb6faf58 , https://vulncheck.com/xdb/e2c12294de2e||https://vulncheck.com/xdb/e2c12294de2e , https://vulncheck.com/xdb/6857dd5dc99e||https://vulncheck.com/xdb/6857dd5dc99e , https://vulncheck.com/xdb/a1c6ea2e02bc||https://vulncheck.com/xdb/a1c6ea2e02bc , https://vulncheck.com/xdb/5922af7bf5b9||https://vulncheck.com/xdb/5922af7bf5b9 , https://vulncheck.com/xdb/b67b2f1cc825||https://vulncheck.com/xdb/b67b2f1cc825 , https://vulncheck.com/xdb/365b57443ae6||https://vulncheck.com/xdb/365b57443ae6 , https://vulncheck.com/xdb/28fa125e7119||https://vulncheck.com/xdb/28fa125e7119 , https://vulncheck.com/xdb/8fdc0fdf513e||https://vulncheck.com/xdb/8fdc0fdf513e , https://vulncheck.com/xdb/b3ed0886366b||https://vulncheck.com/xdb/b3ed0886366b | |
CVE-2022-24706 | Apache | CouchDB | 08/25/2022 | 0.94412 | 9.8 | https://viz.greynoise.io/tag/apache-couchdb-rce-cve-2022-24706-attempt||https://viz.greynoise.io/tag/apache-couchdb-rce-cve-2022-24706-attempt | FALSE | TRUE | FALSE | https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00; https://nvd.nist.gov/vuln/detail/CVE-2022-24706 | https://vulncheck.com/xdb/3302ea7b22f5||https://vulncheck.com/xdb/3302ea7b22f5 , https://vulncheck.com/xdb/b9f980c9e9d9||https://vulncheck.com/xdb/b9f980c9e9d9 , https://vulncheck.com/xdb/b8f0f62ec11e||https://vulncheck.com/xdb/b8f0f62ec11e , https://vulncheck.com/xdb/6df53e02aaab||https://vulncheck.com/xdb/6df53e02aaab | ||
CVE-2021-38406 | Delta Electronics | DOPSoft 2 | 08/25/2022 | 0.82169 | 7.8 | FALSE | FALSE | FALSE | https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-02; https://nvd.nist.gov/vuln/detail/CVE-2021-38406 | ||||
CVE-2022-24112 | Apache | APISIX | 08/25/2022 | 0.94340 | 9.8 | https://viz.greynoise.io/tag/apache-apisix-rce-attempt||https://viz.greynoise.io/tag/apache-apisix-rce-attempt | 2 | FALSE | TRUE | FALSE | https://lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94; https://nvd.nist.gov/vuln/detail/CVE-2022-24112 | https://vulncheck.com/xdb/6d3274e69e7d||https://vulncheck.com/xdb/6d3274e69e7d , https://vulncheck.com/xdb/567acb29cab1||https://vulncheck.com/xdb/567acb29cab1 , https://vulncheck.com/xdb/697e6089d0d1||https://vulncheck.com/xdb/697e6089d0d1 , https://vulncheck.com/xdb/7d43df93b6e3||https://vulncheck.com/xdb/7d43df93b6e3 , https://vulncheck.com/xdb/36b87ae59b55||https://vulncheck.com/xdb/36b87ae59b55 | |
CVE-2022-2294 | WebRTC | WebRTC | 08/25/2022 | 0.02203 | 8.8 | TRUE | FALSE | FALSE | https://groups.google.com/g/discuss-webrtc/c/5KBtZx2gvcQ; https://nvd.nist.gov/vuln/detail/CVE-2022-2294 | ||||
CVE-2020-28949 | PEAR | Archive_Tar | 08/25/2022 | 0.93057 | 7.8 | TRUE | TRUE | FALSE | https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949; https://nvd.nist.gov/vuln/detail/CVE-2020-28949 | https://vulncheck.com/xdb/b36055977e47 | |||
CVE-2021-31010 | Apple | iOS, macOS, watchOS | 08/25/2022 | 0.01359 | 7.5 | FALSE | FALSE | FALSE | https://support.apple.com/en-us/HT212804, https://support.apple.com/en-us/HT212805, https://support.apple.com/en-us/HT212806, https://support.apple.com/en-us/HT212807, https://support.apple.com/en-us/HT212824; https://nvd.nist.gov/vuln/detail/CVE-2021-31010 | ||||
CVE-2022-0028 | Palo Alto Networks | PAN-OS | 08/22/2022 | 0.05447 | 8.6 | FALSE | FALSE | FALSE | https://security.paloaltonetworks.com/CVE-2022-0028; https://nvd.nist.gov/vuln/detail/CVE-2022-0028 | ||||
CVE-2022-32894 | Apple | iOS and macOS | 08/18/2022 | 0.00338 | 7.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32894 | ||||
CVE-2022-32893 | Apple | iOS and macOS | 08/18/2022 | 0.00145 | 8.8 | FALSE | FALSE | FALSE | https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32893 | ||||
CVE-2022-22536 | SAP | Multiple Products | 08/18/2022 | 0.93898 | 10.0 | https://viz.greynoise.io/tag/http-request-smuggling-attempt||https://viz.greynoise.io/tag/http-request-smuggling-attempt | 1 | FALSE | TRUE | FALSE | SAP users must have an account in order to login and access the patch. https://accounts.sap.com/saml2/idp/sso; https://nvd.nist.gov/vuln/detail/CVE-2022-22536 | https://vulncheck.com/xdb/9187843a104d | |
CVE-2022-26923 | Microsoft | Active Directory | 08/18/2022 | 0.91618 | 8.8 | TRUE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923; https://nvd.nist.gov/vuln/detail/CVE-2022-26923 | https://vulncheck.com/xdb/4b73e57e2b6c||https://vulncheck.com/xdb/4b73e57e2b6c , https://vulncheck.com/xdb/41c7f4689ee0||https://vulncheck.com/xdb/41c7f4689ee0 , https://vulncheck.com/xdb/f701cb67018d||https://vulncheck.com/xdb/f701cb67018d | |||
CVE-2022-21971 | Microsoft | Windows | 08/18/2022 | 0.83939 | 7.8 | FALSE | TRUE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971; https://nvd.nist.gov/vuln/detail/CVE-2022-21971 | https://vulncheck.com/xdb/39981df7046c | |||
CVE-2017-15944 | Palo Alto Networks | PAN-OS | 08/18/2022 | 0.94017 | 9.8 | https://viz.greynoise.io/tag/palo-alto-panos-rce-check||https://viz.greynoise.io/tag/palo-alto-panos-rce-check | 3 | FALSE | TRUE | FALSE | https://security.paloaltonetworks.com/CVE-2017-15944; https://nvd.nist.gov/vuln/detail/CVE-2017-15944 | https://vulncheck.com/xdb/1ae6d431ce23||https://vulncheck.com/xdb/1ae6d431ce23 , https://vulncheck.com/xdb/6fa4d071811c||https://vulncheck.com/xdb/6fa4d071811c , https://vulncheck.com/xdb/bcdd700f4481||https://vulncheck.com/xdb/bcdd700f4481 , https://vulncheck.com/xdb/9868b0da7a73||https://vulncheck.com/xdb/9868b0da7a73 | |
CVE-2022-2856 | Chromium Intents | 08/18/2022 | 0.03079 | 6.5 | FALSE | FALSE | FALSE | https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2022-2856 | |||||
CVE-2022-27925 | Synacor | Zimbra Collaboration Suite (ZCS) | 08/11/2022 | 0.94306 | 7.2 | https://viz.greynoise.io/tag/zimbra-collaboration-suite-rce-cve-2022-27925-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-rce-cve-2022-27925-attempt | TRUE | TRUE | FALSE | https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-27925 | https://vulncheck.com/xdb/d5a6e23307f7||https://vulncheck.com/xdb/d5a6e23307f7 , https://vulncheck.com/xdb/3e7ba25d24e0||https://vulncheck.com/xdb/3e7ba25d24e0 , https://vulncheck.com/xdb/7027aa1cb914||https://vulncheck.com/xdb/7027aa1cb914 , https://vulncheck.com/xdb/a30f3f76e904||https://vulncheck.com/xdb/a30f3f76e904 , https://vulncheck.com/xdb/c3794744db87||https://vulncheck.com/xdb/c3794744db87 , https://vulncheck.com/xdb/ef0204263380||https://vulncheck.com/xdb/ef0204263380 , https://vulncheck.com/xdb/941aad11c8ff||https://vulncheck.com/xdb/941aad11c8ff , https://vulncheck.com/xdb/cf4b91e0fcf4||https://vulncheck.com/xdb/cf4b91e0fcf4 , https://vulncheck.com/xdb/462a8414f903||https://vulncheck.com/xdb/462a8414f903 | ||
CVE-2022-37042 | Synacor | Zimbra Collaboration Suite (ZCS) | 08/11/2022 | 0.94274 | 9.8 | https://viz.greynoise.io/tag/zimbra-collaboration-suite-auth-bypass-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-auth-bypass-attempt | 11 | TRUE | TRUE | FALSE | https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-37042 | https://vulncheck.com/xdb/34da7c0acbe5||https://vulncheck.com/xdb/34da7c0acbe5 , https://vulncheck.com/xdb/8a7f6b96da60||https://vulncheck.com/xdb/8a7f6b96da60 | |
CVE-2022-34713 | Microsoft | Windows | 08/09/2022 | 0.08936 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713; https://nvd.nist.gov/vuln/detail/CVE-2022-34713 | ||||
CVE-2022-30333 | RARLAB | UnRAR | 08/09/2022 | 0.90964 | 7.5 | TRUE | TRUE | FALSE | Vulnerability updated with version 6.12. Accessing link will download update information: https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz; https://nvd.nist.gov/vuln/detail/CVE-2022-30333 | https://vulncheck.com/xdb/2cf5d07b7a85||https://vulncheck.com/xdb/2cf5d07b7a85 , https://vulncheck.com/xdb/470dc3493197||https://vulncheck.com/xdb/470dc3493197 | |||
CVE-2022-27924 | Synacor | Zimbra Collaboration Suite (ZCS) | 08/04/2022 | 0.64074 | 7.5 | TRUE | FALSE | FALSE | https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24.1#Security_Fixes; https://nvd.nist.gov/vuln/detail/CVE-2022-27924 | ||||
CVE-2022-26138 | Atlassian | Confluence | 07/29/2022 | 0.94258 | 9.8 | https://viz.greynoise.io/tag/atlassian-questions-for-confluence-hardcoded-password-attempt||https://viz.greynoise.io/tag/atlassian-questions-for-confluence-hardcoded-password-attempt | 3 | TRUE | TRUE | FALSE | https://confluence.atlassian.com/doc/questions-for-confluence-security-advisory-2022-07-20-1142446709.html; https://nvd.nist.gov/vuln/detail/CVE-2022-26138 | https://vulncheck.com/xdb/873623f6c96a||https://vulncheck.com/xdb/873623f6c96a , https://vulncheck.com/xdb/ab074460fbb8||https://vulncheck.com/xdb/ab074460fbb8 | |
CVE-2022-22047 | Microsoft | Windows | 07/12/2022 | 0.00751 | 7.8 | FALSE | FALSE | FALSE | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047; https://nvd.nist.gov/vuln/detail/CVE-2022-22047 | ||||
CVE-2022-26925 | Microsoft | Windows | 07/01/2022 | 0.35265 | 8.1 | TRUE | FALSE | FALSE | WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.; https://nvd.nist.gov/vuln/detail/CVE-2022-26925 | ||||
CVE-2021-30983 | Apple | iOS and iPadOS | 06/27/2022 | 0.00603 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30983 | ||||
CVE-2021-4034 | Red Hat | Polkit | 06/27/2022 | 0.88711 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-4034 | https://vulncheck.com/xdb/0822b980ab59||https://vulncheck.com/xdb/0822b980ab59 , https://vulncheck.com/xdb/82d76074ec2c||https://vulncheck.com/xdb/82d76074ec2c , https://vulncheck.com/xdb/ca1dec61675d||https://vulncheck.com/xdb/ca1dec61675d , https://vulncheck.com/xdb/dcb8ccccb4a4||https://vulncheck.com/xdb/dcb8ccccb4a4 , https://vulncheck.com/xdb/6ccd3614a0e6||https://vulncheck.com/xdb/6ccd3614a0e6 , https://vulncheck.com/xdb/0a57ebc4b646||https://vulncheck.com/xdb/0a57ebc4b646 , https://vulncheck.com/xdb/7a12f449c111||https://vulncheck.com/xdb/7a12f449c111 , https://vulncheck.com/xdb/28f7b014212a||https://vulncheck.com/xdb/28f7b014212a , https://vulncheck.com/xdb/554bad753eda||https://vulncheck.com/xdb/554bad753eda , https://vulncheck.com/xdb/b7e4df92a4d4||https://vulncheck.com/xdb/b7e4df92a4d4 , https://vulncheck.com/xdb/c615a22c11b5||https://vulncheck.com/xdb/c615a22c11b5 , https://vulncheck.com/xdb/da8065962774||https://vulncheck.com/xdb/da8065962774 , https://vulncheck.com/xdb/4e869d74e438||https://vulncheck.com/xdb/4e869d74e438 , https://vulncheck.com/xdb/af2920365802||https://vulncheck.com/xdb/af2920365802 , https://vulncheck.com/xdb/8edd43972cea||https://vulncheck.com/xdb/8edd43972cea , https://vulncheck.com/xdb/ff2419e574a6||https://vulncheck.com/xdb/ff2419e574a6 , https://vulncheck.com/xdb/3d94e1e3d56f||https://vulncheck.com/xdb/3d94e1e3d56f , https://vulncheck.com/xdb/de924e14635b||https://vulncheck.com/xdb/de924e14635b , https://vulncheck.com/xdb/648c06dea4e8||https://vulncheck.com/xdb/648c06dea4e8 , https://vulncheck.com/xdb/8cbd93d3f54f||https://vulncheck.com/xdb/8cbd93d3f54f , https://vulncheck.com/xdb/a82a11bda873||https://vulncheck.com/xdb/a82a11bda873 , https://vulncheck.com/xdb/8be356a486c4||https://vulncheck.com/xdb/8be356a486c4 , https://vulncheck.com/xdb/96b10f9f9462||https://vulncheck.com/xdb/96b10f9f9462 , https://vulncheck.com/xdb/ee97190e81df||https://vulncheck.com/xdb/ee97190e81df , https://vulncheck.com/xdb/dbff6b3f68a2||https://vulncheck.com/xdb/dbff6b3f68a2 , https://vulncheck.com/xdb/f79d44984be7||https://vulncheck.com/xdb/f79d44984be7 , https://vulncheck.com/xdb/21e6735149ba||https://vulncheck.com/xdb/21e6735149ba , https://vulncheck.com/xdb/15d01c8fd429||https://vulncheck.com/xdb/15d01c8fd429 , https://vulncheck.com/xdb/48c06988841a||https://vulncheck.com/xdb/48c06988841a , https://vulncheck.com/xdb/3bfba57943e6||https://vulncheck.com/xdb/3bfba57943e6 , https://vulncheck.com/xdb/438507d272fa||https://vulncheck.com/xdb/438507d272fa , https://vulncheck.com/xdb/a3f4d60ee73d||https://vulncheck.com/xdb/a3f4d60ee73d , https://vulncheck.com/xdb/3b1f261f3baf||https://vulncheck.com/xdb/3b1f261f3baf , https://vulncheck.com/xdb/5dd88cd8c9e6||https://vulncheck.com/xdb/5dd88cd8c9e6 , https://vulncheck.com/xdb/443c740547a3||https://vulncheck.com/xdb/443c740547a3 , https://vulncheck.com/xdb/3fbc89827712||https://vulncheck.com/xdb/3fbc89827712 , https://vulncheck.com/xdb/39d787f93c25||https://vulncheck.com/xdb/39d787f93c25 , https://vulncheck.com/xdb/398590244678||https://vulncheck.com/xdb/398590244678 , https://vulncheck.com/xdb/8d29d67ad340||https://vulncheck.com/xdb/8d29d67ad340 , https://vulncheck.com/xdb/939114e4914e||https://vulncheck.com/xdb/939114e4914e , https://vulncheck.com/xdb/3e38d35f4014||https://vulncheck.com/xdb/3e38d35f4014 , https://vulncheck.com/xdb/2da3980b43c5||https://vulncheck.com/xdb/2da3980b43c5 , https://vulncheck.com/xdb/5c1b6088a2b9||https://vulncheck.com/xdb/5c1b6088a2b9 , https://vulncheck.com/xdb/f32860e93f99||https://vulncheck.com/xdb/f32860e93f99 , https://vulncheck.com/xdb/1f50a9f9474a||https://vulncheck.com/xdb/1f50a9f9474a , https://vulncheck.com/xdb/a7d202f88e7e||https://vulncheck.com/xdb/a7d202f88e7e , https://vulncheck.com/xdb/0d3ecb1c75fc||https://vulncheck.com/xdb/0d3ecb1c75fc , https://vulncheck.com/xdb/63b2573f076f||https://vulncheck.com/xdb/63b2573f076f , https://vulncheck.com/xdb/148e1dcef753||https://vulncheck.com/xdb/148e1dcef753 , https://vulncheck.com/xdb/7f47a9a77ae8||https://vulncheck.com/xdb/7f47a9a77ae8 , https://vulncheck.com/xdb/4e83675a9d9b||https://vulncheck.com/xdb/4e83675a9d9b , https://vulncheck.com/xdb/96b7b896707c||https://vulncheck.com/xdb/96b7b896707c , https://vulncheck.com/xdb/6bec8c0df126||https://vulncheck.com/xdb/6bec8c0df126 , https://vulncheck.com/xdb/56fa565d9f0d||https://vulncheck.com/xdb/56fa565d9f0d , https://vulncheck.com/xdb/48e01189be2f||https://vulncheck.com/xdb/48e01189be2f , https://vulncheck.com/xdb/fb7cc0ba1dd7||https://vulncheck.com/xdb/fb7cc0ba1dd7 , https://vulncheck.com/xdb/6458cc9b6c90||https://vulncheck.com/xdb/6458cc9b6c90 , https://vulncheck.com/xdb/50a7d45a3497||https://vulncheck.com/xdb/50a7d45a3497 , https://vulncheck.com/xdb/c8939ffa9f47||https://vulncheck.com/xdb/c8939ffa9f47 , https://vulncheck.com/xdb/0602fa69a56f||https://vulncheck.com/xdb/0602fa69a56f , https://vulncheck.com/xdb/3c5ab90e5a59||https://vulncheck.com/xdb/3c5ab90e5a59 , https://vulncheck.com/xdb/ff9f3019c482||https://vulncheck.com/xdb/ff9f3019c482 , https://vulncheck.com/xdb/f6773c8e8540||https://vulncheck.com/xdb/f6773c8e8540 , https://vulncheck.com/xdb/f3c18b402a6e||https://vulncheck.com/xdb/f3c18b402a6e , https://vulncheck.com/xdb/e60dc3425a52||https://vulncheck.com/xdb/e60dc3425a52 , https://vulncheck.com/xdb/f7eb79323eec||https://vulncheck.com/xdb/f7eb79323eec , https://vulncheck.com/xdb/fb1c03042f33||https://vulncheck.com/xdb/fb1c03042f33 , https://vulncheck.com/xdb/acfc56af30a1||https://vulncheck.com/xdb/acfc56af30a1 , https://vulncheck.com/xdb/17b6417968eb||https://vulncheck.com/xdb/17b6417968eb , https://vulncheck.com/xdb/f02cebe5dcc2||https://vulncheck.com/xdb/f02cebe5dcc2 , https://vulncheck.com/xdb/e22fe812e2c8||https://vulncheck.com/xdb/e22fe812e2c8 , https://vulncheck.com/xdb/7b392e48f101||https://vulncheck.com/xdb/7b392e48f101 , https://vulncheck.com/xdb/dc9c347e8516||https://vulncheck.com/xdb/dc9c347e8516 , https://vulncheck.com/xdb/4d2ae30ede35||https://vulncheck.com/xdb/4d2ae30ede35 , https://vulncheck.com/xdb/0b7b8bfadb64||https://vulncheck.com/xdb/0b7b8bfadb64 , https://vulncheck.com/xdb/a851d92d0b6f||https://vulncheck.com/xdb/a851d92d0b6f , https://vulncheck.com/xdb/1f98fd3754fa||https://vulncheck.com/xdb/1f98fd3754fa , https://vulncheck.com/xdb/e53709a1c012||https://vulncheck.com/xdb/e53709a1c012 , https://vulncheck.com/xdb/901cf6699765||https://vulncheck.com/xdb/901cf6699765 , https://vulncheck.com/xdb/5cef827064b0||https://vulncheck.com/xdb/5cef827064b0 , https://vulncheck.com/xdb/5770e6fe3bf8||https://vulncheck.com/xdb/5770e6fe3bf8 , https://vulncheck.com/xdb/2cf2be7ba166||https://vulncheck.com/xdb/2cf2be7ba166 , https://vulncheck.com/xdb/14dd45d27287||https://vulncheck.com/xdb/14dd45d27287 , https://vulncheck.com/xdb/03e0030161c2||https://vulncheck.com/xdb/03e0030161c2 , https://vulncheck.com/xdb/4f033f2ca1da||https://vulncheck.com/xdb/4f033f2ca1da , https://vulncheck.com/xdb/8e64384edb6f||https://vulncheck.com/xdb/8e64384edb6f , https://vulncheck.com/xdb/42cfe42e7d59||https://vulncheck.com/xdb/42cfe42e7d59 , https://vulncheck.com/xdb/8aa7e042d851||https://vulncheck.com/xdb/8aa7e042d851 , https://vulncheck.com/xdb/57f121c7d9ed||https://vulncheck.com/xdb/57f121c7d9ed , https://vulncheck.com/xdb/b56f14805318||https://vulncheck.com/xdb/b56f14805318 , https://vulncheck.com/xdb/1db24935e067||https://vulncheck.com/xdb/1db24935e067 , https://vulncheck.com/xdb/942f4234ebaf||https://vulncheck.com/xdb/942f4234ebaf , https://vulncheck.com/xdb/0dc62d3c155a||https://vulncheck.com/xdb/0dc62d3c155a , https://vulncheck.com/xdb/f591e47123fc||https://vulncheck.com/xdb/f591e47123fc , https://vulncheck.com/xdb/5a6b21dad53f||https://vulncheck.com/xdb/5a6b21dad53f , https://vulncheck.com/xdb/b006b2fe1bf8||https://vulncheck.com/xdb/b006b2fe1bf8 , https://vulncheck.com/xdb/ff0ef95d1a40||https://vulncheck.com/xdb/ff0ef95d1a40 , https://vulncheck.com/xdb/493568e38cd7||https://vulncheck.com/xdb/493568e38cd7 , https://vulncheck.com/xdb/c12e2f1e8b68||https://vulncheck.com/xdb/c12e2f1e8b68 , https://vulncheck.com/xdb/6b8d0b342171||https://vulncheck.com/xdb/6b8d0b342171 , https://vulncheck.com/xdb/6d5efc2b7ff9||https://vulncheck.com/xdb/6d5efc2b7ff9 , https://vulncheck.com/xdb/5e2e4073e0f1||https://vulncheck.com/xdb/5e2e4073e0f1 , https://vulncheck.com/xdb/881ce2b1d4e9||https://vulncheck.com/xdb/881ce2b1d4e9 , https://vulncheck.com/xdb/a6499a9f0ece||https://vulncheck.com/xdb/a6499a9f0ece , https://vulncheck.com/xdb/242a109de376||https://vulncheck.com/xdb/242a109de376 , https://vulncheck.com/xdb/c650576cc1dc||https://vulncheck.com/xdb/c650576cc1dc , https://vulncheck.com/xdb/fcffa308ff36||https://vulncheck.com/xdb/fcffa308ff36 , https://vulncheck.com/xdb/75e973a32ca0||https://vulncheck.com/xdb/75e973a32ca0 , https://vulncheck.com/xdb/2d3bdbe3b846||https://vulncheck.com/xdb/2d3bdbe3b846 , https://vulncheck.com/xdb/f7eb725d575d||https://vulncheck.com/xdb/f7eb725d575d , https://vulncheck.com/xdb/355c6f6064c4||https://vulncheck.com/xdb/355c6f6064c4 , https://vulncheck.com/xdb/9ba9a40cd868||https://vulncheck.com/xdb/9ba9a40cd868 , https://vulncheck.com/xdb/967303c3d942||https://vulncheck.com/xdb/967303c3d942 , https://vulncheck.com/xdb/e6b891d3c91f||https://vulncheck.com/xdb/e6b891d3c91f , https://vulncheck.com/xdb/0d8ebba65e94||https://vulncheck.com/xdb/0d8ebba65e94 , https://vulncheck.com/xdb/30fcd0d191a3||https://vulncheck.com/xdb/30fcd0d191a3 , https://vulncheck.com/xdb/2526c4e141f3||https://vulncheck.com/xdb/2526c4e141f3 , https://vulncheck.com/xdb/244786f0586a||https://vulncheck.com/xdb/244786f0586a , https://vulncheck.com/xdb/48147332ce2b||https://vulncheck.com/xdb/48147332ce2b , https://vulncheck.com/xdb/566964b48b0a||https://vulncheck.com/xdb/566964b48b0a , https://vulncheck.com/xdb/b80421acd99d||https://vulncheck.com/xdb/b80421acd99d , https://vulncheck.com/xdb/343ddc1361a9||https://vulncheck.com/xdb/343ddc1361a9 , https://vulncheck.com/xdb/f0523fed79c3||https://vulncheck.com/xdb/f0523fed79c3 , https://vulncheck.com/xdb/d7f5349cf878||https://vulncheck.com/xdb/d7f5349cf878 , https://vulncheck.com/xdb/bdac5d88146f||https://vulncheck.com/xdb/bdac5d88146f , https://vulncheck.com/xdb/344207902686||https://vulncheck.com/xdb/344207902686 , https://vulncheck.com/xdb/cef0cb4ead97||https://vulncheck.com/xdb/cef0cb4ead97 , https://vulncheck.com/xdb/91cfa39a3866||https://vulncheck.com/xdb/91cfa39a3866 , https://vulncheck.com/xdb/722d83b48dd0||https://vulncheck.com/xdb/722d83b48dd0 , https://vulncheck.com/xdb/aeecf13a2fe2||https://vulncheck.com/xdb/aeecf13a2fe2 , https://vulncheck.com/xdb/f81ade7ce959||https://vulncheck.com/xdb/f81ade7ce959 , https://vulncheck.com/xdb/fc91e648cdb7||https://vulncheck.com/xdb/fc91e648cdb7 , https://vulncheck.com/xdb/df5b9312957b||https://vulncheck.com/xdb/df5b9312957b , https://vulncheck.com/xdb/b46d72a94313||https://vulncheck.com/xdb/b46d72a94313 , https://vulncheck.com/xdb/2355bc59a8b4||https://vulncheck.com/xdb/2355bc59a8b4 , https://vulncheck.com/xdb/2fbfcd89b625||https://vulncheck.com/xdb/2fbfcd89b625 , https://vulncheck.com/xdb/fe47fe6ea534||https://vulncheck.com/xdb/fe47fe6ea534 , https://vulncheck.com/xdb/306f7e9e244b||https://vulncheck.com/xdb/306f7e9e244b , https://vulncheck.com/xdb/5008ad912a6b||https://vulncheck.com/xdb/5008ad912a6b , https://vulncheck.com/xdb/5580126ba38c||https://vulncheck.com/xdb/5580126ba38c , https://vulncheck.com/xdb/273b1f8f417f||https://vulncheck.com/xdb/273b1f8f417f , https://vulncheck.com/xdb/5cbdc401e4c7||https://vulncheck.com/xdb/5cbdc401e4c7 , https://vulncheck.com/xdb/5cdf60043d8c||https://vulncheck.com/xdb/5cdf60043d8c | |||
CVE-2020-9907 | Apple | Multiple Products | 06/27/2022 | 0.01455 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-9907 | ||||
CVE-2021-30533 | Chromium PopupBlocker | 06/27/2022 | 0.06193 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30533 | |||||
CVE-2018-4344 | Apple | Multiple Products | 06/27/2022 | 0.00462 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-4344 | ||||
CVE-2020-3837 | Apple | Multiple Products | 06/27/2022 | 0.08588 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3837 | ||||
CVE-2022-29499 | Mitel | MiVoice Connect | 06/27/2022 | 0.89829 | 9.8 | https://viz.greynoise.io/tag/mitel-mivoice-connect-ssrf-cve-2022-29499-attempt||https://viz.greynoise.io/tag/mitel-mivoice-connect-ssrf-cve-2022-29499-attempt | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-29499 | |||
CVE-2019-8605 | Apple | Multiple Products | 06/27/2022 | 0.09803 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-8605 | https://vulncheck.com/xdb/e1003c53cc92||https://vulncheck.com/xdb/e1003c53cc92 , https://vulncheck.com/xdb/05dcb535155a||https://vulncheck.com/xdb/05dcb535155a | |||
CVE-2022-30190 | Microsoft | Windows | 06/14/2022 | 0.93429 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-30190 | https://vulncheck.com/xdb/ce385fe1282f||https://vulncheck.com/xdb/ce385fe1282f , https://vulncheck.com/xdb/15bf7cdea333||https://vulncheck.com/xdb/15bf7cdea333 , https://vulncheck.com/xdb/4fa26719340c||https://vulncheck.com/xdb/4fa26719340c , https://vulncheck.com/xdb/e03a55c6cfd8||https://vulncheck.com/xdb/e03a55c6cfd8 , https://vulncheck.com/xdb/4fb550777afd||https://vulncheck.com/xdb/4fb550777afd , https://vulncheck.com/xdb/b4cb973319f6||https://vulncheck.com/xdb/b4cb973319f6 , https://vulncheck.com/xdb/c5f95b440666||https://vulncheck.com/xdb/c5f95b440666 , https://vulncheck.com/xdb/39be3db1c3a9||https://vulncheck.com/xdb/39be3db1c3a9 , https://vulncheck.com/xdb/c22411de313c||https://vulncheck.com/xdb/c22411de313c , https://vulncheck.com/xdb/23ec9e87f75c||https://vulncheck.com/xdb/23ec9e87f75c , https://vulncheck.com/xdb/cdbdee6a1fd2||https://vulncheck.com/xdb/cdbdee6a1fd2 , https://vulncheck.com/xdb/bc38656013e9||https://vulncheck.com/xdb/bc38656013e9 , https://vulncheck.com/xdb/1b8342efad20||https://vulncheck.com/xdb/1b8342efad20 , https://vulncheck.com/xdb/f09c047235a9||https://vulncheck.com/xdb/f09c047235a9 , https://vulncheck.com/xdb/ec804773a346||https://vulncheck.com/xdb/ec804773a346 , https://vulncheck.com/xdb/c00e3fafa938||https://vulncheck.com/xdb/c00e3fafa938 , https://vulncheck.com/xdb/f87cc7447ce1||https://vulncheck.com/xdb/f87cc7447ce1 , https://vulncheck.com/xdb/b388e145f6cf||https://vulncheck.com/xdb/b388e145f6cf , https://vulncheck.com/xdb/eb69721d55b4||https://vulncheck.com/xdb/eb69721d55b4 , https://vulncheck.com/xdb/9e20f124a34a||https://vulncheck.com/xdb/9e20f124a34a , https://vulncheck.com/xdb/70970cd2ac26||https://vulncheck.com/xdb/70970cd2ac26 , https://vulncheck.com/xdb/fd7c95a5f90f||https://vulncheck.com/xdb/fd7c95a5f90f , https://vulncheck.com/xdb/3aa02158ccc4||https://vulncheck.com/xdb/3aa02158ccc4 , https://vulncheck.com/xdb/030dab3ef947||https://vulncheck.com/xdb/030dab3ef947 , https://vulncheck.com/xdb/05001d61d2a9||https://vulncheck.com/xdb/05001d61d2a9 | |||
CVE-2016-2388 | SAP | NetWeaver | 06/09/2022 | 0.58230 | 5.3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-2388 | https://vulncheck.com/xdb/c34824a10b75 | |||
CVE-2016-2386 | SAP | NetWeaver | 06/09/2022 | 0.43189 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-2386 | https://vulncheck.com/xdb/a6e1ca13fa66||https://vulncheck.com/xdb/a6e1ca13fa66 , https://vulncheck.com/xdb/a1ec325bed83||https://vulncheck.com/xdb/a1ec325bed83 | |||
CVE-2021-38163 | SAP | NetWeaver | 06/09/2022 | 0.88372 | 9.9 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38163 | https://vulncheck.com/xdb/f849d74a8cfd||https://vulncheck.com/xdb/f849d74a8cfd , https://vulncheck.com/xdb/f2e5e933e053||https://vulncheck.com/xdb/f2e5e933e053 | |||
CVE-2018-17480 | Chromium V8 | 06/08/2022 | 0.30285 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-17480 | |||||
CVE-2017-5070 | Chromium V8 | 06/08/2022 | 0.80300 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-5070 | |||||
CVE-2008-0655 | Adobe | Acrobat and Reader | 06/08/2022 | 0.71023 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2008-0655 | ||||
CVE-2012-0754 | Adobe | Flash Player | 06/08/2022 | 0.93101 | 8.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0754 | ||||
CVE-2011-0609 | Adobe | Flash Player | 06/08/2022 | 0.92675 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-0609 | ||||
CVE-2018-6065 | Chromium V8 | 06/08/2022 | 0.88889 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-6065 | https://vulncheck.com/xdb/e7c218d4bb1a | ||||
CVE-2011-2462 | Adobe | Acrobat and Reader | 06/08/2022 | 0.92550 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-2462 | ||||
CVE-2016-1646 | Chromium V8 | 06/08/2022 | 0.71874 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-1646 | |||||
CVE-2019-7192 | QNAP | Photo Station | 06/08/2022 | 0.94298 | 9.8 | https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt | 6 | TRUE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2019-7192 | https://vulncheck.com/xdb/aa44f54dfe37 | |
CVE-2013-1331 | Microsoft | Office | 06/08/2022 | 0.86622 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-1331 | ||||
CVE-2012-0151 | Microsoft | Windows | 06/08/2022 | 0.88523 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0151 | ||||
CVE-2007-5659 | Adobe | Acrobat and Reader | 06/08/2022 | 0.93247 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2007-5659 | ||||
CVE-2019-7193 | QNAP | QTS | 06/08/2022 | 0.58429 | 9.8 | https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7193 | |||
CVE-2010-2883 | Adobe | Acrobat and Reader | 06/08/2022 | 0.93216 | 7.3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-2883 | ||||
CVE-2012-5054 | Adobe | Flash Player | 06/08/2022 | 0.70117 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-5054 | ||||
CVE-2009-4324 | Adobe | Acrobat and Reader | 06/08/2022 | 0.93498 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-4324 | ||||
CVE-2016-5198 | Chromium V8 | 06/08/2022 | 0.74718 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-5198 | |||||
CVE-2019-5825 | Chromium V8 | 06/08/2022 | 0.77431 | 6.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-5825 | https://vulncheck.com/xdb/0b54c4eee1ca | ||||
CVE-2009-3953 | Adobe | Acrobat and Reader | 06/08/2022 | 0.90514 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-3953 | ||||
CVE-2009-0557 | Microsoft | Office | 06/08/2022 | 0.83015 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-0557 | ||||
CVE-2006-2492 | Microsoft | Word | 06/08/2022 | 0.74716 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2006-2492 | ||||
CVE-2010-2572 | Microsoft | PowerPoint | 06/08/2022 | 0.69871 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-2572 | ||||
CVE-2009-1862 | Adobe | Acrobat and Reader, Flash Player | 06/08/2022 | 0.57995 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-1862 | ||||
CVE-2012-4969 | Microsoft | Internet Explorer | 06/08/2022 | 0.93147 | 8.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-4969 | ||||
CVE-2009-0563 | Microsoft | Office | 06/08/2022 | 0.77797 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-0563 | ||||
CVE-2012-0767 | Adobe | Flash Player | 06/08/2022 | 0.16382 | 6.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0767 | ||||
CVE-2012-1889 | Microsoft | XML Core Services | 06/08/2022 | 0.92143 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1889 | https://vulncheck.com/xdb/6d2b0550c86e | |||
CVE-2017-6862 | NETGEAR | Multiple Devices | 06/08/2022 | 0.58696 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6862 | ||||
CVE-2019-7194 | QNAP | Photo Station | 06/08/2022 | 0.89163 | 9.8 | https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7194 | |||
CVE-2018-17463 | Chromium V8 | 06/08/2022 | 0.91128 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-17463 | https://vulncheck.com/xdb/d8e2ff9c09ba||https://vulncheck.com/xdb/d8e2ff9c09ba , https://vulncheck.com/xdb/0b8ebcbe653d||https://vulncheck.com/xdb/0b8ebcbe653d | ||||
CVE-2010-1297 | Adobe | Flash Player | 06/08/2022 | 0.93679 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-1297 | ||||
CVE-2022-31460 | Owl Labs | Meeting Owl Pro and Whiteboard Owl | 06/08/2022 | 0.04810 | 7.4 | FALSE | FALSE | FALSE | |||||
CVE-2019-7195 | QNAP | Photo Station | 06/08/2022 | 0.89510 | 9.8 | https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7195 | |||
CVE-2018-4990 | Adobe | Acrobat and Reader | 06/08/2022 | 0.60065 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-4990 | ||||
CVE-2017-5030 | Chromium V8 | 06/08/2022 | 0.67597 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-5030 | |||||
CVE-2019-15271 | Cisco | RV Series Routers | 06/08/2022 | 0.10945 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-15271 | ||||
CVE-2022-26134 | Atlassian | Confluence Server/Data Center | 06/02/2022 | 0.94426 | 9.8 | https://viz.greynoise.io/tag/atlassian-confluence-server-cve-2022-26134-ognl-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-cve-2022-26134-ognl-injection-attempt | 25 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26134 | https://vulncheck.com/xdb/9fecf5c3535a||https://vulncheck.com/xdb/9fecf5c3535a , https://vulncheck.com/xdb/d8d2a4e09b27||https://vulncheck.com/xdb/d8d2a4e09b27 , https://vulncheck.com/xdb/3e4ac0104159||https://vulncheck.com/xdb/3e4ac0104159 , https://vulncheck.com/xdb/39e06de0be1f||https://vulncheck.com/xdb/39e06de0be1f , https://vulncheck.com/xdb/86443907f2d8||https://vulncheck.com/xdb/86443907f2d8 , https://vulncheck.com/xdb/c75d37232bc3||https://vulncheck.com/xdb/c75d37232bc3 , https://vulncheck.com/xdb/eb21e9bfe5eb||https://vulncheck.com/xdb/eb21e9bfe5eb , https://vulncheck.com/xdb/61805bb30396||https://vulncheck.com/xdb/61805bb30396 , https://vulncheck.com/xdb/6f9382355146||https://vulncheck.com/xdb/6f9382355146 , https://vulncheck.com/xdb/aa3c74a7faf0||https://vulncheck.com/xdb/aa3c74a7faf0 , https://vulncheck.com/xdb/addd382b1e54||https://vulncheck.com/xdb/addd382b1e54 , https://vulncheck.com/xdb/842a7b278086||https://vulncheck.com/xdb/842a7b278086 , https://vulncheck.com/xdb/6faa1c9d88f6||https://vulncheck.com/xdb/6faa1c9d88f6 , https://vulncheck.com/xdb/dc2f3c02f8d4||https://vulncheck.com/xdb/dc2f3c02f8d4 , https://vulncheck.com/xdb/d673882b1749||https://vulncheck.com/xdb/d673882b1749 , https://vulncheck.com/xdb/628331d44c34||https://vulncheck.com/xdb/628331d44c34 , https://vulncheck.com/xdb/4a62fb975d25||https://vulncheck.com/xdb/4a62fb975d25 , https://vulncheck.com/xdb/546df2d43760||https://vulncheck.com/xdb/546df2d43760 , https://vulncheck.com/xdb/84304f834234||https://vulncheck.com/xdb/84304f834234 , https://vulncheck.com/xdb/5b4caf96d2c6||https://vulncheck.com/xdb/5b4caf96d2c6 , https://vulncheck.com/xdb/648550535509||https://vulncheck.com/xdb/648550535509 , https://vulncheck.com/xdb/4dd293ad4c62||https://vulncheck.com/xdb/4dd293ad4c62 , https://vulncheck.com/xdb/33ae84bef451||https://vulncheck.com/xdb/33ae84bef451 , https://vulncheck.com/xdb/bf4a212e429b||https://vulncheck.com/xdb/bf4a212e429b , https://vulncheck.com/xdb/b0ddf8e8e190||https://vulncheck.com/xdb/b0ddf8e8e190 , https://vulncheck.com/xdb/14047453ba17||https://vulncheck.com/xdb/14047453ba17 , https://vulncheck.com/xdb/6e3b669985c0||https://vulncheck.com/xdb/6e3b669985c0 , https://vulncheck.com/xdb/68a67174cffb||https://vulncheck.com/xdb/68a67174cffb , https://vulncheck.com/xdb/ccf22111c515||https://vulncheck.com/xdb/ccf22111c515 , https://vulncheck.com/xdb/610e8ac40120||https://vulncheck.com/xdb/610e8ac40120 , https://vulncheck.com/xdb/e68dc3f67ff5||https://vulncheck.com/xdb/e68dc3f67ff5 , https://vulncheck.com/xdb/0e38e7f0c998||https://vulncheck.com/xdb/0e38e7f0c998 , https://vulncheck.com/xdb/b8975356b7ec||https://vulncheck.com/xdb/b8975356b7ec , https://vulncheck.com/xdb/556ef02d9595||https://vulncheck.com/xdb/556ef02d9595 , https://vulncheck.com/xdb/fe6b0b57fa24||https://vulncheck.com/xdb/fe6b0b57fa24 , https://vulncheck.com/xdb/36e25b480581||https://vulncheck.com/xdb/36e25b480581 , https://vulncheck.com/xdb/afb357664032||https://vulncheck.com/xdb/afb357664032 , https://vulncheck.com/xdb/66716e60c64a||https://vulncheck.com/xdb/66716e60c64a , https://vulncheck.com/xdb/6e612cea3dda||https://vulncheck.com/xdb/6e612cea3dda | |
CVE-2015-2360 | Microsoft | Win32k | 05/25/2022 | 0.05865 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2360 | ||||
CVE-2013-3993 | IBM | InfoSphere BigInsights | 05/25/2022 | 0.13220 | 6.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3993 | ||||
CVE-2015-4495 | Mozilla | Firefox | 05/25/2022 | 0.75940 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-4495 | ||||
CVE-2014-4148 | Microsoft | Windows | 05/25/2022 | 0.29976 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4148 | ||||
CVE-2015-0016 | Microsoft | Windows | 05/25/2022 | 0.91858 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0016 | ||||
CVE-2014-0546 | Adobe | Acrobat and Reader | 05/25/2022 | 0.16664 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0546 | ||||
CVE-2013-0422 | Oracle | Java Runtime Environment (JRE) | 05/25/2022 | 0.93647 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0422 | ||||
CVE-2013-2423 | Oracle | Java Runtime Environment (JRE) | 05/25/2022 | 0.93539 | 3.7 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-2423 | ||||
CVE-2010-1428 | Red Hat | JBoss | 05/25/2022 | 0.64971 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-1428 | ||||
CVE-2014-3153 | Linux | Kernel | 05/25/2022 | 0.82357 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-3153 | https://vulncheck.com/xdb/d3ba259b964e||https://vulncheck.com/xdb/d3ba259b964e , https://vulncheck.com/xdb/476b6caadabb||https://vulncheck.com/xdb/476b6caadabb , https://vulncheck.com/xdb/6457f28f2fe3||https://vulncheck.com/xdb/6457f28f2fe3 , https://vulncheck.com/xdb/406d42ee9247||https://vulncheck.com/xdb/406d42ee9247 , https://vulncheck.com/xdb/5a9f900eacd4||https://vulncheck.com/xdb/5a9f900eacd4 , https://vulncheck.com/xdb/c58b69fea619||https://vulncheck.com/xdb/c58b69fea619 | |||
CVE-2015-1769 | Microsoft | Windows | 05/25/2022 | 0.10775 | 6.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1769 | ||||
CVE-2016-3393 | Microsoft | Windows | 05/25/2022 | 0.29859 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3393 | ||||
CVE-2014-2817 | Microsoft | Internet Explorer | 05/25/2022 | 0.19808 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-2817 | ||||
CVE-2016-1010 | Adobe | Flash Player and AIR | 05/25/2022 | 0.28792 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-1010 | ||||
CVE-2015-0071 | Microsoft | Internet Explorer | 05/25/2022 | 0.35046 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0071 | ||||
CVE-2019-3010 | Oracle | Solaris | 05/25/2022 | 0.35865 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-3010 | https://vulncheck.com/xdb/1e5824c4ab7a | |||
CVE-2015-6175 | Microsoft | Windows | 05/25/2022 | 0.01742 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-6175 | ||||
CVE-2013-3896 | Microsoft | Silverlight | 05/25/2022 | 0.80331 | 5.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3896 | ||||
CVE-2010-0840 | Oracle | Java Runtime Environment (JRE) | 05/25/2022 | 0.92616 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-0840 | ||||
CVE-2015-0310 | Adobe | Flash Player | 05/25/2022 | 0.40551 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0310 | ||||
CVE-2014-8439 | Adobe | Flash Player | 05/25/2022 | 0.31479 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-8439 | ||||
CVE-2013-7331 | Microsoft | Internet Explorer | 05/25/2022 | 0.85642 | 6.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-7331 | ||||
CVE-2014-4077 | Microsoft | Input Method Editor (IME) Japanese | 05/25/2022 | 0.29560 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4077 | ||||
CVE-2015-1671 | Microsoft | Windows | 05/25/2022 | 0.74124 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1671 | ||||
CVE-2015-2425 | Microsoft | Internet Explorer | 05/25/2022 | 0.40446 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2425 | ||||
CVE-2016-0034 | Microsoft | Silverlight | 05/25/2022 | 0.43433 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0034 | ||||
CVE-2015-8651 | Adobe | Flash Player | 05/25/2022 | 0.89783 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-8651 | ||||
CVE-2013-0074 | Microsoft | Silverlight | 05/25/2022 | 0.93054 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0074 | ||||
CVE-2014-4123 | Microsoft | Internet Explorer | 05/25/2022 | 0.17914 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4123 | ||||
CVE-2016-0984 | Adobe | Flash Player and AIR | 05/25/2022 | 0.67641 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0984 | ||||
CVE-2012-1710 | Oracle | Fusion Middleware | 05/25/2022 | 0.74567 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1710 | ||||
CVE-2013-0431 | Oracle | Java Runtime Environment (JRE) | 05/25/2022 | 0.91587 | 5.3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0431 | ||||
CVE-2010-0738 | Red Hat | JBoss | 05/25/2022 | 0.92458 | 5.3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-0738 | ||||
CVE-2016-7256 | Microsoft | Windows | 05/25/2022 | 0.50761 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7256 | ||||
CVE-2016-4656 | Apple | iOS | 05/24/2022 | 0.69019 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4656 | ||||
CVE-2016-4657 | Apple | iOS | 05/24/2022 | 0.78192 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4657 | https://vulncheck.com/xdb/e2f10ce0ea66||https://vulncheck.com/xdb/e2f10ce0ea66 , https://vulncheck.com/xdb/682e7cc60ee0||https://vulncheck.com/xdb/682e7cc60ee0 , https://vulncheck.com/xdb/86ce9e51f6fd||https://vulncheck.com/xdb/86ce9e51f6fd | |||
CVE-2017-0149 | Microsoft | Internet Explorer | 05/24/2022 | 0.29481 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0149 | ||||
CVE-2017-0147 | Microsoft | SMBv1 server | 05/24/2022 | 0.92418 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0147 | ||||
CVE-2017-8543 | Microsoft | Windows | 05/24/2022 | 0.75252 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8543 | ||||
CVE-2016-6366 | Cisco | Adaptive Security Appliance (ASA) | 05/24/2022 | 0.91801 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-6366 | https://vulncheck.com/xdb/4d9d31fa7b9e||https://vulncheck.com/xdb/4d9d31fa7b9e , https://vulncheck.com/xdb/b78b17da0cfd||https://vulncheck.com/xdb/b78b17da0cfd | |||
CVE-2016-4655 | Apple | iOS | 05/24/2022 | 0.82450 | 5.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4655 | https://vulncheck.com/xdb/7f6e9c5ac8a8 | |||
CVE-2017-0005 | Microsoft | Windows | 05/24/2022 | 0.10057 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0005 | https://vulncheck.com/xdb/0894a2e08694 | |||
CVE-2018-19949 | QNAP | Network Attached Storage (NAS) | 05/24/2022 | 0.57621 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-19949 | ||||
CVE-2017-0022 | Microsoft | XML Core Services | 05/24/2022 | 0.48804 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0022 | ||||
CVE-2017-18362 | Kaseya | Virtual System/Server Administrator (VSA) | 05/24/2022 | 0.46205 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-18362 | ||||
CVE-2016-3351 | Microsoft | Internet Explorer and Edge | 05/24/2022 | 0.59448 | 6.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3351 | ||||
CVE-2018-19943 | QNAP | Network Attached Storage (NAS) | 05/24/2022 | 0.10255 | 8.0 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-19943 | ||||
CVE-2016-0162 | Microsoft | Internet Explorer | 05/24/2022 | 0.19010 | 4.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0162 | ||||
CVE-2017-0210 | Microsoft | Internet Explorer | 05/24/2022 | 0.22615 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0210 | ||||
CVE-2017-8291 | Artifex | Ghostscript | 05/24/2022 | 0.92675 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8291 | https://vulncheck.com/xdb/f15ef2684963||https://vulncheck.com/xdb/f15ef2684963 , https://vulncheck.com/xdb/094166e5b7b5||https://vulncheck.com/xdb/094166e5b7b5 , https://vulncheck.com/xdb/32af267712cb||https://vulncheck.com/xdb/32af267712cb | |||
CVE-2016-6367 | Cisco | Adaptive Security Appliance (ASA) | 05/24/2022 | 0.23087 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-6367 | ||||
CVE-2018-19953 | QNAP | Network Attached Storage (NAS) | 05/24/2022 | 0.40146 | 6.1 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-19953 | ||||
CVE-2018-8611 | Microsoft | Windows | 05/24/2022 | 0.06510 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8611 | https://vulncheck.com/xdb/8342f589a1bd | |||
CVE-2016-3298 | Microsoft | Internet Explorer | 05/24/2022 | 0.27734 | 6.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3298 | ||||
CVE-2019-18426 | Meta Platforms | 05/23/2022 | 0.57339 | 8.2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-18426 | |||||
CVE-2021-30883 | Apple | Multiple Products | 05/23/2022 | 0.00444 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30883 | https://vulncheck.com/xdb/521ee8c9f2b3 | |||
CVE-2019-8720 | WebKitGTK | WebKitGTK | 05/23/2022 | 0.08241 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-8720 | ||||
CVE-2020-0638 | Microsoft | Update Notification Manager | 05/23/2022 | 0.07187 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0638 | ||||
CVE-2019-1130 | Microsoft | Windows | 05/23/2022 | 0.04095 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1130 | ||||
CVE-2018-8589 | Microsoft | Win32k | 05/23/2022 | 0.05524 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8589 | ||||
CVE-2019-11708 | Mozilla | Firefox and Thunderbird | 05/23/2022 | 0.62964 | 10.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11708 | https://vulncheck.com/xdb/5cf17684b0a0||https://vulncheck.com/xdb/5cf17684b0a0 , https://vulncheck.com/xdb/06ea94b0dfdc||https://vulncheck.com/xdb/06ea94b0dfdc , https://vulncheck.com/xdb/be2e1d3c8a14||https://vulncheck.com/xdb/be2e1d3c8a14 | |||
CVE-2021-0920 | Android | Kernel | 05/23/2022 | 0.00510 | 6.4 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-0920 | ||||
CVE-2019-5786 | Chrome Blink | 05/23/2022 | 0.90281 | 6.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-5786 | https://vulncheck.com/xdb/b7d5385c6094||https://vulncheck.com/xdb/b7d5385c6094 , https://vulncheck.com/xdb/5d48649bb47a||https://vulncheck.com/xdb/5d48649bb47a , https://vulncheck.com/xdb/87f2d6f034f9||https://vulncheck.com/xdb/87f2d6f034f9 | ||||
CVE-2019-7286 | Apple | Multiple Products | 05/23/2022 | 0.01627 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7286 | ||||
CVE-2019-0703 | Microsoft | Windows | 05/23/2022 | 0.08842 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0703 | ||||
CVE-2019-0880 | Microsoft | Windows | 05/23/2022 | 0.01370 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0880 | ||||
CVE-2019-11707 | Mozilla | Firefox and Thunderbird | 05/23/2022 | 0.84214 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11707 | https://vulncheck.com/xdb/f32e1037e391||https://vulncheck.com/xdb/f32e1037e391 , https://vulncheck.com/xdb/20099b4eda22||https://vulncheck.com/xdb/20099b4eda22 | |||
CVE-2020-1027 | Microsoft | Windows | 05/23/2022 | 0.13396 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1027 | ||||
CVE-2022-20821 | Cisco | IOS XR | 05/23/2022 | 0.13178 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20821 | ||||
CVE-2018-5002 | Adobe | Flash Player | 05/23/2022 | 0.37375 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-5002 | ||||
CVE-2019-7287 | Apple | iOS | 05/23/2022 | 0.04076 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7287 | ||||
CVE-2019-1385 | Microsoft | Windows | 05/23/2022 | 0.00381 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1385 | ||||
CVE-2021-1048 | Android | Kernel | 05/23/2022 | 0.01486 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1048 | ||||
CVE-2019-13720 | Chrome WebAudio | 05/23/2022 | 0.90359 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-13720 | https://vulncheck.com/xdb/a67a66f67e9e | ||||
CVE-2019-0676 | Microsoft | Internet Explorer | 05/23/2022 | 0.29573 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0676 | ||||
CVE-2022-22947 | VMware | Spring Cloud Gateway | 05/16/2022 | 0.94474 | 10.0 | https://viz.greynoise.io/tag/spring-cloud-gateway-code-injection-attempt||https://viz.greynoise.io/tag/spring-cloud-gateway-code-injection-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22947 | https://vulncheck.com/xdb/afa67d1ce366||https://vulncheck.com/xdb/afa67d1ce366 , https://vulncheck.com/xdb/e911b1c2597f||https://vulncheck.com/xdb/e911b1c2597f , https://vulncheck.com/xdb/6eeb91b260d2||https://vulncheck.com/xdb/6eeb91b260d2 , https://vulncheck.com/xdb/3e6c0320c020||https://vulncheck.com/xdb/3e6c0320c020 , https://vulncheck.com/xdb/7bc2856e5f63||https://vulncheck.com/xdb/7bc2856e5f63 , https://vulncheck.com/xdb/d03fdfb98036||https://vulncheck.com/xdb/d03fdfb98036 , https://vulncheck.com/xdb/497a7868a7f8||https://vulncheck.com/xdb/497a7868a7f8 , https://vulncheck.com/xdb/e709c7824d6f||https://vulncheck.com/xdb/e709c7824d6f , https://vulncheck.com/xdb/1c0791ff43d4||https://vulncheck.com/xdb/1c0791ff43d4 , https://vulncheck.com/xdb/32e3404666d2||https://vulncheck.com/xdb/32e3404666d2 , https://vulncheck.com/xdb/2665970cc7d0||https://vulncheck.com/xdb/2665970cc7d0 , https://vulncheck.com/xdb/ee5d2b5c3f92||https://vulncheck.com/xdb/ee5d2b5c3f92 , https://vulncheck.com/xdb/ef11176b296d||https://vulncheck.com/xdb/ef11176b296d , https://vulncheck.com/xdb/66245b597db0||https://vulncheck.com/xdb/66245b597db0 , https://vulncheck.com/xdb/bd2a06bbd8bb||https://vulncheck.com/xdb/bd2a06bbd8bb , https://vulncheck.com/xdb/a02abe0b70a0||https://vulncheck.com/xdb/a02abe0b70a0 , https://vulncheck.com/xdb/06a474d9b7ec||https://vulncheck.com/xdb/06a474d9b7ec , https://vulncheck.com/xdb/0751146bcae7||https://vulncheck.com/xdb/0751146bcae7 , https://vulncheck.com/xdb/0e346534d99c||https://vulncheck.com/xdb/0e346534d99c , https://vulncheck.com/xdb/e7ca8c762802||https://vulncheck.com/xdb/e7ca8c762802 , https://vulncheck.com/xdb/fd72b929a3ae||https://vulncheck.com/xdb/fd72b929a3ae , https://vulncheck.com/xdb/9344fae60775||https://vulncheck.com/xdb/9344fae60775 , https://vulncheck.com/xdb/769ad48809b9||https://vulncheck.com/xdb/769ad48809b9 , https://vulncheck.com/xdb/a48d3f6ecc63||https://vulncheck.com/xdb/a48d3f6ecc63 | |
CVE-2022-30525 | Zyxel | Multiple Firewalls | 05/16/2022 | 0.94445 | 9.8 | https://viz.greynoise.io/tag/zyxel-fw-unauthenticated-remote-command-injection-attempt||https://viz.greynoise.io/tag/zyxel-fw-unauthenticated-remote-command-injection-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-30525 | https://vulncheck.com/xdb/bb42ffd583c7||https://vulncheck.com/xdb/bb42ffd583c7 , https://vulncheck.com/xdb/fae80e0c7f01||https://vulncheck.com/xdb/fae80e0c7f01 , https://vulncheck.com/xdb/f52f29d8e852||https://vulncheck.com/xdb/f52f29d8e852 , https://vulncheck.com/xdb/e15afba00994||https://vulncheck.com/xdb/e15afba00994 , https://vulncheck.com/xdb/6355edd8b2d3||https://vulncheck.com/xdb/6355edd8b2d3 | |
CVE-2022-1388 | F5 | BIG-IP | 05/10/2022 | 0.94456 | 9.8 | https://viz.greynoise.io/tag/f5-big-ip-icontrol-rest-authentication-bypass-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rest-authentication-bypass-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-1388 | https://vulncheck.com/xdb/a338399b9740||https://vulncheck.com/xdb/a338399b9740 , https://vulncheck.com/xdb/7c3dfa418e9d||https://vulncheck.com/xdb/7c3dfa418e9d , https://vulncheck.com/xdb/e391ecaf162b||https://vulncheck.com/xdb/e391ecaf162b , https://vulncheck.com/xdb/4b67e5ac9d66||https://vulncheck.com/xdb/4b67e5ac9d66 , https://vulncheck.com/xdb/f8e5e3946332||https://vulncheck.com/xdb/f8e5e3946332 , https://vulncheck.com/xdb/c5dcb13ada50||https://vulncheck.com/xdb/c5dcb13ada50 , https://vulncheck.com/xdb/e8d37213acfb||https://vulncheck.com/xdb/e8d37213acfb , https://vulncheck.com/xdb/fed4ce564309||https://vulncheck.com/xdb/fed4ce564309 , https://vulncheck.com/xdb/86b7a33d25f4||https://vulncheck.com/xdb/86b7a33d25f4 , https://vulncheck.com/xdb/d47c793055aa||https://vulncheck.com/xdb/d47c793055aa , https://vulncheck.com/xdb/a0cd074f32a8||https://vulncheck.com/xdb/a0cd074f32a8 , https://vulncheck.com/xdb/39da6fb6bae8||https://vulncheck.com/xdb/39da6fb6bae8 , https://vulncheck.com/xdb/4f60c165a253||https://vulncheck.com/xdb/4f60c165a253 , https://vulncheck.com/xdb/bf15a5b1ddea||https://vulncheck.com/xdb/bf15a5b1ddea , https://vulncheck.com/xdb/eaac7855e8ba||https://vulncheck.com/xdb/eaac7855e8ba , https://vulncheck.com/xdb/c5bc057dd650||https://vulncheck.com/xdb/c5bc057dd650 , https://vulncheck.com/xdb/1beebdc63339||https://vulncheck.com/xdb/1beebdc63339 , https://vulncheck.com/xdb/6f0d150b9526||https://vulncheck.com/xdb/6f0d150b9526 , https://vulncheck.com/xdb/5a2182b56ffd||https://vulncheck.com/xdb/5a2182b56ffd , https://vulncheck.com/xdb/f174aa99be3a||https://vulncheck.com/xdb/f174aa99be3a , https://vulncheck.com/xdb/db69e56a1a55||https://vulncheck.com/xdb/db69e56a1a55 , https://vulncheck.com/xdb/4ecf220a775e||https://vulncheck.com/xdb/4ecf220a775e , https://vulncheck.com/xdb/92cfa936edec||https://vulncheck.com/xdb/92cfa936edec , https://vulncheck.com/xdb/284187c7cc92||https://vulncheck.com/xdb/284187c7cc92 , https://vulncheck.com/xdb/1e755f4e5a91||https://vulncheck.com/xdb/1e755f4e5a91 , https://vulncheck.com/xdb/4e0a09831520||https://vulncheck.com/xdb/4e0a09831520 , https://vulncheck.com/xdb/a2fba35605c7||https://vulncheck.com/xdb/a2fba35605c7 , https://vulncheck.com/xdb/02a73fcd6f5f||https://vulncheck.com/xdb/02a73fcd6f5f , https://vulncheck.com/xdb/596c32191ea1||https://vulncheck.com/xdb/596c32191ea1 , https://vulncheck.com/xdb/bd11226cd569||https://vulncheck.com/xdb/bd11226cd569 , https://vulncheck.com/xdb/2a3d27be8a50||https://vulncheck.com/xdb/2a3d27be8a50 , https://vulncheck.com/xdb/91f823cf5ee3||https://vulncheck.com/xdb/91f823cf5ee3 , https://vulncheck.com/xdb/7819f0e28fc2||https://vulncheck.com/xdb/7819f0e28fc2 , https://vulncheck.com/xdb/55c8c0c71985||https://vulncheck.com/xdb/55c8c0c71985 , https://vulncheck.com/xdb/9574cfe06a5c||https://vulncheck.com/xdb/9574cfe06a5c , https://vulncheck.com/xdb/19a91efb19cb||https://vulncheck.com/xdb/19a91efb19cb , https://vulncheck.com/xdb/089a0ce1c93a||https://vulncheck.com/xdb/089a0ce1c93a , https://vulncheck.com/xdb/c18be49db148||https://vulncheck.com/xdb/c18be49db148 , https://vulncheck.com/xdb/b187533ab332||https://vulncheck.com/xdb/b187533ab332 , https://vulncheck.com/xdb/49c26aab032e||https://vulncheck.com/xdb/49c26aab032e , https://vulncheck.com/xdb/8bb60772cff1||https://vulncheck.com/xdb/8bb60772cff1 , https://vulncheck.com/xdb/f0d43db5ffcb||https://vulncheck.com/xdb/f0d43db5ffcb , https://vulncheck.com/xdb/b3ba3d9e25bb||https://vulncheck.com/xdb/b3ba3d9e25bb , https://vulncheck.com/xdb/de351a9eaa73||https://vulncheck.com/xdb/de351a9eaa73 , https://vulncheck.com/xdb/fe095bfcae0a||https://vulncheck.com/xdb/fe095bfcae0a , https://vulncheck.com/xdb/dfd966532bd4||https://vulncheck.com/xdb/dfd966532bd4 , https://vulncheck.com/xdb/792f8d436653||https://vulncheck.com/xdb/792f8d436653 , https://vulncheck.com/xdb/3fe86ad28ffe||https://vulncheck.com/xdb/3fe86ad28ffe , https://vulncheck.com/xdb/502567296299||https://vulncheck.com/xdb/502567296299 , https://vulncheck.com/xdb/d2f6260efc0f||https://vulncheck.com/xdb/d2f6260efc0f , https://vulncheck.com/xdb/1374857fc440||https://vulncheck.com/xdb/1374857fc440 , https://vulncheck.com/xdb/da0ee1760a50||https://vulncheck.com/xdb/da0ee1760a50 , https://vulncheck.com/xdb/d8d92a442a79||https://vulncheck.com/xdb/d8d92a442a79 , https://vulncheck.com/xdb/1ce7755efb91||https://vulncheck.com/xdb/1ce7755efb91 , https://vulncheck.com/xdb/0869637d461d||https://vulncheck.com/xdb/0869637d461d , https://vulncheck.com/xdb/a90a4f4fa523||https://vulncheck.com/xdb/a90a4f4fa523 , https://vulncheck.com/xdb/3ac3f4ccae08||https://vulncheck.com/xdb/3ac3f4ccae08 , https://vulncheck.com/xdb/317ac291487c||https://vulncheck.com/xdb/317ac291487c | |
CVE-2021-1789 | Apple | Multiple Products | 05/04/2022 | 0.00218 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1789 | ||||
CVE-2014-4113 | Microsoft | Win32k | 05/04/2022 | 0.78854 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4113 | https://vulncheck.com/xdb/8029f175ac9c||https://vulncheck.com/xdb/8029f175ac9c , https://vulncheck.com/xdb/05fff57b709b||https://vulncheck.com/xdb/05fff57b709b , https://vulncheck.com/xdb/d796605547b2||https://vulncheck.com/xdb/d796605547b2 , https://vulncheck.com/xdb/34d9389c9ba7||https://vulncheck.com/xdb/34d9389c9ba7 | |||
CVE-2019-8506 | Apple | Multiple Products | 05/04/2022 | 0.16048 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-8506 | ||||
CVE-2014-0322 | Microsoft | Internet Explorer | 05/04/2022 | 0.92573 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0322 | ||||
CVE-2014-0160 | OpenSSL | OpenSSL | 05/04/2022 | 0.94462 | 7.5 | https://viz.greynoise.io/tag/heartbleed-scanner||https://viz.greynoise.io/tag/heartbleed-scanner | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0160 | https://vulncheck.com/xdb/fcbef4f6ba27||https://vulncheck.com/xdb/fcbef4f6ba27 , https://vulncheck.com/xdb/9b3591a427cb||https://vulncheck.com/xdb/9b3591a427cb , https://vulncheck.com/xdb/e57d9c60a44c||https://vulncheck.com/xdb/e57d9c60a44c , https://vulncheck.com/xdb/8311b472a11a||https://vulncheck.com/xdb/8311b472a11a , https://vulncheck.com/xdb/16161c93e8de||https://vulncheck.com/xdb/16161c93e8de , https://vulncheck.com/xdb/ced85a07daad||https://vulncheck.com/xdb/ced85a07daad , https://vulncheck.com/xdb/f3c627ddd56c||https://vulncheck.com/xdb/f3c627ddd56c , https://vulncheck.com/xdb/e236a82d5676||https://vulncheck.com/xdb/e236a82d5676 , https://vulncheck.com/xdb/1c0f2aa2ac17||https://vulncheck.com/xdb/1c0f2aa2ac17 , https://vulncheck.com/xdb/878c4a2de132||https://vulncheck.com/xdb/878c4a2de132 , https://vulncheck.com/xdb/f824571c8c19||https://vulncheck.com/xdb/f824571c8c19 , https://vulncheck.com/xdb/886614a9cf7f||https://vulncheck.com/xdb/886614a9cf7f , https://vulncheck.com/xdb/f328891e9eac||https://vulncheck.com/xdb/f328891e9eac , https://vulncheck.com/xdb/5caf3f40fb1d||https://vulncheck.com/xdb/5caf3f40fb1d , https://vulncheck.com/xdb/051785dcdfd8||https://vulncheck.com/xdb/051785dcdfd8 , https://vulncheck.com/xdb/3c96ba13f2b0||https://vulncheck.com/xdb/3c96ba13f2b0 , https://vulncheck.com/xdb/7c9998eeef71||https://vulncheck.com/xdb/7c9998eeef71 , https://vulncheck.com/xdb/e30f1c9ea953||https://vulncheck.com/xdb/e30f1c9ea953 , https://vulncheck.com/xdb/db71d342ecf5||https://vulncheck.com/xdb/db71d342ecf5 , https://vulncheck.com/xdb/f9a7bb7f45e4||https://vulncheck.com/xdb/f9a7bb7f45e4 , https://vulncheck.com/xdb/180c504a4ab9||https://vulncheck.com/xdb/180c504a4ab9 , https://vulncheck.com/xdb/6fd3881a18c4||https://vulncheck.com/xdb/6fd3881a18c4 , https://vulncheck.com/xdb/bd1cb68e3a25||https://vulncheck.com/xdb/bd1cb68e3a25 , https://vulncheck.com/xdb/2777a83a11fb||https://vulncheck.com/xdb/2777a83a11fb , https://vulncheck.com/xdb/982bf0b4eb89||https://vulncheck.com/xdb/982bf0b4eb89 , https://vulncheck.com/xdb/8a3b36c16af2||https://vulncheck.com/xdb/8a3b36c16af2 , https://vulncheck.com/xdb/03d9bdcb45e0||https://vulncheck.com/xdb/03d9bdcb45e0 , https://vulncheck.com/xdb/31dbd59f952b||https://vulncheck.com/xdb/31dbd59f952b , https://vulncheck.com/xdb/a5f2ac732a33||https://vulncheck.com/xdb/a5f2ac732a33 , https://vulncheck.com/xdb/a4ecbf735c2c||https://vulncheck.com/xdb/a4ecbf735c2c | ||
CVE-2022-29464 | WSO2 | Multiple Products | 04/25/2022 | 0.94434 | 9.8 | https://viz.greynoise.io/tag/wso2-api-manager-file-upload-attempt||https://viz.greynoise.io/tag/wso2-api-manager-file-upload-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-29464 | https://vulncheck.com/xdb/86a670679b59||https://vulncheck.com/xdb/86a670679b59 , https://vulncheck.com/xdb/f381bd45a664||https://vulncheck.com/xdb/f381bd45a664 , https://vulncheck.com/xdb/0a4c343b0014||https://vulncheck.com/xdb/0a4c343b0014 , https://vulncheck.com/xdb/f5b17b3bface||https://vulncheck.com/xdb/f5b17b3bface , https://vulncheck.com/xdb/fb07ec0c6437||https://vulncheck.com/xdb/fb07ec0c6437 , https://vulncheck.com/xdb/51ec326380b8||https://vulncheck.com/xdb/51ec326380b8 , https://vulncheck.com/xdb/692f8dbe0563||https://vulncheck.com/xdb/692f8dbe0563 , https://vulncheck.com/xdb/057c3b65744e||https://vulncheck.com/xdb/057c3b65744e , https://vulncheck.com/xdb/91f9d53e4538||https://vulncheck.com/xdb/91f9d53e4538 , https://vulncheck.com/xdb/b3297f4dd55c||https://vulncheck.com/xdb/b3297f4dd55c , https://vulncheck.com/xdb/5c2ba6bd6d73||https://vulncheck.com/xdb/5c2ba6bd6d73 , https://vulncheck.com/xdb/00ad5fff1b1d||https://vulncheck.com/xdb/00ad5fff1b1d , https://vulncheck.com/xdb/d98d3fe174f9||https://vulncheck.com/xdb/d98d3fe174f9 , https://vulncheck.com/xdb/eda98189c7b4||https://vulncheck.com/xdb/eda98189c7b4 , https://vulncheck.com/xdb/11fb9f164ff9||https://vulncheck.com/xdb/11fb9f164ff9 , https://vulncheck.com/xdb/c0f15d01be06||https://vulncheck.com/xdb/c0f15d01be06 , https://vulncheck.com/xdb/7407640180cb||https://vulncheck.com/xdb/7407640180cb , https://vulncheck.com/xdb/82f284db0232||https://vulncheck.com/xdb/82f284db0232 | |
CVE-2021-41357 | Microsoft | Win32k | 04/25/2022 | 0.12041 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-41357 | ||||
CVE-2022-0847 | Linux | Kernel | 04/25/2022 | 0.84653 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-0847 | https://vulncheck.com/xdb/a77a7570c91b||https://vulncheck.com/xdb/a77a7570c91b , https://vulncheck.com/xdb/6651072dd4a6||https://vulncheck.com/xdb/6651072dd4a6 , https://vulncheck.com/xdb/27ac660f03de||https://vulncheck.com/xdb/27ac660f03de , https://vulncheck.com/xdb/b665c30d7b05||https://vulncheck.com/xdb/b665c30d7b05 , https://vulncheck.com/xdb/b7ade02a3da0||https://vulncheck.com/xdb/b7ade02a3da0 , https://vulncheck.com/xdb/370b7021f8a9||https://vulncheck.com/xdb/370b7021f8a9 , https://vulncheck.com/xdb/c735aeb744ea||https://vulncheck.com/xdb/c735aeb744ea , https://vulncheck.com/xdb/96d8ebedfe2f||https://vulncheck.com/xdb/96d8ebedfe2f , https://vulncheck.com/xdb/830e350bd642||https://vulncheck.com/xdb/830e350bd642 , https://vulncheck.com/xdb/4876d153c69a||https://vulncheck.com/xdb/4876d153c69a , https://vulncheck.com/xdb/54b99f9179fb||https://vulncheck.com/xdb/54b99f9179fb , https://vulncheck.com/xdb/17eac3a8349d||https://vulncheck.com/xdb/17eac3a8349d , https://vulncheck.com/xdb/7681898c4d58||https://vulncheck.com/xdb/7681898c4d58 , https://vulncheck.com/xdb/d34eb7cc4235||https://vulncheck.com/xdb/d34eb7cc4235 , https://vulncheck.com/xdb/d6a71047f04c||https://vulncheck.com/xdb/d6a71047f04c , https://vulncheck.com/xdb/610fa05f7ec4||https://vulncheck.com/xdb/610fa05f7ec4 , https://vulncheck.com/xdb/79c51557e8e7||https://vulncheck.com/xdb/79c51557e8e7 , https://vulncheck.com/xdb/39fa7f44daa8||https://vulncheck.com/xdb/39fa7f44daa8 , https://vulncheck.com/xdb/5a77169c0797||https://vulncheck.com/xdb/5a77169c0797 , https://vulncheck.com/xdb/6c64ccbb8d52||https://vulncheck.com/xdb/6c64ccbb8d52 , https://vulncheck.com/xdb/82740f737207||https://vulncheck.com/xdb/82740f737207 , https://vulncheck.com/xdb/c4258f9dc626||https://vulncheck.com/xdb/c4258f9dc626 , https://vulncheck.com/xdb/e74c2b6094ac||https://vulncheck.com/xdb/e74c2b6094ac , https://vulncheck.com/xdb/42ba5e95ff5b||https://vulncheck.com/xdb/42ba5e95ff5b , https://vulncheck.com/xdb/de3da6925a66||https://vulncheck.com/xdb/de3da6925a66 , https://vulncheck.com/xdb/d3ad03153f6e||https://vulncheck.com/xdb/d3ad03153f6e , https://vulncheck.com/xdb/d542c059ef55||https://vulncheck.com/xdb/d542c059ef55 , https://vulncheck.com/xdb/a76c9b8da62a||https://vulncheck.com/xdb/a76c9b8da62a , https://vulncheck.com/xdb/bef271559611||https://vulncheck.com/xdb/bef271559611 , https://vulncheck.com/xdb/cbca31fa2346||https://vulncheck.com/xdb/cbca31fa2346 , https://vulncheck.com/xdb/86e89699a34a||https://vulncheck.com/xdb/86e89699a34a , https://vulncheck.com/xdb/986760f90254||https://vulncheck.com/xdb/986760f90254 , https://vulncheck.com/xdb/11089b6096c2||https://vulncheck.com/xdb/11089b6096c2 , https://vulncheck.com/xdb/7f2dbb1be2fa||https://vulncheck.com/xdb/7f2dbb1be2fa , https://vulncheck.com/xdb/0ff57a4fbafc||https://vulncheck.com/xdb/0ff57a4fbafc , https://vulncheck.com/xdb/7a4fbe4458fb||https://vulncheck.com/xdb/7a4fbe4458fb , https://vulncheck.com/xdb/d3a70ff7bafd||https://vulncheck.com/xdb/d3a70ff7bafd , https://vulncheck.com/xdb/a3b3ce85d0a5||https://vulncheck.com/xdb/a3b3ce85d0a5 , https://vulncheck.com/xdb/46be9d6ea639||https://vulncheck.com/xdb/46be9d6ea639 , https://vulncheck.com/xdb/5e1cd4381cd2||https://vulncheck.com/xdb/5e1cd4381cd2 , https://vulncheck.com/xdb/f44fe86cdbd8||https://vulncheck.com/xdb/f44fe86cdbd8 , https://vulncheck.com/xdb/3b34006b6ed8||https://vulncheck.com/xdb/3b34006b6ed8 , https://vulncheck.com/xdb/e2dbb982b5da||https://vulncheck.com/xdb/e2dbb982b5da , https://vulncheck.com/xdb/5753c6aff2e2||https://vulncheck.com/xdb/5753c6aff2e2 , https://vulncheck.com/xdb/57ffde1c1df6||https://vulncheck.com/xdb/57ffde1c1df6 , https://vulncheck.com/xdb/df0bacb0b7bc||https://vulncheck.com/xdb/df0bacb0b7bc , https://vulncheck.com/xdb/4a62a2a669be||https://vulncheck.com/xdb/4a62a2a669be , https://vulncheck.com/xdb/e4ea692dc95e||https://vulncheck.com/xdb/e4ea692dc95e , https://vulncheck.com/xdb/bc3dc26b7001||https://vulncheck.com/xdb/bc3dc26b7001 , https://vulncheck.com/xdb/8fecaa2db7c9||https://vulncheck.com/xdb/8fecaa2db7c9 | |||
CVE-2022-26904 | Microsoft | Windows | 04/25/2022 | 0.17651 | 7.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26904 | ||||
CVE-2019-1003029 | Jenkins | Script Security Plugin | 04/25/2022 | 0.92658 | 9.9 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1003029 | ||||
CVE-2021-40450 | Microsoft | Win32k | 04/25/2022 | 0.13834 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40450 | ||||
CVE-2022-21919 | Microsoft | Windows | 04/25/2022 | 0.00605 | 7.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-21919 | ||||
CVE-2018-6882 | Synacor | Zimbra Collaboration Suite (ZCS) | 04/19/2022 | 0.65605 | 6.1 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-6882 | ||||
CVE-2022-22718 | Microsoft | Windows | 04/19/2022 | 0.07521 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22718 | ||||
CVE-2019-3568 | Meta Platforms | 04/19/2022 | 0.33311 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-3568 | |||||
CVE-2022-22960 | VMware | Multiple Products | 04/15/2022 | 0.75809 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22960 | ||||
CVE-2019-16057 | D-Link | DNS-320 Storage Device | 04/15/2022 | 0.94047 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-16057 | ||||
CVE-2022-1364 | Chromium V8 | 04/15/2022 | 0.10518 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-1364 | https://vulncheck.com/xdb/fa9ae46e4f9d | ||||
CVE-2010-5330 | Ubiquiti | AirOS | 04/15/2022 | 0.61526 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-5330 | ||||
CVE-2019-3929 | Crestron | Multiple Products | 04/15/2022 | 0.94043 | 9.8 | https://viz.greynoise.io/tag/awind-presentation-platform-rce-attempt||https://viz.greynoise.io/tag/awind-presentation-platform-rce-attempt | 3 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2019-3929 | https://vulncheck.com/xdb/b1661be8a793 | |
CVE-2014-0780 | InduSoft | Web Studio | 04/15/2022 | 0.91403 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0780 | ||||
CVE-2016-4523 | Trihedral | VTScada (formerly VTS) | 04/15/2022 | 0.68567 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4523 | ||||
CVE-2007-3010 | Alcatel | OmniPCX Enterprise | 04/15/2022 | 0.94065 | 9.8 | https://viz.greynoise.io/tag/alcatel-lucent-omnipcx-rce-attempt||https://viz.greynoise.io/tag/alcatel-lucent-omnipcx-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2007-3010 | |||
CVE-2018-7841 | Schneider Electric | U.motion Builder | 04/15/2022 | 0.39097 | 9.8 | https://viz.greynoise.io/tag/schneider-electric-u-motion-rce-attempt||https://viz.greynoise.io/tag/schneider-electric-u-motion-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-7841 | |||
CVE-2022-22954 | VMware | Workspace ONE Access and Identity Manager | 04/14/2022 | 0.94441 | 9.8 | https://viz.greynoise.io/tag/vmware-workspace-one-rce-attempt||https://viz.greynoise.io/tag/vmware-workspace-one-rce-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22954 | https://vulncheck.com/xdb/c9ec81500cf0||https://vulncheck.com/xdb/c9ec81500cf0 , https://vulncheck.com/xdb/2184ae956a90||https://vulncheck.com/xdb/2184ae956a90 , https://vulncheck.com/xdb/eb9450cfb07a||https://vulncheck.com/xdb/eb9450cfb07a , https://vulncheck.com/xdb/13023d4a2d10||https://vulncheck.com/xdb/13023d4a2d10 , https://vulncheck.com/xdb/3129d733dec5||https://vulncheck.com/xdb/3129d733dec5 , https://vulncheck.com/xdb/e1e21d39f7ed||https://vulncheck.com/xdb/e1e21d39f7ed , https://vulncheck.com/xdb/3cac1b8f8b74||https://vulncheck.com/xdb/3cac1b8f8b74 | |
CVE-2018-7602 | Drupal | Core | 04/13/2022 | 0.94316 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-7602 | https://vulncheck.com/xdb/c3bdef4dbd21||https://vulncheck.com/xdb/c3bdef4dbd21 , https://vulncheck.com/xdb/b1a7a12a9987||https://vulncheck.com/xdb/b1a7a12a9987 , https://vulncheck.com/xdb/352de7a463fa||https://vulncheck.com/xdb/352de7a463fa , https://vulncheck.com/xdb/49a9c9975129||https://vulncheck.com/xdb/49a9c9975129 | |||
CVE-2018-20753 | Kaseya | Virtual System/Server Administrator (VSA) | 04/13/2022 | 0.37234 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-20753 | ||||
CVE-2015-3113 | Adobe | Flash Player | 04/13/2022 | 0.92609 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-3113 | ||||
CVE-2014-9163 | Adobe | Flash Player | 04/13/2022 | 0.12835 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-9163 | ||||
CVE-2015-0313 | Adobe | Flash Player | 04/13/2022 | 0.93399 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0313 | ||||
CVE-2015-5122 | Adobe | Flash Player | 04/13/2022 | 0.92389 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-5122 | https://vulncheck.com/xdb/f32e362c2ef9 | |||
CVE-2015-2502 | Microsoft | Internet Explorer | 04/13/2022 | 0.17800 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2502 | ||||
CVE-2015-5123 | Adobe | Flash Player | 04/13/2022 | 0.45202 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-5123 | ||||
CVE-2022-24521 | Microsoft | Windows | 04/13/2022 | 0.03840 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-24521 | ||||
CVE-2015-0311 | Adobe | Flash Player | 04/13/2022 | 0.92871 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0311 | https://vulncheck.com/xdb/48142db4596a | |||
CVE-2020-2509 | QNAP | QNAP Network-Attached Storage (NAS) | 04/11/2022 | 0.86915 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-2509 | https://vulncheck.com/xdb/533b5e83b1eb | |||
CVE-2021-39793 | Pixel | 04/11/2022 | 0.00043 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-39793 | |||||
CVE-2021-42287 | Microsoft | Active Directory | 04/11/2022 | 0.93954 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42287 | https://vulncheck.com/xdb/be2316d8bd2e||https://vulncheck.com/xdb/be2316d8bd2e , https://vulncheck.com/xdb/d55c30346a8e||https://vulncheck.com/xdb/d55c30346a8e , https://vulncheck.com/xdb/626f11bd7b9c||https://vulncheck.com/xdb/626f11bd7b9c , https://vulncheck.com/xdb/26882e31c656||https://vulncheck.com/xdb/26882e31c656 , https://vulncheck.com/xdb/de00aae17015||https://vulncheck.com/xdb/de00aae17015 | |||
CVE-2017-11317 | Telerik | User Interface (UI) for ASP.NET AJAX | 04/11/2022 | 0.92279 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-11317 | https://vulncheck.com/xdb/130118043aa6||https://vulncheck.com/xdb/130118043aa6 , https://vulncheck.com/xdb/a71140babcca||https://vulncheck.com/xdb/a71140babcca | |||
CVE-2022-23176 | WatchGuard | Firebox and XTM | 04/11/2022 | 0.17683 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-23176 | ||||
CVE-2021-22600 | Linux | Kernel | 04/11/2022 | 0.00037 | 6.6 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22600 | https://vulncheck.com/xdb/17eb97e14356 | |||
CVE-2021-27852 | Checkbox | Checkbox Survey | 04/11/2022 | 0.21464 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27852 | ||||
CVE-2021-42278 | Microsoft | Active Directory | 04/11/2022 | 0.94019 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42278 | https://vulncheck.com/xdb/9c7330f5adf3||https://vulncheck.com/xdb/9c7330f5adf3 , https://vulncheck.com/xdb/34b0d2463eda||https://vulncheck.com/xdb/34b0d2463eda , https://vulncheck.com/xdb/e8ed8fd973a7||https://vulncheck.com/xdb/e8ed8fd973a7 , https://vulncheck.com/xdb/230d7f3a2644||https://vulncheck.com/xdb/230d7f3a2644 , https://vulncheck.com/xdb/8c3a23782131||https://vulncheck.com/xdb/8c3a23782131 , https://vulncheck.com/xdb/db23ac405047||https://vulncheck.com/xdb/db23ac405047 | |||
CVE-2021-31166 | Microsoft | HTTP Protocol Stack | 04/06/2022 | 0.93043 | 9.8 | https://viz.greynoise.io/tag/microsoft-http-sys-rce-attempt||https://viz.greynoise.io/tag/microsoft-http-sys-rce-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31166 | https://vulncheck.com/xdb/e25c79214978||https://vulncheck.com/xdb/e25c79214978 , https://vulncheck.com/xdb/74d91688925d||https://vulncheck.com/xdb/74d91688925d , https://vulncheck.com/xdb/b60f189b7005||https://vulncheck.com/xdb/b60f189b7005 , https://vulncheck.com/xdb/3d89c1c29c99||https://vulncheck.com/xdb/3d89c1c29c99 , https://vulncheck.com/xdb/a07dc76a6f89||https://vulncheck.com/xdb/a07dc76a6f89 , https://vulncheck.com/xdb/3dbf2e48a531||https://vulncheck.com/xdb/3dbf2e48a531 , https://vulncheck.com/xdb/86c76b7eb3bc||https://vulncheck.com/xdb/86c76b7eb3bc , https://vulncheck.com/xdb/e1866d71c3af||https://vulncheck.com/xdb/e1866d71c3af , https://vulncheck.com/xdb/5719bfcb7a63||https://vulncheck.com/xdb/5719bfcb7a63 | ||
CVE-2017-0148 | Microsoft | SMBv1 server | 04/06/2022 | 0.94167 | 8.1 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0148 | https://vulncheck.com/xdb/01fbcaf8d8bd | |||
CVE-2021-3156 | Sudo | Sudo | 04/06/2022 | 0.92188 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-3156 | https://vulncheck.com/xdb/b2ee85cf4e76||https://vulncheck.com/xdb/b2ee85cf4e76 , https://vulncheck.com/xdb/84e3dea90796||https://vulncheck.com/xdb/84e3dea90796 , https://vulncheck.com/xdb/a36a6349c87b||https://vulncheck.com/xdb/a36a6349c87b , https://vulncheck.com/xdb/956619acb26b||https://vulncheck.com/xdb/956619acb26b , https://vulncheck.com/xdb/8f873fe619f2||https://vulncheck.com/xdb/8f873fe619f2 , https://vulncheck.com/xdb/0573a1989e58||https://vulncheck.com/xdb/0573a1989e58 , https://vulncheck.com/xdb/ff18a04b19fb||https://vulncheck.com/xdb/ff18a04b19fb , https://vulncheck.com/xdb/791107725e9b||https://vulncheck.com/xdb/791107725e9b , https://vulncheck.com/xdb/6f8a62e9dc05||https://vulncheck.com/xdb/6f8a62e9dc05 , https://vulncheck.com/xdb/a7e527112fb0||https://vulncheck.com/xdb/a7e527112fb0 , https://vulncheck.com/xdb/d82fe374addc||https://vulncheck.com/xdb/d82fe374addc , https://vulncheck.com/xdb/d818ae56992a||https://vulncheck.com/xdb/d818ae56992a , https://vulncheck.com/xdb/22cb903c9959||https://vulncheck.com/xdb/22cb903c9959 , https://vulncheck.com/xdb/c1fae139d5d4||https://vulncheck.com/xdb/c1fae139d5d4 , https://vulncheck.com/xdb/a3fcd264aa62||https://vulncheck.com/xdb/a3fcd264aa62 , https://vulncheck.com/xdb/750ce3551def||https://vulncheck.com/xdb/750ce3551def , https://vulncheck.com/xdb/94ac175265db||https://vulncheck.com/xdb/94ac175265db , https://vulncheck.com/xdb/cb038c4634e2||https://vulncheck.com/xdb/cb038c4634e2 , https://vulncheck.com/xdb/b72767d3ef0b||https://vulncheck.com/xdb/b72767d3ef0b , https://vulncheck.com/xdb/98bc51c674a1||https://vulncheck.com/xdb/98bc51c674a1 , https://vulncheck.com/xdb/b625d38ee231||https://vulncheck.com/xdb/b625d38ee231 , https://vulncheck.com/xdb/20f15e46bf13||https://vulncheck.com/xdb/20f15e46bf13 , https://vulncheck.com/xdb/de59d87d7443||https://vulncheck.com/xdb/de59d87d7443 , https://vulncheck.com/xdb/172fcbe73544||https://vulncheck.com/xdb/172fcbe73544 , https://vulncheck.com/xdb/a2e62b6d17d1||https://vulncheck.com/xdb/a2e62b6d17d1 , https://vulncheck.com/xdb/67522d547498||https://vulncheck.com/xdb/67522d547498 , https://vulncheck.com/xdb/c7646cc24cf1||https://vulncheck.com/xdb/c7646cc24cf1 , https://vulncheck.com/xdb/1e5a3258d388||https://vulncheck.com/xdb/1e5a3258d388 , https://vulncheck.com/xdb/33b2727e22e2||https://vulncheck.com/xdb/33b2727e22e2 , https://vulncheck.com/xdb/f3a81abb3ba0||https://vulncheck.com/xdb/f3a81abb3ba0 , https://vulncheck.com/xdb/5cd3a38f312a||https://vulncheck.com/xdb/5cd3a38f312a , https://vulncheck.com/xdb/dd12494d2728||https://vulncheck.com/xdb/dd12494d2728 , https://vulncheck.com/xdb/42c8e43d9038||https://vulncheck.com/xdb/42c8e43d9038 , https://vulncheck.com/xdb/45a30e5e36fe||https://vulncheck.com/xdb/45a30e5e36fe , https://vulncheck.com/xdb/85981dac158c||https://vulncheck.com/xdb/85981dac158c , https://vulncheck.com/xdb/1db9ceee140b||https://vulncheck.com/xdb/1db9ceee140b , https://vulncheck.com/xdb/8486488deafe||https://vulncheck.com/xdb/8486488deafe , https://vulncheck.com/xdb/64d475da2992||https://vulncheck.com/xdb/64d475da2992 , https://vulncheck.com/xdb/1ded723ada65||https://vulncheck.com/xdb/1ded723ada65 , https://vulncheck.com/xdb/574e35cbc6bc||https://vulncheck.com/xdb/574e35cbc6bc , https://vulncheck.com/xdb/5fa314f8b37f||https://vulncheck.com/xdb/5fa314f8b37f , https://vulncheck.com/xdb/e559a5756f19||https://vulncheck.com/xdb/e559a5756f19 , https://vulncheck.com/xdb/5fb557d581fa||https://vulncheck.com/xdb/5fb557d581fa , https://vulncheck.com/xdb/81c88fb24bd9||https://vulncheck.com/xdb/81c88fb24bd9 , https://vulncheck.com/xdb/c5972ce378fc||https://vulncheck.com/xdb/c5972ce378fc , https://vulncheck.com/xdb/1add099f19fc||https://vulncheck.com/xdb/1add099f19fc , https://vulncheck.com/xdb/9fbcde6203e1||https://vulncheck.com/xdb/9fbcde6203e1 , https://vulncheck.com/xdb/e63e0be85a72||https://vulncheck.com/xdb/e63e0be85a72 , https://vulncheck.com/xdb/3ee223200973||https://vulncheck.com/xdb/3ee223200973 , https://vulncheck.com/xdb/314b3ed04db3||https://vulncheck.com/xdb/314b3ed04db3 , https://vulncheck.com/xdb/12b9978dfd35||https://vulncheck.com/xdb/12b9978dfd35 , https://vulncheck.com/xdb/748cab143d91||https://vulncheck.com/xdb/748cab143d91 , https://vulncheck.com/xdb/e970e6dec7b1||https://vulncheck.com/xdb/e970e6dec7b1 , https://vulncheck.com/xdb/664271a6cb02||https://vulncheck.com/xdb/664271a6cb02 , https://vulncheck.com/xdb/4e52e6bd25cf||https://vulncheck.com/xdb/4e52e6bd25cf , https://vulncheck.com/xdb/6b4c5b3f6b0e||https://vulncheck.com/xdb/6b4c5b3f6b0e , https://vulncheck.com/xdb/42c098e8e2cc||https://vulncheck.com/xdb/42c098e8e2cc , https://vulncheck.com/xdb/73a26a137f38||https://vulncheck.com/xdb/73a26a137f38 , https://vulncheck.com/xdb/25def691895e||https://vulncheck.com/xdb/25def691895e , https://vulncheck.com/xdb/f80704f9c087||https://vulncheck.com/xdb/f80704f9c087 , https://vulncheck.com/xdb/bdfb7b3c721c||https://vulncheck.com/xdb/bdfb7b3c721c , https://vulncheck.com/xdb/c60ebdc30c29||https://vulncheck.com/xdb/c60ebdc30c29 , https://vulncheck.com/xdb/8a16e063dbd5||https://vulncheck.com/xdb/8a16e063dbd5 , https://vulncheck.com/xdb/bfb260e80a93||https://vulncheck.com/xdb/bfb260e80a93 , https://vulncheck.com/xdb/300797d10318||https://vulncheck.com/xdb/300797d10318 | |||
CVE-2022-22965 | VMware | Spring Framework | 04/04/2022 | 0.94460 | 9.8 | https://viz.greynoise.io/tag/spring-core-rce-attempt||https://viz.greynoise.io/tag/spring-core-rce-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22965 | https://vulncheck.com/xdb/a06a094eaf77||https://vulncheck.com/xdb/a06a094eaf77 , https://vulncheck.com/xdb/ae290b96b916||https://vulncheck.com/xdb/ae290b96b916 , https://vulncheck.com/xdb/079a4eabc6cb||https://vulncheck.com/xdb/079a4eabc6cb , https://vulncheck.com/xdb/01a71759b184||https://vulncheck.com/xdb/01a71759b184 , https://vulncheck.com/xdb/4b35b8084b29||https://vulncheck.com/xdb/4b35b8084b29 , https://vulncheck.com/xdb/7f595932a60c||https://vulncheck.com/xdb/7f595932a60c , https://vulncheck.com/xdb/813cebc364f3||https://vulncheck.com/xdb/813cebc364f3 , https://vulncheck.com/xdb/94d4cd3e1504||https://vulncheck.com/xdb/94d4cd3e1504 , https://vulncheck.com/xdb/41c3baef6240||https://vulncheck.com/xdb/41c3baef6240 , https://vulncheck.com/xdb/ba950aab55ad||https://vulncheck.com/xdb/ba950aab55ad , https://vulncheck.com/xdb/2d17c8128624||https://vulncheck.com/xdb/2d17c8128624 , https://vulncheck.com/xdb/99a67c155fa1||https://vulncheck.com/xdb/99a67c155fa1 , https://vulncheck.com/xdb/b98563f18c75||https://vulncheck.com/xdb/b98563f18c75 , https://vulncheck.com/xdb/b2f106eac2b1||https://vulncheck.com/xdb/b2f106eac2b1 , https://vulncheck.com/xdb/cb8af208c905||https://vulncheck.com/xdb/cb8af208c905 , https://vulncheck.com/xdb/fabec78da0ff||https://vulncheck.com/xdb/fabec78da0ff , https://vulncheck.com/xdb/6db677f753b7||https://vulncheck.com/xdb/6db677f753b7 , https://vulncheck.com/xdb/598802190749||https://vulncheck.com/xdb/598802190749 , https://vulncheck.com/xdb/c982d62ac774||https://vulncheck.com/xdb/c982d62ac774 , https://vulncheck.com/xdb/4ae197406cec||https://vulncheck.com/xdb/4ae197406cec , https://vulncheck.com/xdb/a00bd5404625||https://vulncheck.com/xdb/a00bd5404625 , https://vulncheck.com/xdb/2f1e13cd31bb||https://vulncheck.com/xdb/2f1e13cd31bb , https://vulncheck.com/xdb/a2a434dff59d||https://vulncheck.com/xdb/a2a434dff59d , https://vulncheck.com/xdb/16f47f13dfb3||https://vulncheck.com/xdb/16f47f13dfb3 , https://vulncheck.com/xdb/2fa78259b5d9||https://vulncheck.com/xdb/2fa78259b5d9 , https://vulncheck.com/xdb/7c26b11a86f0||https://vulncheck.com/xdb/7c26b11a86f0 , https://vulncheck.com/xdb/29679c6bfbb1||https://vulncheck.com/xdb/29679c6bfbb1 , https://vulncheck.com/xdb/1d2c273a6a58||https://vulncheck.com/xdb/1d2c273a6a58 , https://vulncheck.com/xdb/e538f647f0f7||https://vulncheck.com/xdb/e538f647f0f7 , https://vulncheck.com/xdb/44a4aa67f46d||https://vulncheck.com/xdb/44a4aa67f46d , https://vulncheck.com/xdb/3f8ffc5be01f||https://vulncheck.com/xdb/3f8ffc5be01f , https://vulncheck.com/xdb/20accf3817fa||https://vulncheck.com/xdb/20accf3817fa , https://vulncheck.com/xdb/f697d4d9577b||https://vulncheck.com/xdb/f697d4d9577b , https://vulncheck.com/xdb/32aee2a0b3b4||https://vulncheck.com/xdb/32aee2a0b3b4 , https://vulncheck.com/xdb/a99dfc9a1fa0||https://vulncheck.com/xdb/a99dfc9a1fa0 , https://vulncheck.com/xdb/697638d15686||https://vulncheck.com/xdb/697638d15686 , https://vulncheck.com/xdb/30bd37a7b9c8||https://vulncheck.com/xdb/30bd37a7b9c8 , https://vulncheck.com/xdb/b383e52d60dd||https://vulncheck.com/xdb/b383e52d60dd , https://vulncheck.com/xdb/3532ae2b1db3||https://vulncheck.com/xdb/3532ae2b1db3 , https://vulncheck.com/xdb/f1130a964b4f||https://vulncheck.com/xdb/f1130a964b4f , https://vulncheck.com/xdb/5978e9609a96||https://vulncheck.com/xdb/5978e9609a96 , https://vulncheck.com/xdb/43e4620d8285||https://vulncheck.com/xdb/43e4620d8285 , https://vulncheck.com/xdb/c5654abe65dd||https://vulncheck.com/xdb/c5654abe65dd , https://vulncheck.com/xdb/a73d53d733d9||https://vulncheck.com/xdb/a73d53d733d9 , https://vulncheck.com/xdb/e2354921ce12||https://vulncheck.com/xdb/e2354921ce12 | |
CVE-2022-22674 | Apple | macOS | 04/04/2022 | 0.00145 | 5.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22674 | ||||
CVE-2022-22675 | Apple | macOS | 04/04/2022 | 0.00531 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22675 | ||||
CVE-2021-45382 | D-Link | Multiple Routers | 04/04/2022 | 0.93095 | 9.8 | https://viz.greynoise.io/tag/d-link-dir-8xxl-command-injection-cve-2021-45382-attempt||https://viz.greynoise.io/tag/d-link-dir-8xxl-command-injection-cve-2021-45382-attempt | 2 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-45382 | ||
CVE-2022-26871 | Trend Micro | Apex Central | 03/31/2022 | 0.08567 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26871 | ||||
CVE-2021-28799 | QNAP | Network Attached Storage (NAS) | 03/31/2022 | 0.88780 | 10.0 | https://viz.greynoise.io/tag/qnap-walter-ssh-backdoor-attempt||https://viz.greynoise.io/tag/qnap-walter-ssh-backdoor-attempt | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-28799 | |||
CVE-2021-34484 | Microsoft | Windows | 03/31/2022 | 0.05862 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-34484 | ||||
CVE-2021-21551 | Dell | dbutil Driver | 03/31/2022 | 0.52381 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21551 | https://vulncheck.com/xdb/8be3d8d1c5b0||https://vulncheck.com/xdb/8be3d8d1c5b0 , https://vulncheck.com/xdb/e8ab324055fa||https://vulncheck.com/xdb/e8ab324055fa , https://vulncheck.com/xdb/53bc14e20b42||https://vulncheck.com/xdb/53bc14e20b42 , https://vulncheck.com/xdb/9ed28f8e8fd9||https://vulncheck.com/xdb/9ed28f8e8fd9 , https://vulncheck.com/xdb/36f3363281a7||https://vulncheck.com/xdb/36f3363281a7 , https://vulncheck.com/xdb/ad79da994145||https://vulncheck.com/xdb/ad79da994145 , https://vulncheck.com/xdb/efad29dc55a9||https://vulncheck.com/xdb/efad29dc55a9 , https://vulncheck.com/xdb/00d3994af95f||https://vulncheck.com/xdb/00d3994af95f | |||
CVE-2022-1040 | Sophos | Firewall | 03/31/2022 | 0.94439 | 9.8 | https://viz.greynoise.io/tag/sophos-firewall-remote-code-execution-attempt||https://viz.greynoise.io/tag/sophos-firewall-remote-code-execution-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-1040 | https://vulncheck.com/xdb/de8e5cbcd18e||https://vulncheck.com/xdb/de8e5cbcd18e , https://vulncheck.com/xdb/e21dcd0c9b19||https://vulncheck.com/xdb/e21dcd0c9b19 , https://vulncheck.com/xdb/27a470af6b96||https://vulncheck.com/xdb/27a470af6b96 , https://vulncheck.com/xdb/739974fb0198||https://vulncheck.com/xdb/739974fb0198 | ||
CVE-2018-10561 | Dasan | Gigabit Passive Optical Network (GPON) Routers | 03/31/2022 | 0.92180 | 9.8 | https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt||https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-10561 | |||
CVE-2018-10562 | Dasan | Gigabit Passive Optical Network (GPON) Routers | 03/31/2022 | 0.94110 | 9.8 | https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt||https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt | 215 | TRUE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2018-10562 | https://vulncheck.com/xdb/7d4c3f77cac1||https://vulncheck.com/xdb/7d4c3f77cac1 , https://vulncheck.com/xdb/1f5e1339366c||https://vulncheck.com/xdb/1f5e1339366c , https://vulncheck.com/xdb/74d302e8b9e2||https://vulncheck.com/xdb/74d302e8b9e2 | |
CVE-2011-2005 | Microsoft | Ancillary Function Driver (afd.sys) | 03/28/2022 | 0.59278 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-2005 | https://vulncheck.com/xdb/f986d5f654bf | |||
CVE-2021-26085 | Atlassian | Confluence Server | 03/28/2022 | 0.94328 | 5.3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-26085 | https://vulncheck.com/xdb/611d47c6f6fb | |||
CVE-2018-8406 | Microsoft | DirectX Graphics Kernel (DXGKRNL) | 03/28/2022 | 0.14911 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8406 | ||||
CVE-2013-2729 | Adobe | Reader and Acrobat | 03/28/2022 | 0.90244 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-2729 | ||||
CVE-2015-1770 | Microsoft | Office | 03/28/2022 | 0.73204 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1770 | ||||
CVE-2013-2551 | Microsoft | Internet Explorer | 03/28/2022 | 0.92743 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-2551 | ||||
CVE-2021-20028 | SonicWall | Secure Remote Access (SRA) | 03/28/2022 | 0.85908 | 9.8 | https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-attempt||https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-attempt , https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-vuln-check||https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-vuln-check | 1 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20028 | ||
CVE-2019-7483 | SonicWall | SMA100 | 03/28/2022 | 0.39938 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7483 | ||||
CVE-2015-2426 | Microsoft | Windows | 03/28/2022 | 0.91929 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2426 | ||||
CVE-2010-4398 | Microsoft | Windows | 03/28/2022 | 0.12282 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-4398 | ||||
CVE-2022-0543 | Redis | Debian-specific Redis Servers | 03/28/2022 | 0.94385 | 10.0 | https://viz.greynoise.io/tag/debian-redis-lua-sandbox-escape-cve-2022-0543-attempt||https://viz.greynoise.io/tag/debian-redis-lua-sandbox-escape-cve-2022-0543-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-0543 | https://vulncheck.com/xdb/97008fd59436||https://vulncheck.com/xdb/97008fd59436 , https://vulncheck.com/xdb/1de84cdea3d8||https://vulncheck.com/xdb/1de84cdea3d8 , https://vulncheck.com/xdb/8837db7800be||https://vulncheck.com/xdb/8837db7800be , https://vulncheck.com/xdb/b3dbbfacb8c0||https://vulncheck.com/xdb/b3dbbfacb8c0 , https://vulncheck.com/xdb/36bfe91e83c1||https://vulncheck.com/xdb/36bfe91e83c1 | ||
CVE-2016-0040 | Microsoft | Windows | 03/28/2022 | 0.77926 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0040 | https://vulncheck.com/xdb/58efcffaec67 | |||
CVE-2012-5076 | Oracle | Java SE | 03/28/2022 | 0.92498 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-5076 | ||||
CVE-2021-38646 | Microsoft | Office | 03/28/2022 | 0.66195 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38646 | ||||
CVE-2012-0518 | Oracle | Fusion Middleware | 03/28/2022 | 0.29645 | 4.7 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0518 | ||||
CVE-2012-2034 | Adobe | Flash Player | 03/28/2022 | 0.25628 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-2034 | ||||
CVE-2016-0151 | Microsoft | Client-Server Run-time Subsystem (CSRSS) | 03/28/2022 | 0.59189 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0151 | ||||
CVE-2018-8440 | Microsoft | Windows | 03/28/2022 | 0.74331 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8440 | https://vulncheck.com/xdb/88a8a72d4c40 | |||
CVE-2017-0037 | Microsoft | Edge and Internet Explorer | 03/28/2022 | 0.90070 | 8.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0037 | ||||
CVE-2016-0189 | Microsoft | Internet Explorer | 03/28/2022 | 0.92196 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0189 | https://vulncheck.com/xdb/eca4b462e71d||https://vulncheck.com/xdb/eca4b462e71d , https://vulncheck.com/xdb/52701635df6d||https://vulncheck.com/xdb/52701635df6d | |||
CVE-2017-0059 | Microsoft | Internet Explorer | 03/28/2022 | 0.84143 | 4.3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0059 | ||||
CVE-2018-8405 | Microsoft | DirectX Graphics Kernel (DXGKRNL) | 03/28/2022 | 0.14911 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8405 | ||||
CVE-2021-34486 | Microsoft | Windows | 03/28/2022 | 0.27685 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-34486 | https://vulncheck.com/xdb/88847e980e21 | |||
CVE-2013-3660 | Microsoft | Win32k | 03/28/2022 | 0.67944 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3660 | ||||
CVE-2013-1690 | Mozilla | Firefox and Thunderbird | 03/28/2022 | 0.45919 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-1690 | https://vulncheck.com/xdb/7f856b52404e | |||
CVE-2017-0213 | Microsoft | Windows | 03/28/2022 | 0.91805 | 7.3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0213 | https://vulncheck.com/xdb/dbfb297b1e06||https://vulncheck.com/xdb/dbfb297b1e06 , https://vulncheck.com/xdb/4bfbba25e06d||https://vulncheck.com/xdb/4bfbba25e06d , https://vulncheck.com/xdb/07da0b0499de||https://vulncheck.com/xdb/07da0b0499de | |||
CVE-2013-2465 | Oracle | Java SE | 03/28/2022 | 0.93220 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-2465 | ||||
CVE-2012-2539 | Microsoft | Word | 03/28/2022 | 0.81896 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-2539 | ||||
CVE-2016-7200 | Microsoft | Edge | 03/28/2022 | 0.89915 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7200 | https://vulncheck.com/xdb/1d67efa0a09f | |||
CVE-2016-7201 | Microsoft | Edge | 03/28/2022 | 0.90138 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7201 | https://vulncheck.com/xdb/1116771a9b9c | |||
CVE-2015-2419 | Microsoft | Internet Explorer | 03/28/2022 | 0.86087 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2419 | ||||
CVE-2022-1096 | Chromium V8 | 03/28/2022 | 0.19479 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-1096 | |||||
CVE-2020-2021 | Palo Alto Networks | PAN-OS | 03/25/2022 | 0.11497 | 10.0 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-2021 | ||||
CVE-2010-4345 | Exim | Exim | 03/25/2022 | 0.11704 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-4345 | ||||
CVE-2016-1555 | NETGEAR | Wireless Access Point (WAP) Devices | 03/25/2022 | 0.94152 | 9.8 | https://viz.greynoise.io/tag/netgear-wireless-ap-rce-attempt||https://viz.greynoise.io/tag/netgear-wireless-ap-rce-attempt | 3 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2016-1555 | https://vulncheck.com/xdb/a582a601575a | |
CVE-2019-15107 | Webmin | Webmin | 03/25/2022 | 0.94461 | 9.8 | https://viz.greynoise.io/tag/webmin-rce-attempt||https://viz.greynoise.io/tag/webmin-rce-attempt , https://viz.greynoise.io/tag/webmin-scanner||https://viz.greynoise.io/tag/webmin-scanner | 3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-15107 | https://vulncheck.com/xdb/a990debb490e||https://vulncheck.com/xdb/a990debb490e , https://vulncheck.com/xdb/c4581c84425b||https://vulncheck.com/xdb/c4581c84425b , https://vulncheck.com/xdb/645d8ca04538||https://vulncheck.com/xdb/645d8ca04538 , https://vulncheck.com/xdb/346894239882||https://vulncheck.com/xdb/346894239882 , https://vulncheck.com/xdb/36f3e23cc53a||https://vulncheck.com/xdb/36f3e23cc53a , https://vulncheck.com/xdb/481f4128612d||https://vulncheck.com/xdb/481f4128612d , https://vulncheck.com/xdb/e9a6c303fcfd||https://vulncheck.com/xdb/e9a6c303fcfd , https://vulncheck.com/xdb/26ea3ae3926d||https://vulncheck.com/xdb/26ea3ae3926d , https://vulncheck.com/xdb/c6da575a25d8||https://vulncheck.com/xdb/c6da575a25d8 , https://vulncheck.com/xdb/486adc8e3e40||https://vulncheck.com/xdb/486adc8e3e40 , https://vulncheck.com/xdb/a13dbcc678b1||https://vulncheck.com/xdb/a13dbcc678b1 , https://vulncheck.com/xdb/73c54650e7c3||https://vulncheck.com/xdb/73c54650e7c3 , https://vulncheck.com/xdb/90ca878ea23a||https://vulncheck.com/xdb/90ca878ea23a , https://vulncheck.com/xdb/908f11836959||https://vulncheck.com/xdb/908f11836959 , https://vulncheck.com/xdb/50552f993bb1||https://vulncheck.com/xdb/50552f993bb1 , https://vulncheck.com/xdb/6d77d7695cd4||https://vulncheck.com/xdb/6d77d7695cd4 , https://vulncheck.com/xdb/075aff434240||https://vulncheck.com/xdb/075aff434240 , https://vulncheck.com/xdb/b745f18fe915||https://vulncheck.com/xdb/b745f18fe915 , https://vulncheck.com/xdb/bc9b78848768||https://vulncheck.com/xdb/bc9b78848768 , https://vulncheck.com/xdb/c749357d2521||https://vulncheck.com/xdb/c749357d2521 , https://vulncheck.com/xdb/bfb7ca362af4||https://vulncheck.com/xdb/bfb7ca362af4 , https://vulncheck.com/xdb/91ebdf06889e||https://vulncheck.com/xdb/91ebdf06889e , https://vulncheck.com/xdb/e5d9d10c9291||https://vulncheck.com/xdb/e5d9d10c9291 , https://vulncheck.com/xdb/660292b95806||https://vulncheck.com/xdb/660292b95806 , https://vulncheck.com/xdb/0d2cd9698102||https://vulncheck.com/xdb/0d2cd9698102 , https://vulncheck.com/xdb/8d9cadf4b346||https://vulncheck.com/xdb/8d9cadf4b346 , https://vulncheck.com/xdb/86807142d202||https://vulncheck.com/xdb/86807142d202 , https://vulncheck.com/xdb/323c8177e804||https://vulncheck.com/xdb/323c8177e804 , https://vulncheck.com/xdb/a6c954e87af6||https://vulncheck.com/xdb/a6c954e87af6 , https://vulncheck.com/xdb/4c6823870c85||https://vulncheck.com/xdb/4c6823870c85 | |
CVE-2018-11138 | Quest | KACE System Management Appliance | 03/25/2022 | 0.86833 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-11138 | ||||
CVE-2020-1631 | Juniper | Junos OS | 03/25/2022 | 0.05639 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1631 | ||||
CVE-2009-0927 | Adobe | Reader and Acrobat | 03/25/2022 | 0.93673 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-0927 | ||||
CVE-2022-26318 | WatchGuard | Firebox and XTM Appliances | 03/25/2022 | 0.92762 | 9.8 | https://viz.greynoise.io/tag/watchguard-rce-attempt||https://viz.greynoise.io/tag/watchguard-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26318 | https://vulncheck.com/xdb/2b6b8cb11413||https://vulncheck.com/xdb/2b6b8cb11413 , https://vulncheck.com/xdb/d1337d2a7e63||https://vulncheck.com/xdb/d1337d2a7e63 , https://vulncheck.com/xdb/1b92b4418032||https://vulncheck.com/xdb/1b92b4418032 | ||
CVE-2019-6340 | Drupal | Core | 03/25/2022 | 0.94438 | 8.1 | https://viz.greynoise.io/tag/drupal-8-remote-code-execution-attempt||https://viz.greynoise.io/tag/drupal-8-remote-code-execution-attempt , https://viz.greynoise.io/tag/drupal-cve-2019-6340-rce-attempt||https://viz.greynoise.io/tag/drupal-cve-2019-6340-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-6340 | https://vulncheck.com/xdb/971bb71f8acc||https://vulncheck.com/xdb/971bb71f8acc , https://vulncheck.com/xdb/b716c66caa48||https://vulncheck.com/xdb/b716c66caa48 , https://vulncheck.com/xdb/5aa4db1c5af5||https://vulncheck.com/xdb/5aa4db1c5af5 , https://vulncheck.com/xdb/e32101bbe942||https://vulncheck.com/xdb/e32101bbe942 , https://vulncheck.com/xdb/313b5dedfaee||https://vulncheck.com/xdb/313b5dedfaee | |
CVE-2017-12617 | Apache | Tomcat | 03/25/2022 | 0.94394 | 8.1 | https://viz.greynoise.io/tag/apache-tomcat-webdav-webshell-rce-cve-2017-12617-attempt||https://viz.greynoise.io/tag/apache-tomcat-webdav-webshell-rce-cve-2017-12617-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12617 | https://vulncheck.com/xdb/d105c8c6f54f||https://vulncheck.com/xdb/d105c8c6f54f , https://vulncheck.com/xdb/f5e54c16d591||https://vulncheck.com/xdb/f5e54c16d591 , https://vulncheck.com/xdb/4d32b8f34452||https://vulncheck.com/xdb/4d32b8f34452 , https://vulncheck.com/xdb/476468103ba2||https://vulncheck.com/xdb/476468103ba2 , https://vulncheck.com/xdb/b858a57a9e2e||https://vulncheck.com/xdb/b858a57a9e2e , https://vulncheck.com/xdb/bd768a95e919||https://vulncheck.com/xdb/bd768a95e919 , https://vulncheck.com/xdb/c42eddecf666||https://vulncheck.com/xdb/c42eddecf666 , https://vulncheck.com/xdb/8fd4c4b18c5f||https://vulncheck.com/xdb/8fd4c4b18c5f , https://vulncheck.com/xdb/0cbcf731ead7||https://vulncheck.com/xdb/0cbcf731ead7 , https://vulncheck.com/xdb/c733f0b8ba46||https://vulncheck.com/xdb/c733f0b8ba46 , https://vulncheck.com/xdb/7804de914c0c||https://vulncheck.com/xdb/7804de914c0c | ||
CVE-2021-22941 | Citrix | ShareFile | 03/25/2022 | 0.88615 | 9.8 | https://viz.greynoise.io/tag/citrix-sharefile-improper-access-control-cve-2021-22941-attempt||https://viz.greynoise.io/tag/citrix-sharefile-improper-access-control-cve-2021-22941-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22941 | |||
CVE-2016-10174 | NETGEAR | WNR2000v5 Router | 03/25/2022 | 0.91840 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-10174 | ||||
CVE-2013-2251 | Apache | Struts | 03/25/2022 | 0.94328 | 9.8 | https://viz.greynoise.io/tag/struts-2-rce-cve-2013-2251||https://viz.greynoise.io/tag/struts-2-rce-cve-2013-2251 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-2251 | |||
CVE-2019-12989 | Citrix | SD-WAN and NetScaler | 03/25/2022 | 0.81791 | 9.8 | https://viz.greynoise.io/tag/citrix-sd-wan-auth-bypass-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-auth-bypass-attempt , https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-12989 | |||
CVE-2019-16920 | D-Link | Multiple Routers | 03/25/2022 | 0.94343 | 9.8 | https://viz.greynoise.io/tag/d-link-cve-2019-16920-rce-attempt||https://viz.greynoise.io/tag/d-link-cve-2019-16920-rce-attempt | 3 | TRUE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2019-16920 | https://vulncheck.com/xdb/f05a19c8f4b4||https://vulncheck.com/xdb/f05a19c8f4b4 , https://vulncheck.com/xdb/84211543c7c0||https://vulncheck.com/xdb/84211543c7c0 | |
CVE-2009-1151 | phpMyAdmin | phpMyAdmin | 03/25/2022 | 0.93390 | 9.8 | https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-attempt||https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-attempt , https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-check||https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-1151 | https://vulncheck.com/xdb/a8f294c1448e||https://vulncheck.com/xdb/a8f294c1448e , https://vulncheck.com/xdb/0633e59330f3||https://vulncheck.com/xdb/0633e59330f3 | ||
CVE-2020-9054 | Zyxel | Multiple Network-Attached Storage (NAS) Devices | 03/25/2022 | 0.94265 | 9.8 | https://viz.greynoise.io/tag/zyxel-firewall-nas-rce-attempt||https://viz.greynoise.io/tag/zyxel-firewall-nas-rce-attempt | 2 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-9054 | https://vulncheck.com/xdb/5c09526730f9 | |
CVE-2020-5410 | VMware Tanzu | Spring Cloud Configuration (Config) Server | 03/25/2022 | 0.94305 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-5410 | https://vulncheck.com/xdb/6eac00f6b406||https://vulncheck.com/xdb/6eac00f6b406 , https://vulncheck.com/xdb/e1abb7641447||https://vulncheck.com/xdb/e1abb7641447 | |||
CVE-2014-6287 | Rejetto | HTTP File Server (HFS) | 03/25/2022 | 0.94327 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-6287 | https://vulncheck.com/xdb/7e75a52fb2c4||https://vulncheck.com/xdb/7e75a52fb2c4 , https://vulncheck.com/xdb/d3f707772d31||https://vulncheck.com/xdb/d3f707772d31 , https://vulncheck.com/xdb/87218ce82812||https://vulncheck.com/xdb/87218ce82812 , https://vulncheck.com/xdb/561648cf3450||https://vulncheck.com/xdb/561648cf3450 , https://vulncheck.com/xdb/ac9a55de5631||https://vulncheck.com/xdb/ac9a55de5631 , https://vulncheck.com/xdb/95b99733114b||https://vulncheck.com/xdb/95b99733114b , https://vulncheck.com/xdb/5a7c8f3319f2||https://vulncheck.com/xdb/5a7c8f3319f2 , https://vulncheck.com/xdb/ab1b8c027b00||https://vulncheck.com/xdb/ab1b8c027b00 | |||
CVE-2022-26143 | Mitel | MiCollab, MiVoice Business Express | 03/25/2022 | 0.64770 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26143 | ||||
CVE-2015-0666 | Cisco | Prime Data Center Network Manager (DCNM) | 03/25/2022 | 0.71752 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-0666 | |||||
CVE-2018-8373 | Microsoft | Internet Explorer Scripting Engine | 03/25/2022 | 0.73833 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8373 | ||||
CVE-2019-0903 | Microsoft | Graphics Device Interface (GDI) | 03/25/2022 | 0.50678 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0903 | ||||
CVE-2017-6316 | Citrix | NetScaler SD-WAN Enterprise, CloudBridge Virtual WAN, and XenMobile Server | 03/25/2022 | 0.88432 | 9.8 | https://viz.greynoise.io/tag/citrix-netscaler-command-injection-cve-2017-6316-attempt||https://viz.greynoise.io/tag/citrix-netscaler-command-injection-cve-2017-6316-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6316 | |||
CVE-2009-2055 | Cisco | IOS XR | 03/25/2022 | 0.01238 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-2055 | |||||
CVE-2016-0752 | Rails | Ruby on Rails | 03/25/2022 | 0.92598 | 7.5 | https://viz.greynoise.io/tag/ruby-on-rails-dynamic-render-rce-attempt||https://viz.greynoise.io/tag/ruby-on-rails-dynamic-render-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0752 | |||
CVE-2018-0125 | Cisco | VPN Routers | 03/25/2022 | 0.73093 | 9.8 | https://viz.greynoise.io/tag/cisco-rv132w-134w-password-disclosure-attempt||https://viz.greynoise.io/tag/cisco-rv132w-134w-password-disclosure-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0125 | |||
CVE-2019-11043 | PHP | FastCGI Process Manager (FPM) | 03/25/2022 | 0.94105 | 8.7 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11043 | https://vulncheck.com/xdb/ce4ae09a0ce3||https://vulncheck.com/xdb/ce4ae09a0ce3 , https://vulncheck.com/xdb/3b95194461e6||https://vulncheck.com/xdb/3b95194461e6 , https://vulncheck.com/xdb/9493124c9054||https://vulncheck.com/xdb/9493124c9054 , https://vulncheck.com/xdb/5fa11c5956d1||https://vulncheck.com/xdb/5fa11c5956d1 , https://vulncheck.com/xdb/1de02e031a87||https://vulncheck.com/xdb/1de02e031a87 , https://vulncheck.com/xdb/7661c1eea5ee||https://vulncheck.com/xdb/7661c1eea5ee , https://vulncheck.com/xdb/b77e1a4b74e5||https://vulncheck.com/xdb/b77e1a4b74e5 , https://vulncheck.com/xdb/71b7cfe27514||https://vulncheck.com/xdb/71b7cfe27514 , https://vulncheck.com/xdb/5d7564d7c174||https://vulncheck.com/xdb/5d7564d7c174 , https://vulncheck.com/xdb/3430044ed268||https://vulncheck.com/xdb/3430044ed268 , https://vulncheck.com/xdb/51adef4c9756||https://vulncheck.com/xdb/51adef4c9756 , https://vulncheck.com/xdb/91fc59b00456||https://vulncheck.com/xdb/91fc59b00456 , https://vulncheck.com/xdb/095460149708||https://vulncheck.com/xdb/095460149708 , https://vulncheck.com/xdb/78cf4dd16e8c||https://vulncheck.com/xdb/78cf4dd16e8c , https://vulncheck.com/xdb/20a6f27a3edd||https://vulncheck.com/xdb/20a6f27a3edd , https://vulncheck.com/xdb/17d9321b8fd7||https://vulncheck.com/xdb/17d9321b8fd7 | |||
CVE-2020-25223 | Sophos | SG UTM | 03/25/2022 | 0.94415 | 9.8 | https://viz.greynoise.io/tag/sophos-sg-utm-remote-code-execution-attempt||https://viz.greynoise.io/tag/sophos-sg-utm-remote-code-execution-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-25223 | https://vulncheck.com/xdb/5519d3775225 | ||
CVE-2016-4171 | Adobe | Flash Player | 03/25/2022 | 0.26006 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4171 | ||||
CVE-2019-12991 | Citrix | SD-WAN and NetScaler | 03/25/2022 | 0.86370 | 8.8 | https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-12991 | |||
CVE-2010-2861 | Adobe | ColdFusion | 03/25/2022 | 0.94299 | 9.8 | https://viz.greynoise.io/tag/adobe-coldfusion-lfi-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-lfi-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-2861 | |||
CVE-2015-3035 | TP-Link | Multiple Archer Devices | 03/25/2022 | 0.93178 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-3035 | ||||
CVE-2019-2616 | Oracle | BI Publisher (Formerly XML Publisher) | 03/25/2022 | 0.94361 | 7.2 | https://viz.greynoise.io/tag/oracle-business-intelligence-and-xml-publisher-xxe-attempt||https://viz.greynoise.io/tag/oracle-business-intelligence-and-xml-publisher-xxe-attempt | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-2616 | ||
CVE-2021-42237 | Sitecore | XP | 03/25/2022 | 0.94374 | 9.8 | https://viz.greynoise.io/tag/sitecore-rce-attempt||https://viz.greynoise.io/tag/sitecore-rce-attempt , https://viz.greynoise.io/tag/sitecore-rce-check||https://viz.greynoise.io/tag/sitecore-rce-check | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42237 | https://vulncheck.com/xdb/22ffe954e444||https://vulncheck.com/xdb/22ffe954e444 , https://vulncheck.com/xdb/5a60cedb515f||https://vulncheck.com/xdb/5a60cedb515f | |
CVE-2012-1823 | PHP | PHP | 03/25/2022 | 0.94386 | 9.8 | https://viz.greynoise.io/tag/php-cgi-remote-code-execution-attempt||https://viz.greynoise.io/tag/php-cgi-remote-code-execution-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1823 | https://vulncheck.com/xdb/67d4003e8705||https://vulncheck.com/xdb/67d4003e8705 , https://vulncheck.com/xdb/bc79679e68c9||https://vulncheck.com/xdb/bc79679e68c9 | ||
CVE-2018-1273 | VMware Tanzu | Spring Data Commons | 03/25/2022 | 0.94208 | 9.8 | https://viz.greynoise.io/tag/spring-data-commons-rce-attempt||https://viz.greynoise.io/tag/spring-data-commons-rce-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-1273 | https://vulncheck.com/xdb/d764935a0636||https://vulncheck.com/xdb/d764935a0636 , https://vulncheck.com/xdb/9406cebce0df||https://vulncheck.com/xdb/9406cebce0df , https://vulncheck.com/xdb/7813a73559db||https://vulncheck.com/xdb/7813a73559db | |
CVE-2020-2506 | QNAP Systems | Helpdesk | 03/25/2022 | 0.29202 | 7.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-2506 | ||||
CVE-2018-14839 | LG | N1A1 NAS | 03/25/2022 | 0.91511 | 9.8 | 3 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2018-14839 | |||
CVE-2020-1956 | Apache | Kylin | 03/25/2022 | 0.93749 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1956 | https://vulncheck.com/xdb/b9bdde208ba1 | |||
CVE-2014-0130 | Rails | Ruby on Rails | 03/25/2022 | 0.36438 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0130 | ||||
CVE-2022-21999 | Microsoft | Windows | 03/25/2022 | 0.69042 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-21999 | https://vulncheck.com/xdb/609ca9e59da3 | |||
CVE-2014-6324 | Microsoft | Kerberos Key Distribution Center (KDC) | 03/25/2022 | 0.89299 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-6324 | ||||
CVE-2017-6334 | NETGEAR | DGN2200 Devices | 03/25/2022 | 0.91073 | 8.8 | https://viz.greynoise.io/tag/netgear-dgn2200-dnslookup-rce-attempt||https://viz.greynoise.io/tag/netgear-dgn2200-dnslookup-rce-attempt | 0 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2017-6334 | ||
CVE-2005-2773 | Hewlett Packard (HP) | OpenView Network Node Manager | 03/25/2022 | 0.91070 | 9.8 | https://viz.greynoise.io/tag/hp-openview-network-manager-rce-attempt||https://viz.greynoise.io/tag/hp-openview-network-manager-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2005-2773 | |||
CVE-2017-0146 | Microsoft | Windows | 03/25/2022 | 0.93882 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0146 | ||||
CVE-2016-7892 | Adobe | Flash Player | 03/25/2022 | 0.18919 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7892 | ||||
CVE-2013-5223 | D-Link | DSL-2760U | 03/25/2022 | 0.35461 | 5.4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-5223 | ||||
CVE-2018-6961 | VMware | SD-WAN Edge | 03/25/2022 | 0.92029 | 8.1 | https://viz.greynoise.io/tag/vmware-sd-wan-rce-attempt||https://viz.greynoise.io/tag/vmware-sd-wan-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-6961 | https://vulncheck.com/xdb/f3adc82ac1f7||https://vulncheck.com/xdb/f3adc82ac1f7 , https://vulncheck.com/xdb/eeb1766c5086||https://vulncheck.com/xdb/eeb1766c5086 | ||
CVE-2015-1427 | Elastic | Elasticsearch | 03/25/2022 | 0.93773 | 9.8 | https://viz.greynoise.io/tag/elasticsearch-rce-attempt||https://viz.greynoise.io/tag/elasticsearch-rce-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1427 | https://vulncheck.com/xdb/3dcf28bea839||https://vulncheck.com/xdb/3dcf28bea839 , https://vulncheck.com/xdb/7c460955b63d||https://vulncheck.com/xdb/7c460955b63d | |
CVE-2019-10068 | Kentico | Xperience | 03/25/2022 | 0.94068 | 9.8 | https://viz.greynoise.io/tag/kentico-cms-remote-code-execution-attempt||https://viz.greynoise.io/tag/kentico-cms-remote-code-execution-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-10068 | ||
CVE-2014-6332 | Microsoft | Windows | 03/25/2022 | 0.94069 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-6332 | ||||
CVE-2010-3035 | Cisco | IOS XR | 03/25/2022 | 0.05752 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-3035 | ||||
CVE-2015-1187 | D-Link and TRENDnet | Multiple Devices | 03/25/2022 | 0.78160 | 9.8 | https://viz.greynoise.io/tag/d-link-ncc-command-injection-attempt||https://viz.greynoise.io/tag/d-link-ncc-command-injection-attempt | 0 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2015-1187 | ||
CVE-2010-4344 | Exim | Exim | 03/25/2022 | 0.57471 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-4344 | ||||
CVE-2017-12615 | Apache | Tomcat | 03/25/2022 | 0.94360 | 8.1 | https://viz.greynoise.io/tag/tomcat-backdoor-use-cve-2017-12615-attempt||https://viz.greynoise.io/tag/tomcat-backdoor-use-cve-2017-12615-attempt , https://viz.greynoise.io/tag/tomcat-backdoor-upload-cve-2017-12615-attempt||https://viz.greynoise.io/tag/tomcat-backdoor-upload-cve-2017-12615-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12615 | https://vulncheck.com/xdb/814d0fdfdaf9||https://vulncheck.com/xdb/814d0fdfdaf9 , https://vulncheck.com/xdb/08d6bfd35adc||https://vulncheck.com/xdb/08d6bfd35adc , https://vulncheck.com/xdb/1f8fb8c68353||https://vulncheck.com/xdb/1f8fb8c68353 , https://vulncheck.com/xdb/8d7305eb7051||https://vulncheck.com/xdb/8d7305eb7051 , https://vulncheck.com/xdb/70d9deaae392||https://vulncheck.com/xdb/70d9deaae392 , https://vulncheck.com/xdb/5a1624c6df1b||https://vulncheck.com/xdb/5a1624c6df1b , https://vulncheck.com/xdb/fbbcc0b93b98||https://vulncheck.com/xdb/fbbcc0b93b98 , https://vulncheck.com/xdb/6889df0c7813||https://vulncheck.com/xdb/6889df0c7813 | |
CVE-2018-0147 | Cisco | Secure Access Control System (ACS) | 03/25/2022 | 0.19921 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0147 | ||||
CVE-2013-4810 | Hewlett Packard (HP) | ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management | 03/25/2022 | 0.87275 | 9.8 | https://viz.greynoise.io/tag/jboss-rce-attempt||https://viz.greynoise.io/tag/jboss-rce-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-4810 | |||
CVE-2019-1003030 | Jenkins | Matrix Project Plugin | 03/25/2022 | 0.92834 | 9.9 | https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt||https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1003030 | https://vulncheck.com/xdb/81d54204d708 | ||
CVE-2020-9377 | D-Link | DIR-610 Devices | 03/25/2022 | 0.78450 | 8.8 | 0 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-9377 | |||
CVE-2018-8414 | Microsoft | Windows | 03/25/2022 | 0.88510 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8414 | https://vulncheck.com/xdb/275a9314d8be | |||
CVE-2014-3120 | Elastic | Elasticsearch | 03/25/2022 | 0.79814 | 8.1 | https://viz.greynoise.io/tag/elasticsearch-rce-attempt||https://viz.greynoise.io/tag/elasticsearch-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-3120 | https://vulncheck.com/xdb/d53ab847ab08||https://vulncheck.com/xdb/d53ab847ab08 , https://vulncheck.com/xdb/3bd602f1502c||https://vulncheck.com/xdb/3bd602f1502c | |
CVE-2015-4068 | Arcserve | Unified Data Protection (UDP) | 03/25/2022 | 0.83197 | 9.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-4068 | ||||
CVE-2016-11021 | D-Link | DCS-930L Devices | 03/25/2022 | 0.90446 | 7.2 | https://viz.greynoise.io/tag/d-link-dcs-930l-rce-attempt||https://viz.greynoise.io/tag/d-link-dcs-930l-rce-attempt | 0 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2016-11021 | ||
CVE-2017-3881 | Cisco | IOS and IOS XE | 03/25/2022 | 0.94083 | 9.8 | https://viz.greynoise.io/tag/cisco-ios-cluster-management-protocol-cve-2017-3881-attempt||https://viz.greynoise.io/tag/cisco-ios-cluster-management-protocol-cve-2017-3881-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-3881 | https://vulncheck.com/xdb/9ace50346f8d||https://vulncheck.com/xdb/9ace50346f8d , https://vulncheck.com/xdb/2f0df2465dbf||https://vulncheck.com/xdb/2f0df2465dbf , https://vulncheck.com/xdb/ff56c466c983||https://vulncheck.com/xdb/ff56c466c983 , https://vulncheck.com/xdb/7e17d20488ba||https://vulncheck.com/xdb/7e17d20488ba , https://vulncheck.com/xdb/793e00067c6b||https://vulncheck.com/xdb/793e00067c6b | ||
CVE-2020-7247 | OpenBSD | OpenSMTPD | 03/25/2022 | 0.94073 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-7247 | https://vulncheck.com/xdb/47eec17beab4||https://vulncheck.com/xdb/47eec17beab4 , https://vulncheck.com/xdb/dfc825b4e351||https://vulncheck.com/xdb/dfc825b4e351 , https://vulncheck.com/xdb/bf9da7b38b61||https://vulncheck.com/xdb/bf9da7b38b61 , https://vulncheck.com/xdb/e74dfea19420||https://vulncheck.com/xdb/e74dfea19420 , https://vulncheck.com/xdb/15de84180d62||https://vulncheck.com/xdb/15de84180d62 , https://vulncheck.com/xdb/bb8cd406d461||https://vulncheck.com/xdb/bb8cd406d461 , https://vulncheck.com/xdb/84f50ceb9674||https://vulncheck.com/xdb/84f50ceb9674 , https://vulncheck.com/xdb/aaf43d820afe||https://vulncheck.com/xdb/aaf43d820afe | |||
CVE-2019-1322 | Microsoft | Windows | 03/15/2022 | 0.38187 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1322 | https://vulncheck.com/xdb/c150d99e80b3 | |||
CVE-2018-8120 | Microsoft | Win32k | 03/15/2022 | 0.94149 | 7.0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8120 | https://vulncheck.com/xdb/ca4b6aa025dc||https://vulncheck.com/xdb/ca4b6aa025dc , https://vulncheck.com/xdb/f2178e73bf7f||https://vulncheck.com/xdb/f2178e73bf7f , https://vulncheck.com/xdb/068cb0753a02||https://vulncheck.com/xdb/068cb0753a02 , https://vulncheck.com/xdb/744e1fb3b1f7||https://vulncheck.com/xdb/744e1fb3b1f7 , https://vulncheck.com/xdb/5882ac72e8c6||https://vulncheck.com/xdb/5882ac72e8c6 , https://vulncheck.com/xdb/48d436ff8d49||https://vulncheck.com/xdb/48d436ff8d49 , https://vulncheck.com/xdb/34760786116d||https://vulncheck.com/xdb/34760786116d , https://vulncheck.com/xdb/01f9d12f366f||https://vulncheck.com/xdb/01f9d12f366f | |||
CVE-2017-0101 | Microsoft | Windows | 03/15/2022 | 0.61930 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0101 | https://vulncheck.com/xdb/d56031625002 | |||
CVE-2019-1129 | Microsoft | Windows | 03/15/2022 | 0.08868 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1129 | ||||
CVE-2019-0543 | Microsoft | Windows | 03/15/2022 | 0.03524 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0543 | ||||
CVE-2019-1064 | Microsoft | Windows | 03/15/2022 | 0.15538 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1064 | https://vulncheck.com/xdb/fc46b3dba1ae||https://vulncheck.com/xdb/fc46b3dba1ae , https://vulncheck.com/xdb/63dee87b89a7||https://vulncheck.com/xdb/63dee87b89a7 , https://vulncheck.com/xdb/2606dfc2804f||https://vulncheck.com/xdb/2606dfc2804f | |||
CVE-2015-2546 | Microsoft | Win32k | 03/15/2022 | 0.37248 | 8.2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2546 | https://vulncheck.com/xdb/b8a752f0f633||https://vulncheck.com/xdb/b8a752f0f633 , https://vulncheck.com/xdb/529df0e03a85||https://vulncheck.com/xdb/529df0e03a85 | |||
CVE-2019-0841 | Microsoft | Windows | 03/15/2022 | 0.86081 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0841 | https://vulncheck.com/xdb/e4ad3aaee5dd | |||
CVE-2019-1253 | Microsoft | Windows | 03/15/2022 | 0.19565 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1253 | https://vulncheck.com/xdb/cc8bc5f73283||https://vulncheck.com/xdb/cc8bc5f73283 , https://vulncheck.com/xdb/8413d1b8bafe||https://vulncheck.com/xdb/8413d1b8bafe , https://vulncheck.com/xdb/be673a8a105e||https://vulncheck.com/xdb/be673a8a105e | |||
CVE-2016-3309 | Microsoft | Windows | 03/15/2022 | 0.47724 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3309 | https://vulncheck.com/xdb/faa8734c5358 | |||
CVE-2019-1069 | Microsoft | Task Scheduler | 03/15/2022 | 0.31692 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1069 | ||||
CVE-2019-1315 | Microsoft | Windows | 03/15/2022 | 0.06219 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1315 | ||||
CVE-2019-1132 | Microsoft | Win32k | 03/15/2022 | 0.29255 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1132 | https://vulncheck.com/xdb/082c37327649||https://vulncheck.com/xdb/082c37327649 , https://vulncheck.com/xdb/ba437fb9f5df||https://vulncheck.com/xdb/ba437fb9f5df , https://vulncheck.com/xdb/4425b42bd367||https://vulncheck.com/xdb/4425b42bd367 | |||
CVE-2019-1405 | Microsoft | Windows | 03/15/2022 | 0.59969 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1405 | https://vulncheck.com/xdb/927583cfabe6 | |||
CVE-2020-5135 | SonicWall | SonicOS | 03/15/2022 | 0.49503 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-5135 | ||||
CVE-2013-0629 | Adobe | ColdFusion | 03/07/2022 | 0.80964 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0629 | ||||
CVE-2022-26486 | Mozilla | Firefox | 03/07/2022 | 0.01240 | 9.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26486 | ||||
CVE-2020-8218 | Pulse Secure | Pulse Connect Secure | 03/07/2022 | 0.91071 | 7.2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8218 | https://vulncheck.com/xdb/5617ca2523fa | |||
CVE-2019-11581 | Atlassian | Jira Server and Data Center | 03/07/2022 | 0.94377 | 9.8 | https://viz.greynoise.io/tag/jira-scanner||https://viz.greynoise.io/tag/jira-scanner | 3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11581 | https://vulncheck.com/xdb/70249cb58be5||https://vulncheck.com/xdb/70249cb58be5 , https://vulncheck.com/xdb/550a7fd360d0||https://vulncheck.com/xdb/550a7fd360d0 , https://vulncheck.com/xdb/525e274bc1e4||https://vulncheck.com/xdb/525e274bc1e4 , https://vulncheck.com/xdb/2065a52f9faa||https://vulncheck.com/xdb/2065a52f9faa | |
CVE-2021-21973 | VMware | vCenter Server and Cloud Foundation | 03/07/2022 | 0.89919 | 5.3 | https://viz.greynoise.io/tag/vmware-vcenter-cve-2021-21973-ssrf-attempt||https://viz.greynoise.io/tag/vmware-vcenter-cve-2021-21973-ssrf-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21973 | https://vulncheck.com/xdb/81cfa5eed191 | ||
CVE-2013-0625 | Adobe | ColdFusion | 03/07/2022 | 0.86560 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0625 | ||||
CVE-2017-6077 | NETGEAR | Wireless Router DGN2200 | 03/07/2022 | 0.89761 | 9.8 | https://viz.greynoise.io/tag/netgear-dgn2200-ping-rce-attempt||https://viz.greynoise.io/tag/netgear-dgn2200-ping-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6077 | |||
CVE-2009-3960 | Adobe | BlazeDS | 03/07/2022 | 0.89585 | 6.5 | https://viz.greynoise.io/tag/adobe-xml-external-entity-injection-attempt||https://viz.greynoise.io/tag/adobe-xml-external-entity-injection-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-3960 | |||
CVE-2016-6277 | NETGEAR | Multiple Routers | 03/07/2022 | 0.94328 | 8.8 | https://viz.greynoise.io/tag/netgear-command-injection-attempt||https://viz.greynoise.io/tag/netgear-command-injection-attempt | 72 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2016-6277 | ||
CVE-2013-0631 | Adobe | ColdFusion | 03/07/2022 | 0.78752 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0631 | ||||
CVE-2022-26485 | Mozilla | Firefox | 03/07/2022 | 0.04450 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-26485 | https://vulncheck.com/xdb/23f11992b642 | |||
CVE-2015-3043 | Adobe | Flash Player | 03/03/2022 | 0.85155 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-3043 | ||||
CVE-2018-0159 | Cisco | IOS Software and Cisco IOS XE Software | 03/03/2022 | 0.06176 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0159 | ||||
CVE-2011-3544 | Oracle | Java SE JDK and JRE | 03/03/2022 | 0.93005 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-3544 | ||||
CVE-2017-12319 | Cisco | IOS XE Software | 03/03/2022 | 0.01269 | 5.9 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12319 | ||||
CVE-2010-0232 | Microsoft | Windows | 03/03/2022 | 0.73257 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-0232 | https://vulncheck.com/xdb/74da309f4d8d | |||
CVE-2017-0001 | Microsoft | Graphics Device Interface (GDI) | 03/03/2022 | 0.12861 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0001 | ||||
CVE-2015-1642 | Microsoft | Office | 03/03/2022 | 0.64711 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1642 | ||||
CVE-2018-0158 | Cisco | IOS Software and Cisco IOS XE Software | 03/03/2022 | 0.15930 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0158 | ||||
CVE-2018-0155 | Cisco | Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches | 03/03/2022 | 0.15317 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0155 | ||||
CVE-2017-12240 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.19962 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12240 | ||||
CVE-2018-0156 | Cisco | IOS Software and Cisco IOS XE Software | 03/03/2022 | 0.16461 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0156 | ||||
CVE-2017-6738 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.08509 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6738 | ||||
CVE-2017-6740 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.13038 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6740 | ||||
CVE-2016-8562 | Siemens | SIMATIC CP | 03/03/2022 | 0.14581 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-8562 | ||||
CVE-2017-6744 | Cisco | IOS software | 03/03/2022 | 0.12939 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6744 | ||||
CVE-2015-4902 | Oracle | Java SE | 03/03/2022 | 0.06707 | 5.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-4902 | ||||
CVE-2018-0154 | Cisco | IOS Software | 03/03/2022 | 0.10850 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0154 | ||||
CVE-2018-0151 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.09812 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0151 | ||||
CVE-2018-0172 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.05957 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0172 | ||||
CVE-2020-1938 | Apache | Tomcat | 03/03/2022 | 0.94469 | 9.8 | https://viz.greynoise.io/tag/ghostcat-scanner||https://viz.greynoise.io/tag/ghostcat-scanner | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1938 | https://vulncheck.com/xdb/e20dc1f808b8||https://vulncheck.com/xdb/e20dc1f808b8 , https://vulncheck.com/xdb/88a7c7ad43aa||https://vulncheck.com/xdb/88a7c7ad43aa , https://vulncheck.com/xdb/5af6d84a4f6d||https://vulncheck.com/xdb/5af6d84a4f6d , https://vulncheck.com/xdb/d5a0b7acb17c||https://vulncheck.com/xdb/d5a0b7acb17c , https://vulncheck.com/xdb/3ae53715fb1d||https://vulncheck.com/xdb/3ae53715fb1d , https://vulncheck.com/xdb/3d964bdfa9c1||https://vulncheck.com/xdb/3d964bdfa9c1 , https://vulncheck.com/xdb/12e3fe9de5f4||https://vulncheck.com/xdb/12e3fe9de5f4 , https://vulncheck.com/xdb/fa4d894fa7ee||https://vulncheck.com/xdb/fa4d894fa7ee , https://vulncheck.com/xdb/b2fb8d964e13||https://vulncheck.com/xdb/b2fb8d964e13 , https://vulncheck.com/xdb/bfdfc9be53fb||https://vulncheck.com/xdb/bfdfc9be53fb , https://vulncheck.com/xdb/8d0f432c9695||https://vulncheck.com/xdb/8d0f432c9695 , https://vulncheck.com/xdb/55578bb704d8||https://vulncheck.com/xdb/55578bb704d8 , https://vulncheck.com/xdb/95c0929acd12||https://vulncheck.com/xdb/95c0929acd12 , https://vulncheck.com/xdb/7e97ae83b853||https://vulncheck.com/xdb/7e97ae83b853 , https://vulncheck.com/xdb/556229dec09a||https://vulncheck.com/xdb/556229dec09a , https://vulncheck.com/xdb/f69eb1a05f7d||https://vulncheck.com/xdb/f69eb1a05f7d , https://vulncheck.com/xdb/d0c6a25f782c||https://vulncheck.com/xdb/d0c6a25f782c , https://vulncheck.com/xdb/6c2db5dec526||https://vulncheck.com/xdb/6c2db5dec526 , https://vulncheck.com/xdb/396912473adb||https://vulncheck.com/xdb/396912473adb , https://vulncheck.com/xdb/2b72da94f9cb||https://vulncheck.com/xdb/2b72da94f9cb , https://vulncheck.com/xdb/f17ae55010e2||https://vulncheck.com/xdb/f17ae55010e2 , https://vulncheck.com/xdb/0abdb0ef5835||https://vulncheck.com/xdb/0abdb0ef5835 | ||
CVE-2008-3431 | Oracle | VirtualBox | 03/03/2022 | 0.04798 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2008-3431 | ||||
CVE-2012-1723 | Oracle | Java SE | 03/03/2022 | 0.94083 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1723 | https://vulncheck.com/xdb/83ff19c4dc8c | |||
CVE-2022-20699 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | 03/03/2022 | 0.89924 | 10.0 | https://viz.greynoise.io/tag/cisco-rv-router-rce-attempt||https://viz.greynoise.io/tag/cisco-rv-router-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20699 | https://vulncheck.com/xdb/dc5a39831d19||https://vulncheck.com/xdb/dc5a39831d19 , https://vulncheck.com/xdb/768c813deaad||https://vulncheck.com/xdb/768c813deaad , https://vulncheck.com/xdb/7acf52ba8e46||https://vulncheck.com/xdb/7acf52ba8e46 , https://vulncheck.com/xdb/8bf31770e81a||https://vulncheck.com/xdb/8bf31770e81a | ||
CVE-2010-3333 | Microsoft | Office | 03/03/2022 | 0.93964 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-3333 | https://vulncheck.com/xdb/b335e249d55f | |||
CVE-2013-0632 | Adobe | ColdFusion | 03/03/2022 | 0.92249 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0632 | ||||
CVE-2016-1019 | Adobe | Flash Player | 03/03/2022 | 0.80878 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-1019 | ||||
CVE-2019-1652 | Cisco | Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers | 03/03/2022 | 0.89207 | 7.2 | https://viz.greynoise.io/tag/cisco-rv320-authenticated-rce-cve-2019-1652-attempt||https://viz.greynoise.io/tag/cisco-rv320-authenticated-rce-cve-2019-1652-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1652 | https://vulncheck.com/xdb/06e9512e7e39 | |
CVE-2017-6736 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.86397 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6736 | ||||
CVE-2022-20708 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | 03/03/2022 | 0.18023 | 10.0 | https://viz.greynoise.io/tag/cisco-small-business-rv-series-router-rce-cve-2022-20708-attempt||https://viz.greynoise.io/tag/cisco-small-business-rv-series-router-rce-cve-2022-20708-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20708 | |||
CVE-2019-16928 | Exim | Exim Internet Mailer | 03/03/2022 | 0.88588 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-16928 | ||||
CVE-2014-4114 | Microsoft | Windows | 03/03/2022 | 0.92188 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4114 | ||||
CVE-2018-8581 | Microsoft | Exchange Server | 03/03/2022 | 0.90830 | 7.4 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8581 | https://vulncheck.com/xdb/d7f23b749ff9||https://vulncheck.com/xdb/d7f23b749ff9 , https://vulncheck.com/xdb/7730cd30a582||https://vulncheck.com/xdb/7730cd30a582 , https://vulncheck.com/xdb/dba145cf3cba||https://vulncheck.com/xdb/dba145cf3cba , https://vulncheck.com/xdb/3d3434d62f82||https://vulncheck.com/xdb/3d3434d62f82 , https://vulncheck.com/xdb/276c34c7f74f||https://vulncheck.com/xdb/276c34c7f74f | |||
CVE-2018-0161 | Cisco | IOS Software | 03/03/2022 | 0.02517 | 6.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0161 | ||||
CVE-2017-11292 | Adobe | Flash Player | 03/03/2022 | 0.10801 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-11292 | ||||
CVE-2017-12235 | Cisco | IOS software | 03/03/2022 | 0.07628 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12235 | ||||
CVE-2013-0641 | Adobe | Reader | 03/03/2022 | 0.89391 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0641 | ||||
CVE-2017-12233 | Cisco | IOS software | 03/03/2022 | 0.10011 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12233 | ||||
CVE-2017-12231 | Cisco | IOS software | 03/03/2022 | 0.10850 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12231 | ||||
CVE-2015-7645 | Adobe | Flash Player | 03/03/2022 | 0.84843 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-7645 | ||||
CVE-2020-11899 | Treck TCP/IP stack | IPv6 | 03/03/2022 | 0.40204 | 5.4 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11899 | ||||
CVE-2017-6743 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.09066 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6743 | ||||
CVE-2016-7855 | Adobe | Flash Player | 03/03/2022 | 0.38931 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7855 | ||||
CVE-2016-5195 | Linux | Kernel | 03/03/2022 | 0.94181 | 7.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-5195 | https://vulncheck.com/xdb/6b7028face39||https://vulncheck.com/xdb/6b7028face39 , https://vulncheck.com/xdb/a87c371b3f3f||https://vulncheck.com/xdb/a87c371b3f3f , https://vulncheck.com/xdb/91934bafa64f||https://vulncheck.com/xdb/91934bafa64f , https://vulncheck.com/xdb/72416db5c445||https://vulncheck.com/xdb/72416db5c445 , https://vulncheck.com/xdb/3259770b0ff4||https://vulncheck.com/xdb/3259770b0ff4 , https://vulncheck.com/xdb/9fe4e31741bf||https://vulncheck.com/xdb/9fe4e31741bf , https://vulncheck.com/xdb/bbc108f0e2d3||https://vulncheck.com/xdb/bbc108f0e2d3 , https://vulncheck.com/xdb/26759f64e421||https://vulncheck.com/xdb/26759f64e421 , https://vulncheck.com/xdb/9125928f7603||https://vulncheck.com/xdb/9125928f7603 , https://vulncheck.com/xdb/2f99e74166ae||https://vulncheck.com/xdb/2f99e74166ae , https://vulncheck.com/xdb/770693b60910||https://vulncheck.com/xdb/770693b60910 , https://vulncheck.com/xdb/cecbca9ee49f||https://vulncheck.com/xdb/cecbca9ee49f , https://vulncheck.com/xdb/26aa72694109||https://vulncheck.com/xdb/26aa72694109 , https://vulncheck.com/xdb/f2204b41dd21||https://vulncheck.com/xdb/f2204b41dd21 , https://vulncheck.com/xdb/d1c17c081d03||https://vulncheck.com/xdb/d1c17c081d03 , https://vulncheck.com/xdb/3c59fbbe4941||https://vulncheck.com/xdb/3c59fbbe4941 , https://vulncheck.com/xdb/25a7d419158e||https://vulncheck.com/xdb/25a7d419158e , https://vulncheck.com/xdb/18b29d667585||https://vulncheck.com/xdb/18b29d667585 , https://vulncheck.com/xdb/01d749b64ad1||https://vulncheck.com/xdb/01d749b64ad1 , https://vulncheck.com/xdb/277a1d4bf8a2||https://vulncheck.com/xdb/277a1d4bf8a2 , https://vulncheck.com/xdb/8caaebd2c120||https://vulncheck.com/xdb/8caaebd2c120 , https://vulncheck.com/xdb/77f940bbe0a4||https://vulncheck.com/xdb/77f940bbe0a4 , https://vulncheck.com/xdb/4d43856ec877||https://vulncheck.com/xdb/4d43856ec877 , https://vulncheck.com/xdb/b05a18448174||https://vulncheck.com/xdb/b05a18448174 , https://vulncheck.com/xdb/0eca479a0f12||https://vulncheck.com/xdb/0eca479a0f12 , https://vulncheck.com/xdb/421bc3afa1a0||https://vulncheck.com/xdb/421bc3afa1a0 , https://vulncheck.com/xdb/10e422584e38||https://vulncheck.com/xdb/10e422584e38 , https://vulncheck.com/xdb/a84cc3ab3f48||https://vulncheck.com/xdb/a84cc3ab3f48 , https://vulncheck.com/xdb/c702394e39a9||https://vulncheck.com/xdb/c702394e39a9 , https://vulncheck.com/xdb/db0cfa39ee2e||https://vulncheck.com/xdb/db0cfa39ee2e , https://vulncheck.com/xdb/4275f34a5224||https://vulncheck.com/xdb/4275f34a5224 , https://vulncheck.com/xdb/56a0d9175e82||https://vulncheck.com/xdb/56a0d9175e82 , https://vulncheck.com/xdb/9ab30651140c||https://vulncheck.com/xdb/9ab30651140c , https://vulncheck.com/xdb/a73a45d1e2d2||https://vulncheck.com/xdb/a73a45d1e2d2 , https://vulncheck.com/xdb/31a0aa69cf4c||https://vulncheck.com/xdb/31a0aa69cf4c , https://vulncheck.com/xdb/5c3c3322474d||https://vulncheck.com/xdb/5c3c3322474d , https://vulncheck.com/xdb/94c11c970613||https://vulncheck.com/xdb/94c11c970613 , https://vulncheck.com/xdb/b81caecd21a0||https://vulncheck.com/xdb/b81caecd21a0 , https://vulncheck.com/xdb/52f1724c803a||https://vulncheck.com/xdb/52f1724c803a , https://vulncheck.com/xdb/bbdb7a7979da||https://vulncheck.com/xdb/bbdb7a7979da | |||
CVE-2018-0180 | Cisco | IOS Software | 03/03/2022 | 0.02047 | 5.9 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0180 | ||||
CVE-2017-12238 | Cisco | Catalyst 6800 Series Switches | 03/03/2022 | 0.00216 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12238 | ||||
CVE-2015-1701 | Microsoft | Win32k | 03/03/2022 | 0.90769 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1701 | https://vulncheck.com/xdb/eb4a799b8329||https://vulncheck.com/xdb/eb4a799b8329 , https://vulncheck.com/xdb/ee1abcca5405||https://vulncheck.com/xdb/ee1abcca5405 , https://vulncheck.com/xdb/6505b117b7db||https://vulncheck.com/xdb/6505b117b7db | |||
CVE-2015-2424 | Microsoft | PowerPoint | 03/03/2022 | 0.68248 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2424 | ||||
CVE-2017-6737 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.08509 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6737 | ||||
CVE-2017-6739 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.08509 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6739 | ||||
CVE-2012-4681 | Oracle | Java SE | 03/03/2022 | 0.94140 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-4681 | https://vulncheck.com/xdb/488e09b7437c||https://vulncheck.com/xdb/488e09b7437c , https://vulncheck.com/xdb/b7ad75c598ae||https://vulncheck.com/xdb/b7ad75c598ae | |||
CVE-2013-3346 | Adobe | Reader and Acrobat | 03/03/2022 | 0.89499 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3346 | ||||
CVE-2009-1123 | Microsoft | Windows | 03/03/2022 | 0.04402 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-1123 | ||||
CVE-2022-20701 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | 03/03/2022 | 0.05630 | 10.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20701 | ||||
CVE-2004-0210 | Microsoft | Windows | 03/03/2022 | 0.06330 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2004-0210 | ||||
CVE-2015-2387 | Microsoft | ATM Font Driver | 03/03/2022 | 0.30009 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2387 | https://vulncheck.com/xdb/eae6da526a3c | |||
CVE-2002-0367 | Microsoft | Windows | 03/03/2022 | 0.01396 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2002-0367 | ||||
CVE-2010-0188 | Adobe | Reader and Acrobat | 03/03/2022 | 0.92469 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-0188 | ||||
CVE-2022-20700 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | 03/03/2022 | 0.38098 | 10.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20700 | ||||
CVE-2019-1297 | Microsoft | Excel | 03/03/2022 | 0.56776 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1297 | ||||
CVE-2008-2992 | Adobe | Acrobat and Reader | 03/03/2022 | 0.93377 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2008-2992 | ||||
CVE-2021-41379 | Microsoft | Windows | 03/03/2022 | 0.04764 | 5.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-41379 | https://vulncheck.com/xdb/7fc0e1d60191 | |||
CVE-2009-3129 | Microsoft | Excel | 03/03/2022 | 0.89010 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2009-3129 | ||||
CVE-2014-0496 | Adobe | Reader and Acrobat | 03/03/2022 | 0.71650 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-0496 | ||||
CVE-2012-1856 | Microsoft | Office | 03/03/2022 | 0.92441 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1856 | ||||
CVE-2018-0167 | Cisco | IOS, XR, and XE Software | 03/03/2022 | 0.01893 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0167 | ||||
CVE-2011-0611 | Adobe | Flash Player | 03/03/2022 | 0.93047 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-0611 | ||||
CVE-2017-8540 | Microsoft | Malware Protection Engine | 03/03/2022 | 0.88632 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8540 | ||||
CVE-2013-3897 | Microsoft | Internet Explorer | 03/03/2022 | 0.88790 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3897 | ||||
CVE-2017-12232 | Cisco | IOS software | 03/03/2022 | 0.01583 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12232 | ||||
CVE-2018-0179 | Cisco | IOS Software | 03/03/2022 | 0.02393 | 5.9 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0179 | ||||
CVE-2015-2545 | Microsoft | Office | 03/03/2022 | 0.93252 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2545 | ||||
CVE-2018-0173 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.09766 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0173 | ||||
CVE-2016-0099 | Microsoft | Windows | 03/03/2022 | 0.90662 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0099 | https://vulncheck.com/xdb/5ee1591742d9||https://vulncheck.com/xdb/5ee1591742d9 , https://vulncheck.com/xdb/aa836ed9f079||https://vulncheck.com/xdb/aa836ed9f079 | |||
CVE-2015-2590 | Oracle | Java SE | 03/03/2022 | 0.68232 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-2590 | ||||
CVE-2011-1889 | Microsoft | Forefront Threat Management Gateway (TMG) | 03/03/2022 | 0.87382 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2011-1889 | ||||
CVE-2017-11826 | Microsoft | Office | 03/03/2022 | 0.89654 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-11826 | https://vulncheck.com/xdb/cc970cbd36e2||https://vulncheck.com/xdb/cc970cbd36e2 , https://vulncheck.com/xdb/97f6aa4aa057||https://vulncheck.com/xdb/97f6aa4aa057 | |||
CVE-2016-7262 | Microsoft | Excel | 03/03/2022 | 0.85201 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7262 | ||||
CVE-2017-0261 | Microsoft | Office | 03/03/2022 | 0.93027 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0261 | https://vulncheck.com/xdb/a2b315af6768||https://vulncheck.com/xdb/a2b315af6768 , https://vulncheck.com/xdb/60f2bb90aa34||https://vulncheck.com/xdb/60f2bb90aa34 | |||
CVE-2017-12237 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.08583 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12237 | ||||
CVE-2016-4117 | Adobe | Flash Player | 03/03/2022 | 0.92322 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4117 | ||||
CVE-2015-5119 | Adobe | Flash Player | 03/03/2022 | 0.93227 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-5119 | https://vulncheck.com/xdb/5f97b5ae8b1d||https://vulncheck.com/xdb/5f97b5ae8b1d , https://vulncheck.com/xdb/74176149f723||https://vulncheck.com/xdb/74176149f723 | |||
CVE-2013-1347 | Microsoft | Internet Explorer | 03/03/2022 | 0.90320 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-1347 | ||||
CVE-2012-0507 | Oracle | Java SE | 03/03/2022 | 0.93749 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0507 | ||||
CVE-2013-1675 | Mozilla | Firefox | 03/03/2022 | 0.02078 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-1675 | ||||
CVE-2017-6627 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.10886 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6627 | ||||
CVE-2017-6663 | Cisco | IOS and IOS XE Software | 03/03/2022 | 0.01099 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6663 | ||||
CVE-2013-5065 | Microsoft | Windows | 03/03/2022 | 0.59684 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-5065 | ||||
CVE-2013-0640 | Adobe | Reader and Acrobat | 03/03/2022 | 0.92564 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-0640 | ||||
CVE-2018-8298 | ChakraCore | ChakraCore scripting engine | 03/03/2022 | 0.89009 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8298 | ||||
CVE-2018-0174 | Cisco | IOS XE Software | 03/03/2022 | 0.05665 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0174 | ||||
CVE-2016-7193 | Microsoft | Office | 03/03/2022 | 0.78411 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7193 | ||||
CVE-2012-1535 | Adobe | Flash Player | 03/03/2022 | 0.92300 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-1535 | ||||
CVE-2018-0175 | Cisco | IOS, XR, and XE Software | 03/03/2022 | 0.02538 | 8.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0175 | ||||
CVE-2017-12234 | Cisco | IOS software | 03/03/2022 | 0.10011 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12234 | ||||
CVE-2022-20703 | Cisco | Small Business RV160, RV260, RV340, and RV345 Series Routers | 03/03/2022 | 0.03599 | 10.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-20703 | ||||
CVE-2022-24682 | Synacor | Zimbra Collaborate Suite (ZCS) | 02/25/2022 | 0.77845 | 6.1 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-24682 | ||||
CVE-2017-0222 | Microsoft | Internet Explorer | 02/25/2022 | 0.55657 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0222 | ||||
CVE-2014-6352 | Microsoft | Windows | 02/25/2022 | 0.90891 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-6352 | ||||
CVE-2017-8570 | Microsoft | Office | 02/25/2022 | 0.94247 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8570 | https://vulncheck.com/xdb/9fca9180d993||https://vulncheck.com/xdb/9fca9180d993 , https://vulncheck.com/xdb/6a21e4ebd2ad||https://vulncheck.com/xdb/6a21e4ebd2ad , https://vulncheck.com/xdb/60997abfb067||https://vulncheck.com/xdb/60997abfb067 , https://vulncheck.com/xdb/95241070fcc3||https://vulncheck.com/xdb/95241070fcc3 , https://vulncheck.com/xdb/5dbb4686472b||https://vulncheck.com/xdb/5dbb4686472b , https://vulncheck.com/xdb/08f7e45a3d54||https://vulncheck.com/xdb/08f7e45a3d54 , https://vulncheck.com/xdb/e86755a689d5||https://vulncheck.com/xdb/e86755a689d5 , https://vulncheck.com/xdb/aba696432d78||https://vulncheck.com/xdb/aba696432d78 , https://vulncheck.com/xdb/7d0692e4071c||https://vulncheck.com/xdb/7d0692e4071c | |||
CVE-2022-23131 | Zabbix | Frontend | 02/22/2022 | 0.94344 | 9.1 | https://viz.greynoise.io/tag/zabbix-saml-sso-authentication-bypass-attempt||https://viz.greynoise.io/tag/zabbix-saml-sso-authentication-bypass-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-23131 | https://vulncheck.com/xdb/57651461a50b||https://vulncheck.com/xdb/57651461a50b , https://vulncheck.com/xdb/e46f3b30212f||https://vulncheck.com/xdb/e46f3b30212f , https://vulncheck.com/xdb/099f2ba1828a||https://vulncheck.com/xdb/099f2ba1828a , https://vulncheck.com/xdb/6bf41d728409||https://vulncheck.com/xdb/6bf41d728409 , https://vulncheck.com/xdb/4fc1fafc24ec||https://vulncheck.com/xdb/4fc1fafc24ec , https://vulncheck.com/xdb/0eca8abcd488||https://vulncheck.com/xdb/0eca8abcd488 , https://vulncheck.com/xdb/f0dbb969817b||https://vulncheck.com/xdb/f0dbb969817b , https://vulncheck.com/xdb/87a03dbcb4d4||https://vulncheck.com/xdb/87a03dbcb4d4 , https://vulncheck.com/xdb/4bcdfe77a9b2||https://vulncheck.com/xdb/4bcdfe77a9b2 , https://vulncheck.com/xdb/63bde8d02b8f||https://vulncheck.com/xdb/63bde8d02b8f , https://vulncheck.com/xdb/9edf8d0fe243||https://vulncheck.com/xdb/9edf8d0fe243 , https://vulncheck.com/xdb/a91a49f498d6||https://vulncheck.com/xdb/a91a49f498d6 , https://vulncheck.com/xdb/004f3023163c||https://vulncheck.com/xdb/004f3023163c | ||
CVE-2022-23134 | Zabbix | Frontend | 02/22/2022 | 0.91580 | 3.7 | https://viz.greynoise.io/tag/zabbix-setup-php-authentication-bypass-attempt||https://viz.greynoise.io/tag/zabbix-setup-php-authentication-bypass-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-23134 | https://vulncheck.com/xdb/ed8b1935dc35 | ||
CVE-2019-0752 | Microsoft | Internet Explorer | 02/15/2022 | 0.91963 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0752 | https://vulncheck.com/xdb/0959a1e968fc | |||
CVE-2022-24086 | Adobe | Commerce and Magento Open Source | 02/15/2022 | 0.90759 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-24086 | https://vulncheck.com/xdb/7d60b3d01025||https://vulncheck.com/xdb/7d60b3d01025 , https://vulncheck.com/xdb/44b62a8bb94b||https://vulncheck.com/xdb/44b62a8bb94b , https://vulncheck.com/xdb/b307483bd289||https://vulncheck.com/xdb/b307483bd289 , https://vulncheck.com/xdb/a001349657ca||https://vulncheck.com/xdb/a001349657ca | |||
CVE-2013-3906 | Microsoft | Graphics Component | 02/15/2022 | 0.92857 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3906 | ||||
CVE-2022-0609 | Chromium Animation | 02/15/2022 | 0.59709 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-0609 | |||||
CVE-2018-8174 | Microsoft | Windows | 02/15/2022 | 0.94283 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8174 | https://vulncheck.com/xdb/b0607b49648f||https://vulncheck.com/xdb/b0607b49648f , https://vulncheck.com/xdb/77827f4282bf||https://vulncheck.com/xdb/77827f4282bf , https://vulncheck.com/xdb/2799542f34cf||https://vulncheck.com/xdb/2799542f34cf , https://vulncheck.com/xdb/4a0ac8d91b55||https://vulncheck.com/xdb/4a0ac8d91b55 , https://vulncheck.com/xdb/e1a613e9e771||https://vulncheck.com/xdb/e1a613e9e771 , https://vulncheck.com/xdb/a9ca59449e4a||https://vulncheck.com/xdb/a9ca59449e4a , https://vulncheck.com/xdb/803f22a963ca||https://vulncheck.com/xdb/803f22a963ca , https://vulncheck.com/xdb/90e91d5d93e3||https://vulncheck.com/xdb/90e91d5d93e3 | |||
CVE-2017-9841 | PHPUnit | PHPUnit | 02/15/2022 | 0.94406 | 9.8 | https://viz.greynoise.io/tag/phpunit-rce-attempt||https://viz.greynoise.io/tag/phpunit-rce-attempt , https://viz.greynoise.io/tag/phpunit-rce-attempt||https://viz.greynoise.io/tag/phpunit-rce-attempt | 90 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-9841 | https://vulncheck.com/xdb/2e43500dd68a||https://vulncheck.com/xdb/2e43500dd68a , https://vulncheck.com/xdb/487df0327bce||https://vulncheck.com/xdb/487df0327bce , https://vulncheck.com/xdb/8e4c8dfc7380||https://vulncheck.com/xdb/8e4c8dfc7380 , https://vulncheck.com/xdb/2f94822ef64a||https://vulncheck.com/xdb/2f94822ef64a , https://vulncheck.com/xdb/f2a50a4ad68f||https://vulncheck.com/xdb/f2a50a4ad68f , https://vulncheck.com/xdb/6435c08ede60||https://vulncheck.com/xdb/6435c08ede60 , https://vulncheck.com/xdb/f2c6ac384408||https://vulncheck.com/xdb/f2c6ac384408 , https://vulncheck.com/xdb/0ca48238fb60||https://vulncheck.com/xdb/0ca48238fb60 , https://vulncheck.com/xdb/7d5cdaa33e78||https://vulncheck.com/xdb/7d5cdaa33e78 , https://vulncheck.com/xdb/7a39231796b7||https://vulncheck.com/xdb/7a39231796b7 | |
CVE-2014-1761 | Microsoft | Word | 02/15/2022 | 0.92827 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-1761 | ||||
CVE-2018-15982 | Adobe | Flash Player | 02/15/2022 | 0.93341 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-15982 | https://vulncheck.com/xdb/93acce2e6c91||https://vulncheck.com/xdb/93acce2e6c91 , https://vulncheck.com/xdb/5506775f16d6||https://vulncheck.com/xdb/5506775f16d6 , https://vulncheck.com/xdb/a23523174921||https://vulncheck.com/xdb/a23523174921 , https://vulncheck.com/xdb/99b3d4ffd491||https://vulncheck.com/xdb/99b3d4ffd491 , https://vulncheck.com/xdb/dbe63aaa31cf||https://vulncheck.com/xdb/dbe63aaa31cf | |||
CVE-2018-20250 | RARLAB | WinRAR | 02/15/2022 | 0.93223 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-20250 | https://vulncheck.com/xdb/0c53977a59e6||https://vulncheck.com/xdb/0c53977a59e6 , https://vulncheck.com/xdb/7567f96bd245||https://vulncheck.com/xdb/7567f96bd245 , https://vulncheck.com/xdb/e67f95be5194||https://vulncheck.com/xdb/e67f95be5194 , https://vulncheck.com/xdb/265189697577||https://vulncheck.com/xdb/265189697577 , https://vulncheck.com/xdb/87be983eabdb||https://vulncheck.com/xdb/87be983eabdb , https://vulncheck.com/xdb/eae7eb1d7404||https://vulncheck.com/xdb/eae7eb1d7404 , https://vulncheck.com/xdb/62e3db5ba632||https://vulncheck.com/xdb/62e3db5ba632 , https://vulncheck.com/xdb/8781e0635d5a||https://vulncheck.com/xdb/8781e0635d5a , https://vulncheck.com/xdb/0e24e0f3c860||https://vulncheck.com/xdb/0e24e0f3c860 , https://vulncheck.com/xdb/577747b6d2f6||https://vulncheck.com/xdb/577747b6d2f6 , https://vulncheck.com/xdb/89f8948e60fb||https://vulncheck.com/xdb/89f8948e60fb , https://vulncheck.com/xdb/07d3492b35b0||https://vulncheck.com/xdb/07d3492b35b0 , https://vulncheck.com/xdb/1c893692c804||https://vulncheck.com/xdb/1c893692c804 , https://vulncheck.com/xdb/769a10397402||https://vulncheck.com/xdb/769a10397402 , https://vulncheck.com/xdb/4cf24d124675||https://vulncheck.com/xdb/4cf24d124675 , https://vulncheck.com/xdb/2f088777b403||https://vulncheck.com/xdb/2f088777b403 , https://vulncheck.com/xdb/f92a55a02a71||https://vulncheck.com/xdb/f92a55a02a71 | |||
CVE-2022-22620 | Apple | iOS, iPadOS, and macOS | 02/11/2022 | 0.03877 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22620 | https://vulncheck.com/xdb/7c5d41b7c5bd||https://vulncheck.com/xdb/7c5d41b7c5bd , https://vulncheck.com/xdb/577f4e8d7d38||https://vulncheck.com/xdb/577f4e8d7d38 | |||
CVE-2015-1130 | Apple | OS X | 02/10/2022 | 0.26042 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1130 | https://vulncheck.com/xdb/0014762ccc68||https://vulncheck.com/xdb/0014762ccc68 , https://vulncheck.com/xdb/afd1ccbf6e8d||https://vulncheck.com/xdb/afd1ccbf6e8d | |||
CVE-2020-0796 | Microsoft | SMBv3 | 02/10/2022 | 0.94419 | 10.0 | https://viz.greynoise.io/tag/smbghost-vuln-check||https://viz.greynoise.io/tag/smbghost-vuln-check | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0796 | https://vulncheck.com/xdb/f8f7a66ca404||https://vulncheck.com/xdb/f8f7a66ca404 , https://vulncheck.com/xdb/132b45db5c90||https://vulncheck.com/xdb/132b45db5c90 , https://vulncheck.com/xdb/fff5ddf87547||https://vulncheck.com/xdb/fff5ddf87547 , https://vulncheck.com/xdb/df0832d0144e||https://vulncheck.com/xdb/df0832d0144e , https://vulncheck.com/xdb/0edf8728bb5f||https://vulncheck.com/xdb/0edf8728bb5f , https://vulncheck.com/xdb/216af6a16e50||https://vulncheck.com/xdb/216af6a16e50 , https://vulncheck.com/xdb/ff75d491e221||https://vulncheck.com/xdb/ff75d491e221 , https://vulncheck.com/xdb/d44cedf42a97||https://vulncheck.com/xdb/d44cedf42a97 , https://vulncheck.com/xdb/c61e689a70b5||https://vulncheck.com/xdb/c61e689a70b5 , https://vulncheck.com/xdb/33e62c3dd628||https://vulncheck.com/xdb/33e62c3dd628 , https://vulncheck.com/xdb/db287bfd1300||https://vulncheck.com/xdb/db287bfd1300 , https://vulncheck.com/xdb/cf4d2847f48a||https://vulncheck.com/xdb/cf4d2847f48a , https://vulncheck.com/xdb/1fe25bc46b28||https://vulncheck.com/xdb/1fe25bc46b28 , https://vulncheck.com/xdb/35944ecc6741||https://vulncheck.com/xdb/35944ecc6741 , https://vulncheck.com/xdb/48181658a679||https://vulncheck.com/xdb/48181658a679 , https://vulncheck.com/xdb/189b546ce23d||https://vulncheck.com/xdb/189b546ce23d , https://vulncheck.com/xdb/2a4b6e1593eb||https://vulncheck.com/xdb/2a4b6e1593eb , https://vulncheck.com/xdb/14a46f453670||https://vulncheck.com/xdb/14a46f453670 , https://vulncheck.com/xdb/0dcd49541f47||https://vulncheck.com/xdb/0dcd49541f47 , https://vulncheck.com/xdb/484b2a81c82e||https://vulncheck.com/xdb/484b2a81c82e , https://vulncheck.com/xdb/4e6bc5ec8634||https://vulncheck.com/xdb/4e6bc5ec8634 , https://vulncheck.com/xdb/1bd0e82ed8ee||https://vulncheck.com/xdb/1bd0e82ed8ee , https://vulncheck.com/xdb/5f4027f27dae||https://vulncheck.com/xdb/5f4027f27dae , https://vulncheck.com/xdb/1f736df77952||https://vulncheck.com/xdb/1f736df77952 , https://vulncheck.com/xdb/9f1dbe33c767||https://vulncheck.com/xdb/9f1dbe33c767 , https://vulncheck.com/xdb/405831a8e860||https://vulncheck.com/xdb/405831a8e860 , https://vulncheck.com/xdb/9e0eebcc0239||https://vulncheck.com/xdb/9e0eebcc0239 , https://vulncheck.com/xdb/234a8c77ec20||https://vulncheck.com/xdb/234a8c77ec20 , https://vulncheck.com/xdb/002285bd34cf||https://vulncheck.com/xdb/002285bd34cf , https://vulncheck.com/xdb/5f415b7a9395||https://vulncheck.com/xdb/5f415b7a9395 , https://vulncheck.com/xdb/c349096df32e||https://vulncheck.com/xdb/c349096df32e , https://vulncheck.com/xdb/d7d5d53f4bea||https://vulncheck.com/xdb/d7d5d53f4bea , https://vulncheck.com/xdb/1433f57a34a7||https://vulncheck.com/xdb/1433f57a34a7 , https://vulncheck.com/xdb/a788d7636e90||https://vulncheck.com/xdb/a788d7636e90 , https://vulncheck.com/xdb/1e6f8ca038f7||https://vulncheck.com/xdb/1e6f8ca038f7 , https://vulncheck.com/xdb/c489f75bf99d||https://vulncheck.com/xdb/c489f75bf99d , https://vulncheck.com/xdb/6d070666358a||https://vulncheck.com/xdb/6d070666358a , https://vulncheck.com/xdb/19e081f7a0e0||https://vulncheck.com/xdb/19e081f7a0e0 , https://vulncheck.com/xdb/d69aadafc43a||https://vulncheck.com/xdb/d69aadafc43a , https://vulncheck.com/xdb/424a6065b5a6||https://vulncheck.com/xdb/424a6065b5a6 , https://vulncheck.com/xdb/a08cd7c0ec40||https://vulncheck.com/xdb/a08cd7c0ec40 , https://vulncheck.com/xdb/059158002b34||https://vulncheck.com/xdb/059158002b34 , https://vulncheck.com/xdb/ac5de3e67dd5||https://vulncheck.com/xdb/ac5de3e67dd5 , https://vulncheck.com/xdb/28ef5a320ff6||https://vulncheck.com/xdb/28ef5a320ff6 , https://vulncheck.com/xdb/f25ef6c781a3||https://vulncheck.com/xdb/f25ef6c781a3 , https://vulncheck.com/xdb/04badb202b58||https://vulncheck.com/xdb/04badb202b58 , https://vulncheck.com/xdb/673033cc1f2d||https://vulncheck.com/xdb/673033cc1f2d , https://vulncheck.com/xdb/0783c8074cff||https://vulncheck.com/xdb/0783c8074cff , https://vulncheck.com/xdb/17f7ca6e1bfa||https://vulncheck.com/xdb/17f7ca6e1bfa , https://vulncheck.com/xdb/42d4e59819e1||https://vulncheck.com/xdb/42d4e59819e1 , https://vulncheck.com/xdb/33fb0416877c||https://vulncheck.com/xdb/33fb0416877c , https://vulncheck.com/xdb/f1c35a49bda4||https://vulncheck.com/xdb/f1c35a49bda4 , https://vulncheck.com/xdb/b8b6072526a3||https://vulncheck.com/xdb/b8b6072526a3 , https://vulncheck.com/xdb/935c9e284cc4||https://vulncheck.com/xdb/935c9e284cc4 | ||
CVE-2017-0144 | Microsoft | SMBv1 | 02/10/2022 | 0.94323 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0144 | https://vulncheck.com/xdb/72e1c61d88d7||https://vulncheck.com/xdb/72e1c61d88d7 , https://vulncheck.com/xdb/ad1d794cf666||https://vulncheck.com/xdb/ad1d794cf666 | |||
CVE-2015-2051 | D-Link | DIR-645 Router | 02/10/2022 | 0.90922 | 9.8 | 106 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2015-2051 | |||
CVE-2017-9791 | Apache | Struts 1 | 02/10/2022 | 0.94263 | 9.8 | https://viz.greynoise.io/tag/apache-struts-2-rce-attempt||https://viz.greynoise.io/tag/apache-struts-2-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-9791 | https://vulncheck.com/xdb/8b1dd6d0c703||https://vulncheck.com/xdb/8b1dd6d0c703 , https://vulncheck.com/xdb/bacc4a0c75f1||https://vulncheck.com/xdb/bacc4a0c75f1 , https://vulncheck.com/xdb/2fe7d1498974||https://vulncheck.com/xdb/2fe7d1498974 | ||
CVE-2014-4404 | Apple | OS X | 02/10/2022 | 0.53334 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-4404 | ||||
CVE-2017-8464 | Microsoft | Windows | 02/10/2022 | 0.93542 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8464 | https://vulncheck.com/xdb/4680b98695eb||https://vulncheck.com/xdb/4680b98695eb , https://vulncheck.com/xdb/40020c9d725b||https://vulncheck.com/xdb/40020c9d725b , https://vulncheck.com/xdb/6bd690a6cb72||https://vulncheck.com/xdb/6bd690a6cb72 | |||
CVE-2016-3088 | Apache | ActiveMQ | 02/10/2022 | 0.94290 | 9.8 | https://viz.greynoise.io/tag/apache-activemq-worm-attempt||https://viz.greynoise.io/tag/apache-activemq-worm-attempt | 4 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3088 | https://vulncheck.com/xdb/b4d788f18d78||https://vulncheck.com/xdb/b4d788f18d78 , https://vulncheck.com/xdb/bc5d77bfbacc||https://vulncheck.com/xdb/bc5d77bfbacc , https://vulncheck.com/xdb/a7cca355deef||https://vulncheck.com/xdb/a7cca355deef , https://vulncheck.com/xdb/91570066cf0f||https://vulncheck.com/xdb/91570066cf0f , https://vulncheck.com/xdb/96c75f71a2ee||https://vulncheck.com/xdb/96c75f71a2ee , https://vulncheck.com/xdb/5475b9b03dcc||https://vulncheck.com/xdb/5475b9b03dcc , https://vulncheck.com/xdb/90020a901ec3||https://vulncheck.com/xdb/90020a901ec3 | |
CVE-2017-0263 | Microsoft | Win32k | 02/10/2022 | 0.17937 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0263 | ||||
CVE-2015-1635 | Microsoft | HTTP.sys | 02/10/2022 | 0.94310 | 9.8 | https://viz.greynoise.io/tag/ms15-034-dos-attempt||https://viz.greynoise.io/tag/ms15-034-dos-attempt , https://viz.greynoise.io/tag/ms15-034-vulnerability-check||https://viz.greynoise.io/tag/ms15-034-vulnerability-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1635 | https://vulncheck.com/xdb/f333a38f931a||https://vulncheck.com/xdb/f333a38f931a , https://vulncheck.com/xdb/4d00daf97977||https://vulncheck.com/xdb/4d00daf97977 , https://vulncheck.com/xdb/693e42549523||https://vulncheck.com/xdb/693e42549523 , https://vulncheck.com/xdb/58a3b1e81ee2||https://vulncheck.com/xdb/58a3b1e81ee2 , https://vulncheck.com/xdb/2d56398584ad||https://vulncheck.com/xdb/2d56398584ad , https://vulncheck.com/xdb/df55a69b1021||https://vulncheck.com/xdb/df55a69b1021 , https://vulncheck.com/xdb/215deead4210||https://vulncheck.com/xdb/215deead4210 , https://vulncheck.com/xdb/bd16f7896930||https://vulncheck.com/xdb/bd16f7896930 , https://vulncheck.com/xdb/55628ec20b97||https://vulncheck.com/xdb/55628ec20b97 , https://vulncheck.com/xdb/7690005e3e24||https://vulncheck.com/xdb/7690005e3e24 , https://vulncheck.com/xdb/640f8e881740||https://vulncheck.com/xdb/640f8e881740 | ||
CVE-2017-0262 | Microsoft | Office | 02/10/2022 | 0.64739 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0262 | ||||
CVE-2017-0145 | Microsoft | SMBv1 | 02/10/2022 | 0.93501 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0145 | ||||
CVE-2021-36934 | Microsoft | Windows | 02/10/2022 | 0.90397 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-36934 | https://vulncheck.com/xdb/96e9eacb05d6||https://vulncheck.com/xdb/96e9eacb05d6 , https://vulncheck.com/xdb/50f81231aee5||https://vulncheck.com/xdb/50f81231aee5 , https://vulncheck.com/xdb/ed07468efcaa||https://vulncheck.com/xdb/ed07468efcaa , https://vulncheck.com/xdb/9be67e72e04a||https://vulncheck.com/xdb/9be67e72e04a , https://vulncheck.com/xdb/591431919857||https://vulncheck.com/xdb/591431919857 , https://vulncheck.com/xdb/b8a3eb621c11||https://vulncheck.com/xdb/b8a3eb621c11 , https://vulncheck.com/xdb/a07f876412e5||https://vulncheck.com/xdb/a07f876412e5 , https://vulncheck.com/xdb/4ec8f950a8af||https://vulncheck.com/xdb/4ec8f950a8af , https://vulncheck.com/xdb/078d6f06bd90||https://vulncheck.com/xdb/078d6f06bd90 , https://vulncheck.com/xdb/f37385744f45||https://vulncheck.com/xdb/f37385744f45 , https://vulncheck.com/xdb/0dfa67c40229||https://vulncheck.com/xdb/0dfa67c40229 , https://vulncheck.com/xdb/123ee9082813||https://vulncheck.com/xdb/123ee9082813 , https://vulncheck.com/xdb/7a9d2a3f2520||https://vulncheck.com/xdb/7a9d2a3f2520 , https://vulncheck.com/xdb/545fd96d1ad3||https://vulncheck.com/xdb/545fd96d1ad3 , https://vulncheck.com/xdb/7e94de290340||https://vulncheck.com/xdb/7e94de290340 , https://vulncheck.com/xdb/f943b266eccd||https://vulncheck.com/xdb/f943b266eccd , https://vulncheck.com/xdb/2a12cca9cfb0||https://vulncheck.com/xdb/2a12cca9cfb0 , https://vulncheck.com/xdb/9f954d278217||https://vulncheck.com/xdb/9f954d278217 , https://vulncheck.com/xdb/3995834c206a||https://vulncheck.com/xdb/3995834c206a , https://vulncheck.com/xdb/9a45af3ec16c||https://vulncheck.com/xdb/9a45af3ec16c , https://vulncheck.com/xdb/80999bdcfa69||https://vulncheck.com/xdb/80999bdcfa69 | |||
CVE-2018-1000861 | Jenkins | Jenkins Stapler Web Framework | 02/10/2022 | 0.94487 | 9.8 | https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt||https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-1000861 | https://vulncheck.com/xdb/0fa5309130e4||https://vulncheck.com/xdb/0fa5309130e4 , https://vulncheck.com/xdb/456a6baaa89d||https://vulncheck.com/xdb/456a6baaa89d | |
CVE-2017-10271 | Oracle | WebLogic Server | 02/10/2022 | 0.94439 | 7.5 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-10271 | https://vulncheck.com/xdb/09caa396fa9d||https://vulncheck.com/xdb/09caa396fa9d , https://vulncheck.com/xdb/5876caaffa74||https://vulncheck.com/xdb/5876caaffa74 , https://vulncheck.com/xdb/b1d32de02744||https://vulncheck.com/xdb/b1d32de02744 , https://vulncheck.com/xdb/45527e228cbc||https://vulncheck.com/xdb/45527e228cbc , https://vulncheck.com/xdb/84b051e655c3||https://vulncheck.com/xdb/84b051e655c3 , https://vulncheck.com/xdb/ceea1ee6f89d||https://vulncheck.com/xdb/ceea1ee6f89d , https://vulncheck.com/xdb/79b07cfac599||https://vulncheck.com/xdb/79b07cfac599 , https://vulncheck.com/xdb/5db29476379f||https://vulncheck.com/xdb/5db29476379f , https://vulncheck.com/xdb/07ffaabdd9b4||https://vulncheck.com/xdb/07ffaabdd9b4 , https://vulncheck.com/xdb/439d9489666c||https://vulncheck.com/xdb/439d9489666c , https://vulncheck.com/xdb/14ab6f8b9982||https://vulncheck.com/xdb/14ab6f8b9982 , https://vulncheck.com/xdb/227b6343c39a||https://vulncheck.com/xdb/227b6343c39a , https://vulncheck.com/xdb/748e47609e78||https://vulncheck.com/xdb/748e47609e78 , https://vulncheck.com/xdb/d4ef87756956||https://vulncheck.com/xdb/d4ef87756956 , https://vulncheck.com/xdb/d09b1e7f97cc||https://vulncheck.com/xdb/d09b1e7f97cc , https://vulncheck.com/xdb/3f317861c109||https://vulncheck.com/xdb/3f317861c109 , https://vulncheck.com/xdb/560237e691a7||https://vulncheck.com/xdb/560237e691a7 , https://vulncheck.com/xdb/e9e5a0e896a8||https://vulncheck.com/xdb/e9e5a0e896a8 , https://vulncheck.com/xdb/81bc72dbea42||https://vulncheck.com/xdb/81bc72dbea42 , https://vulncheck.com/xdb/5d3fcd41baa9||https://vulncheck.com/xdb/5d3fcd41baa9 | |
CVE-2022-21882 | Microsoft | Win32k | 02/04/2022 | 0.89101 | 7.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-21882 | https://vulncheck.com/xdb/178edfa6e2a9||https://vulncheck.com/xdb/178edfa6e2a9 , https://vulncheck.com/xdb/daa024c59e63||https://vulncheck.com/xdb/daa024c59e63 , https://vulncheck.com/xdb/0df71d9bfe29||https://vulncheck.com/xdb/0df71d9bfe29 , https://vulncheck.com/xdb/5494ab88126e||https://vulncheck.com/xdb/5494ab88126e , https://vulncheck.com/xdb/9bd0de5ceacd||https://vulncheck.com/xdb/9bd0de5ceacd , https://vulncheck.com/xdb/8b1663fa985c||https://vulncheck.com/xdb/8b1663fa985c | |||
CVE-2014-7169 | GNU | Bourne-Again Shell (Bash) | 01/28/2022 | 0.88955 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-7169 | https://vulncheck.com/xdb/4198cdfc661f||https://vulncheck.com/xdb/4198cdfc661f , https://vulncheck.com/xdb/a74476a1777f||https://vulncheck.com/xdb/a74476a1777f | |||
CVE-2014-6271 | GNU | Bourne-Again Shell (Bash) | 01/28/2022 | 0.94220 | 9.8 | https://viz.greynoise.io/tag/qnap-nas-worm-attempt||https://viz.greynoise.io/tag/qnap-nas-worm-attempt , https://viz.greynoise.io/tag/shell-shock-cve-2014-6271-attempt||https://viz.greynoise.io/tag/shell-shock-cve-2014-6271-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-6271 | https://vulncheck.com/xdb/8d2b021f02a5||https://vulncheck.com/xdb/8d2b021f02a5 , https://vulncheck.com/xdb/7f347ea4e4c6||https://vulncheck.com/xdb/7f347ea4e4c6 , https://vulncheck.com/xdb/9550fc6e89ed||https://vulncheck.com/xdb/9550fc6e89ed , https://vulncheck.com/xdb/6af12f28ca11||https://vulncheck.com/xdb/6af12f28ca11 , https://vulncheck.com/xdb/b572ab83cdb5||https://vulncheck.com/xdb/b572ab83cdb5 , https://vulncheck.com/xdb/b6fa067a48a7||https://vulncheck.com/xdb/b6fa067a48a7 , https://vulncheck.com/xdb/e8cd174acc84||https://vulncheck.com/xdb/e8cd174acc84 , https://vulncheck.com/xdb/eb9720b691f3||https://vulncheck.com/xdb/eb9720b691f3 , https://vulncheck.com/xdb/990c93705921||https://vulncheck.com/xdb/990c93705921 , https://vulncheck.com/xdb/fbb4b4bb3ced||https://vulncheck.com/xdb/fbb4b4bb3ced , https://vulncheck.com/xdb/2ffa4dfd961a||https://vulncheck.com/xdb/2ffa4dfd961a , https://vulncheck.com/xdb/7deee0fd9dee||https://vulncheck.com/xdb/7deee0fd9dee , https://vulncheck.com/xdb/0c87a5624456||https://vulncheck.com/xdb/0c87a5624456 , https://vulncheck.com/xdb/771d67861982||https://vulncheck.com/xdb/771d67861982 , https://vulncheck.com/xdb/1b466fc06fc0||https://vulncheck.com/xdb/1b466fc06fc0 , https://vulncheck.com/xdb/18c86f55b23d||https://vulncheck.com/xdb/18c86f55b23d , https://vulncheck.com/xdb/37913b9c97af||https://vulncheck.com/xdb/37913b9c97af , https://vulncheck.com/xdb/87352658799b||https://vulncheck.com/xdb/87352658799b , https://vulncheck.com/xdb/4b6744519444||https://vulncheck.com/xdb/4b6744519444 , https://vulncheck.com/xdb/8cb6b0e4bfd9||https://vulncheck.com/xdb/8cb6b0e4bfd9 , https://vulncheck.com/xdb/1b15435d492f||https://vulncheck.com/xdb/1b15435d492f , https://vulncheck.com/xdb/ea7dfb5a79c0||https://vulncheck.com/xdb/ea7dfb5a79c0 , https://vulncheck.com/xdb/fa1741b5fe55||https://vulncheck.com/xdb/fa1741b5fe55 , https://vulncheck.com/xdb/a69624ba8529||https://vulncheck.com/xdb/a69624ba8529 , https://vulncheck.com/xdb/89cf85aa3c3d||https://vulncheck.com/xdb/89cf85aa3c3d , https://vulncheck.com/xdb/1d5c31767173||https://vulncheck.com/xdb/1d5c31767173 , https://vulncheck.com/xdb/462fc384771e||https://vulncheck.com/xdb/462fc384771e , https://vulncheck.com/xdb/b4b5de984e30||https://vulncheck.com/xdb/b4b5de984e30 , https://vulncheck.com/xdb/daaa4adc42e7||https://vulncheck.com/xdb/daaa4adc42e7 , https://vulncheck.com/xdb/177e5ecfe706||https://vulncheck.com/xdb/177e5ecfe706 , https://vulncheck.com/xdb/91302a8a527c||https://vulncheck.com/xdb/91302a8a527c , https://vulncheck.com/xdb/137b7b5051c2||https://vulncheck.com/xdb/137b7b5051c2 , https://vulncheck.com/xdb/e57812c06caf||https://vulncheck.com/xdb/e57812c06caf , https://vulncheck.com/xdb/f04bc714ad93||https://vulncheck.com/xdb/f04bc714ad93 , https://vulncheck.com/xdb/3af8913bb29e||https://vulncheck.com/xdb/3af8913bb29e | |
CVE-2017-5689 | Intel | Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability | 01/28/2022 | 0.94315 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-5689 | https://vulncheck.com/xdb/063f844548ff||https://vulncheck.com/xdb/063f844548ff , https://vulncheck.com/xdb/8f2f831b16a0||https://vulncheck.com/xdb/8f2f831b16a0 , https://vulncheck.com/xdb/6d5963dde233||https://vulncheck.com/xdb/6d5963dde233 | |||
CVE-2020-0787 | Microsoft | Windows | 01/28/2022 | 0.57305 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0787 | https://vulncheck.com/xdb/e80bf2969f59||https://vulncheck.com/xdb/e80bf2969f59 , https://vulncheck.com/xdb/d9c5b437e166||https://vulncheck.com/xdb/d9c5b437e166 , https://vulncheck.com/xdb/8e30ee28c46e||https://vulncheck.com/xdb/8e30ee28c46e , https://vulncheck.com/xdb/be286a8966d1||https://vulncheck.com/xdb/be286a8966d1 , https://vulncheck.com/xdb/483730acb6d9||https://vulncheck.com/xdb/483730acb6d9 , https://vulncheck.com/xdb/a117029b544b||https://vulncheck.com/xdb/a117029b544b , https://vulncheck.com/xdb/f5fe94ac04b2||https://vulncheck.com/xdb/f5fe94ac04b2 , https://vulncheck.com/xdb/fd492c871d51||https://vulncheck.com/xdb/fd492c871d51 , https://vulncheck.com/xdb/1ab4e5f57a90||https://vulncheck.com/xdb/1ab4e5f57a90 | |||
CVE-2021-20038 | SonicWall | SMA 100 Appliances | 01/28/2022 | 0.94311 | 9.8 | https://viz.greynoise.io/tag/sonicwall-sma-appliance-rce-attempt||https://viz.greynoise.io/tag/sonicwall-sma-appliance-rce-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20038 | https://vulncheck.com/xdb/b47634bfd8e8 | ||
CVE-2014-1776 | Microsoft | Internet Explorer | 01/28/2022 | 0.72488 | 9.8 | FALSE | FALSE | FALSE | https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776 | ||||
CVE-2020-5722 | Grandstream | UCM6200 | 01/28/2022 | 0.90907 | 9.8 | https://viz.greynoise.io/tag/grandstream-rce-vuln-check||https://viz.greynoise.io/tag/grandstream-rce-vuln-check , https://viz.greynoise.io/tag/grandstream-ucm62xx-rce-attempt||https://viz.greynoise.io/tag/grandstream-ucm62xx-rce-attempt | 0 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-5722 | ||
CVE-2022-22587 | Apple | iOS and macOS | 01/28/2022 | 0.00483 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2022-22587 | ||||
CVE-2021-35247 | SolarWinds | Serv-U | 01/21/2022 | 0.04983 | 4.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-35247 | ||||
CVE-2006-1547 | Apache | Struts 1 | 01/21/2022 | 0.13670 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2006-1547 | ||||
CVE-2018-8453 | Microsoft | Win32k | 01/21/2022 | 0.84016 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8453 | https://vulncheck.com/xdb/b083a48f7b97||https://vulncheck.com/xdb/b083a48f7b97 , https://vulncheck.com/xdb/8605f8dc5ea1||https://vulncheck.com/xdb/8605f8dc5ea1 , https://vulncheck.com/xdb/f209185692c9||https://vulncheck.com/xdb/f209185692c9 | |||
CVE-2012-0391 | Apache | Struts 2 | 01/21/2022 | 0.91293 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0391 | ||||
CVE-2020-13927 | Apache | Airflow's Experimental API | 01/18/2022 | 0.94183 | 9.8 | https://viz.greynoise.io/tag/apache-airflow-experimental-api-access-check||https://viz.greynoise.io/tag/apache-airflow-experimental-api-access-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-13927 | |||
CVE-2021-25296 | Nagios | Nagios XI | 01/18/2022 | 0.93482 | 8.8 | https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-25296 | |||
CVE-2020-14864 | Oracle | Intelligence Enterprise Edition | 01/18/2022 | 0.94009 | 7.5 | https://viz.greynoise.io/tag/oracle-business-intelligence-local-file-inclusion-attempt||https://viz.greynoise.io/tag/oracle-business-intelligence-local-file-inclusion-attempt | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-14864 | ||
CVE-2021-25298 | Nagios | Nagios XI | 01/18/2022 | 0.77096 | 8.8 | https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-25298 | |||
CVE-2021-21975 | VMware | vRealize Operations Manager API | 01/18/2022 | 0.94416 | 7.5 | https://viz.greynoise.io/tag/vmware-vrealize-operations-ssrf-attempt||https://viz.greynoise.io/tag/vmware-vrealize-operations-ssrf-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21975 | https://vulncheck.com/xdb/302c3f6e7bc3||https://vulncheck.com/xdb/302c3f6e7bc3 , https://vulncheck.com/xdb/458b60ea0b7c||https://vulncheck.com/xdb/458b60ea0b7c , https://vulncheck.com/xdb/ad7a54ca06a2||https://vulncheck.com/xdb/ad7a54ca06a2 , https://vulncheck.com/xdb/ae756f15b69d||https://vulncheck.com/xdb/ae756f15b69d , https://vulncheck.com/xdb/d999871da31f||https://vulncheck.com/xdb/d999871da31f , https://vulncheck.com/xdb/dd0990807e10||https://vulncheck.com/xdb/dd0990807e10 , https://vulncheck.com/xdb/5d186346d129||https://vulncheck.com/xdb/5d186346d129 , https://vulncheck.com/xdb/ea8505e383e2||https://vulncheck.com/xdb/ea8505e383e2 | |
CVE-2021-40870 | Aviatrix | Aviatrix Controller | 01/18/2022 | 0.94260 | 9.8 | https://viz.greynoise.io/tag/aviatrix-controller-rce-attempt||https://viz.greynoise.io/tag/aviatrix-controller-rce-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40870 | https://vulncheck.com/xdb/3bbd03015ca5||https://vulncheck.com/xdb/3bbd03015ca5 , https://vulncheck.com/xdb/7c329c1f9967||https://vulncheck.com/xdb/7c329c1f9967 , https://vulncheck.com/xdb/564210dea7a0||https://vulncheck.com/xdb/564210dea7a0 , https://vulncheck.com/xdb/cfa0cafc528d||https://vulncheck.com/xdb/cfa0cafc528d | |
CVE-2021-22991 | F5 | BIG-IP Traffic Management Microkernel | 01/18/2022 | 0.70784 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22991 | ||||
CVE-2021-32648 | October CMS | October CMS | 01/18/2022 | 0.72666 | 8.2 | https://viz.greynoise.io/tag/october-cms-password-reset-scanner||https://viz.greynoise.io/tag/october-cms-password-reset-scanner | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-32648 | https://vulncheck.com/xdb/9efd406c8865 | ||
CVE-2021-21315 | Npm package | System Information Library for Node.JS | 01/18/2022 | 0.93835 | 7.1 | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21315 | https://vulncheck.com/xdb/b335b010d8f4||https://vulncheck.com/xdb/b335b010d8f4 , https://vulncheck.com/xdb/82d28479bdcb||https://vulncheck.com/xdb/82d28479bdcb , https://vulncheck.com/xdb/103f055d687b||https://vulncheck.com/xdb/103f055d687b | ||
CVE-2021-25297 | Nagios | Nagios XI | 01/18/2022 | 0.51009 | 8.8 | https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-25297 | |||
CVE-2021-33766 | Microsoft | Exchange Server | 01/18/2022 | 0.91528 | 7.3 | https://viz.greynoise.io/tag/exchange-auth-bypass-attempt||https://viz.greynoise.io/tag/exchange-auth-bypass-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-33766 | https://vulncheck.com/xdb/7413bcfade93||https://vulncheck.com/xdb/7413bcfade93 , https://vulncheck.com/xdb/22cbf4a05a8d||https://vulncheck.com/xdb/22cbf4a05a8d | ||
CVE-2020-13671 | Drupal | Drupal core | 01/18/2022 | 0.04323 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-13671 | ||||
CVE-2020-11978 | Apache | Airflow | 01/18/2022 | 0.94269 | 8.8 | https://viz.greynoise.io/tag/apache-airflow-example-dag-rce-attempt||https://viz.greynoise.io/tag/apache-airflow-example-dag-rce-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11978 | https://vulncheck.com/xdb/73630c81bc79||https://vulncheck.com/xdb/73630c81bc79 , https://vulncheck.com/xdb/b834c5124a3e||https://vulncheck.com/xdb/b834c5124a3e | |
CVE-2020-6572 | Chrome Media | 01/10/2022 | 0.20360 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6572 | |||||
CVE-2013-3900 | Microsoft | WinVerifyTrust function | 01/10/2022 | 0.79965 | 5.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2013-3900 | https://vulncheck.com/xdb/a5d3448726f4 | |||
CVE-2021-22017 | VMware | vCenter Server | 01/10/2022 | 0.79163 | 5.3 | https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check , https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22017 | |||
CVE-2021-36260 | Hikvision | Security cameras web server | 01/10/2022 | 0.94436 | 9.8 | https://viz.greynoise.io/tag/hikvision-ip-camera-rce-attempt||https://viz.greynoise.io/tag/hikvision-ip-camera-rce-attempt | 3 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-36260 | https://vulncheck.com/xdb/3b4ddeccb73c||https://vulncheck.com/xdb/3b4ddeccb73c , https://vulncheck.com/xdb/fb357a667b00||https://vulncheck.com/xdb/fb357a667b00 , https://vulncheck.com/xdb/571b3021541a||https://vulncheck.com/xdb/571b3021541a , https://vulncheck.com/xdb/92d32617ecdc||https://vulncheck.com/xdb/92d32617ecdc , https://vulncheck.com/xdb/6e02def98dc1||https://vulncheck.com/xdb/6e02def98dc1 , https://vulncheck.com/xdb/3d6450b00d2f||https://vulncheck.com/xdb/3d6450b00d2f , https://vulncheck.com/xdb/36b538d97c5f||https://vulncheck.com/xdb/36b538d97c5f , https://vulncheck.com/xdb/fde64918a78d||https://vulncheck.com/xdb/fde64918a78d , https://vulncheck.com/xdb/ebbc2b573edd||https://vulncheck.com/xdb/ebbc2b573edd , https://vulncheck.com/xdb/c7787c78e609||https://vulncheck.com/xdb/c7787c78e609 , https://vulncheck.com/xdb/9622e9da156e||https://vulncheck.com/xdb/9622e9da156e , https://vulncheck.com/xdb/b03efde8723d||https://vulncheck.com/xdb/b03efde8723d , https://vulncheck.com/xdb/df0fc9bf195c||https://vulncheck.com/xdb/df0fc9bf195c , https://vulncheck.com/xdb/bff72b5d73fa||https://vulncheck.com/xdb/bff72b5d73fa | |
CVE-2015-7450 | IBM | WebSphere Application Server and Server Hypervisor Edition | 01/10/2022 | 0.94050 | 9.8 | https://viz.greynoise.io/tag/ibm-websphere-remote-code-execution-attempt||https://viz.greynoise.io/tag/ibm-websphere-remote-code-execution-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-7450 | https://vulncheck.com/xdb/322395a3fefa | ||
CVE-2019-10149 | Exim | Mail Transfer Agent (MTA) | 01/10/2022 | 0.93927 | 9.0 | https://viz.greynoise.io/tag/exim-rce-attempt||https://viz.greynoise.io/tag/exim-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-10149 | https://vulncheck.com/xdb/eeb36c51b81d||https://vulncheck.com/xdb/eeb36c51b81d , https://vulncheck.com/xdb/12238eca37ff||https://vulncheck.com/xdb/12238eca37ff , https://vulncheck.com/xdb/ca604e67a881||https://vulncheck.com/xdb/ca604e67a881 , https://vulncheck.com/xdb/2e73af25d4a9||https://vulncheck.com/xdb/2e73af25d4a9 , https://vulncheck.com/xdb/ca73aedc1e14||https://vulncheck.com/xdb/ca73aedc1e14 , https://vulncheck.com/xdb/0e9dcf2ac58c||https://vulncheck.com/xdb/0e9dcf2ac58c , https://vulncheck.com/xdb/49992cce5b1c||https://vulncheck.com/xdb/49992cce5b1c , https://vulncheck.com/xdb/ee883571c18e||https://vulncheck.com/xdb/ee883571c18e , https://vulncheck.com/xdb/1a1f3a4ff3c8||https://vulncheck.com/xdb/1a1f3a4ff3c8 , https://vulncheck.com/xdb/16dc2d42770c||https://vulncheck.com/xdb/16dc2d42770c , https://vulncheck.com/xdb/20346f31ab54||https://vulncheck.com/xdb/20346f31ab54 | ||
CVE-2019-1458 | Microsoft | Win32k | 01/10/2022 | 0.92947 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1458 | https://vulncheck.com/xdb/4ee4350d2747||https://vulncheck.com/xdb/4ee4350d2747 , https://vulncheck.com/xdb/a26d41dd78ca||https://vulncheck.com/xdb/a26d41dd78ca , https://vulncheck.com/xdb/72337ebb34f1||https://vulncheck.com/xdb/72337ebb34f1 | |||
CVE-2019-9670 | Synacor | Zimbra Collaboration Suite (ZCS) | 01/10/2022 | 0.94430 | 9.8 | https://viz.greynoise.io/tag/zimbra-collaboration-suite-xxe-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-xxe-attempt | 5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-9670 | https://vulncheck.com/xdb/f96906b5bf5d||https://vulncheck.com/xdb/f96906b5bf5d , https://vulncheck.com/xdb/5a57070a2e55||https://vulncheck.com/xdb/5a57070a2e55 , https://vulncheck.com/xdb/39e7f55e74cc||https://vulncheck.com/xdb/39e7f55e74cc , https://vulncheck.com/xdb/e273f1dc391e||https://vulncheck.com/xdb/e273f1dc391e , https://vulncheck.com/xdb/ff28b3d82e69||https://vulncheck.com/xdb/ff28b3d82e69 | |
CVE-2018-13383 | Fortinet | FortiOS and FortiProxy | 01/10/2022 | 0.01116 | 4.3 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-13383 | ||||
CVE-2021-27860 | FatPipe | WARP, IPVPN, and MPVPN software | 01/10/2022 | 0.42124 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27860 | ||||
CVE-2019-2725 | Oracle | WebLogic Server | 01/10/2022 | 0.94470 | 7.5 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-scanner||https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-scanner | 4 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-2725 | https://vulncheck.com/xdb/717e8523f747||https://vulncheck.com/xdb/717e8523f747 , https://vulncheck.com/xdb/71278e8e69eb||https://vulncheck.com/xdb/71278e8e69eb , https://vulncheck.com/xdb/561ad5895b63||https://vulncheck.com/xdb/561ad5895b63 , https://vulncheck.com/xdb/ebedc9f5eb85||https://vulncheck.com/xdb/ebedc9f5eb85 , https://vulncheck.com/xdb/5888723944a0||https://vulncheck.com/xdb/5888723944a0 , https://vulncheck.com/xdb/4aff13e21cd5||https://vulncheck.com/xdb/4aff13e21cd5 , https://vulncheck.com/xdb/5f7ca038e0a6||https://vulncheck.com/xdb/5f7ca038e0a6 , https://vulncheck.com/xdb/596e707e613e||https://vulncheck.com/xdb/596e707e613e , https://vulncheck.com/xdb/2957146db3b3||https://vulncheck.com/xdb/2957146db3b3 , https://vulncheck.com/xdb/78cfc32167c4||https://vulncheck.com/xdb/78cfc32167c4 , https://vulncheck.com/xdb/99f9740a5a03||https://vulncheck.com/xdb/99f9740a5a03 , https://vulncheck.com/xdb/50cca2cb6c66||https://vulncheck.com/xdb/50cca2cb6c66 , https://vulncheck.com/xdb/927806a24931||https://vulncheck.com/xdb/927806a24931 , https://vulncheck.com/xdb/1e4c0da55540||https://vulncheck.com/xdb/1e4c0da55540 | |
CVE-2019-1579 | Palo Alto Networks | PAN-OS | 01/10/2022 | 0.92678 | 8.1 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1579 | https://vulncheck.com/xdb/85c8b6324594||https://vulncheck.com/xdb/85c8b6324594 , https://vulncheck.com/xdb/67ee89857898||https://vulncheck.com/xdb/67ee89857898 | |||
CVE-2017-1000486 | Primetek | Primefaces Application | 01/10/2022 | 0.94042 | 9.8 | https://viz.greynoise.io/tag/primetek-primefaces-remote-code-execution-attempt||https://viz.greynoise.io/tag/primetek-primefaces-remote-code-execution-attempt | 3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-1000486 | https://vulncheck.com/xdb/ffc4627a2dd9||https://vulncheck.com/xdb/ffc4627a2dd9 , https://vulncheck.com/xdb/f6b53a975b3f||https://vulncheck.com/xdb/f6b53a975b3f , https://vulncheck.com/xdb/dfc63da61fc3||https://vulncheck.com/xdb/dfc63da61fc3 , https://vulncheck.com/xdb/c1c0a0a16204||https://vulncheck.com/xdb/c1c0a0a16204 , https://vulncheck.com/xdb/4642f57dc130||https://vulncheck.com/xdb/4642f57dc130 , https://vulncheck.com/xdb/b6e923cbdccc||https://vulncheck.com/xdb/b6e923cbdccc | |
CVE-2019-7609 | Elastic | Kibana | 01/10/2022 | 0.94448 | 10.0 | https://viz.greynoise.io/tag/kibana-timelion-api-check||https://viz.greynoise.io/tag/kibana-timelion-api-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7609 | https://vulncheck.com/xdb/99729775468d||https://vulncheck.com/xdb/99729775468d , https://vulncheck.com/xdb/1c48e403c9e9||https://vulncheck.com/xdb/1c48e403c9e9 , https://vulncheck.com/xdb/c711254ccffc||https://vulncheck.com/xdb/c711254ccffc , https://vulncheck.com/xdb/b2f2b26f8c21||https://vulncheck.com/xdb/b2f2b26f8c21 , https://vulncheck.com/xdb/31a2493d581c||https://vulncheck.com/xdb/31a2493d581c , https://vulncheck.com/xdb/47c366ae2f29||https://vulncheck.com/xdb/47c366ae2f29 , https://vulncheck.com/xdb/baa23d069da5||https://vulncheck.com/xdb/baa23d069da5 , https://vulncheck.com/xdb/1293a1a85b89||https://vulncheck.com/xdb/1293a1a85b89 , https://vulncheck.com/xdb/72f85a29c165||https://vulncheck.com/xdb/72f85a29c165 , https://vulncheck.com/xdb/b89478e4dff2||https://vulncheck.com/xdb/b89478e4dff2 | ||
CVE-2018-13382 | Fortinet | FortiOS and FortiProxy | 01/10/2022 | 0.86675 | 9.1 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-13382 | https://vulncheck.com/xdb/bac14e8d2f95||https://vulncheck.com/xdb/bac14e8d2f95 , https://vulncheck.com/xdb/9e3c1ae78338||https://vulncheck.com/xdb/9e3c1ae78338 , https://vulncheck.com/xdb/032ed957d9fa||https://vulncheck.com/xdb/032ed957d9fa | |||
CVE-2021-43890 | Microsoft | Windows | 12/15/2021 | 0.14934 | 7.1 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-43890 | ||||
CVE-2021-4102 | Chromium V8 | 12/15/2021 | 0.05265 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-4102 | |||||
CVE-2017-17562 | Embedthis | GoAhead | 12/10/2021 | 0.94053 | 8.1 | https://viz.greynoise.io/tag/embedthis-goahead-cve-2017-17562-rce-attempt||https://viz.greynoise.io/tag/embedthis-goahead-cve-2017-17562-rce-attempt | 0 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2017-17562 | https://vulncheck.com/xdb/b9ed9b17c839||https://vulncheck.com/xdb/b9ed9b17c839 , https://vulncheck.com/xdb/0ada689082df||https://vulncheck.com/xdb/0ada689082df , https://vulncheck.com/xdb/1c9b08ce66c0||https://vulncheck.com/xdb/1c9b08ce66c0 , https://vulncheck.com/xdb/39de3deda1bb||https://vulncheck.com/xdb/39de3deda1bb | |
CVE-2020-8816 | Pi-hole | AdminLTE | 12/10/2021 | 0.91018 | 9.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8816 | https://vulncheck.com/xdb/d538eb462f37||https://vulncheck.com/xdb/d538eb462f37 , https://vulncheck.com/xdb/2ea27aaa590f||https://vulncheck.com/xdb/2ea27aaa590f , https://vulncheck.com/xdb/b5bf7ad01990||https://vulncheck.com/xdb/b5bf7ad01990 | |||
CVE-2019-10758 | MongoDB | mongo-express | 12/10/2021 | 0.94361 | 9.9 | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-10758 | https://vulncheck.com/xdb/463bdb6b5b20||https://vulncheck.com/xdb/463bdb6b5b20 , https://vulncheck.com/xdb/b7262551c538||https://vulncheck.com/xdb/b7262551c538 | ||
CVE-2021-44168 | Fortinet | FortiOS | 12/10/2021 | 0.01136 | 3.3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-44168 | https://vulncheck.com/xdb/f4dc4ce29d25 | |||
CVE-2021-44515 | Zoho | Desktop Central | 12/10/2021 | 0.94311 | 9.8 | https://viz.greynoise.io/tag/zoho-manageengine-desktop-central-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-desktop-central-rce-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-44515 | |||
CVE-2020-17463 | Fuel CMS | Fuel CMS | 12/10/2021 | 0.11837 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-17463 | ||||
CVE-2019-0193 | Apache | Solr | 12/10/2021 | 0.93525 | 7.2 | https://viz.greynoise.io/tag/apache-solr-rce-attempt||https://viz.greynoise.io/tag/apache-solr-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0193 | https://vulncheck.com/xdb/f9730ca2bcd0||https://vulncheck.com/xdb/f9730ca2bcd0 , https://vulncheck.com/xdb/ccec007287ba||https://vulncheck.com/xdb/ccec007287ba , https://vulncheck.com/xdb/0ff186cb197f||https://vulncheck.com/xdb/0ff186cb197f , https://vulncheck.com/xdb/c6f3730bd8f0||https://vulncheck.com/xdb/c6f3730bd8f0 , https://vulncheck.com/xdb/9ca69682db00||https://vulncheck.com/xdb/9ca69682db00 | |
CVE-2010-1871 | Red Hat | JBoss Seam 2 | 12/10/2021 | 0.93853 | 8.8 | https://viz.greynoise.io/tag/jboss-seam-rce-attempt||https://viz.greynoise.io/tag/jboss-seam-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-1871 | |||
CVE-2019-7238 | Sonatype | Nexus Repository Manager | 12/10/2021 | 0.94184 | 9.8 | https://viz.greynoise.io/tag/nexus-rce-attempt||https://viz.greynoise.io/tag/nexus-rce-attempt , https://viz.greynoise.io/tag/nexus-rce-vuln-check||https://viz.greynoise.io/tag/nexus-rce-vuln-check | 4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7238 | https://vulncheck.com/xdb/4da5a08d9ad8||https://vulncheck.com/xdb/4da5a08d9ad8 , https://vulncheck.com/xdb/ea23cc246706||https://vulncheck.com/xdb/ea23cc246706 , https://vulncheck.com/xdb/3edc0bb5ba96||https://vulncheck.com/xdb/3edc0bb5ba96 , https://vulncheck.com/xdb/3190c1277623||https://vulncheck.com/xdb/3190c1277623 , https://vulncheck.com/xdb/b3a349f42d18||https://vulncheck.com/xdb/b3a349f42d18 | |
CVE-2019-13272 | Linux | Kernel | 12/10/2021 | 0.75438 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-13272 | https://vulncheck.com/xdb/a750816d33ab||https://vulncheck.com/xdb/a750816d33ab , https://vulncheck.com/xdb/ed71c71d1008||https://vulncheck.com/xdb/ed71c71d1008 , https://vulncheck.com/xdb/4cdc3b31592d||https://vulncheck.com/xdb/4cdc3b31592d , https://vulncheck.com/xdb/5581a09e1c77||https://vulncheck.com/xdb/5581a09e1c77 , https://vulncheck.com/xdb/72cbc61fa5c1||https://vulncheck.com/xdb/72cbc61fa5c1 , https://vulncheck.com/xdb/7500952732c6||https://vulncheck.com/xdb/7500952732c6 , https://vulncheck.com/xdb/95bb9eeffab4||https://vulncheck.com/xdb/95bb9eeffab4 , https://vulncheck.com/xdb/94bf994e3e35||https://vulncheck.com/xdb/94bf994e3e35 , https://vulncheck.com/xdb/1df2059c8c67||https://vulncheck.com/xdb/1df2059c8c67 , https://vulncheck.com/xdb/aebd1e7d7dfe||https://vulncheck.com/xdb/aebd1e7d7dfe | |||
CVE-2021-44228 | Apache | Log4j2 | 12/10/2021 | 0.94358 | 10.0 | https://viz.greynoise.io/tag/apache-log4j-rce-attempt||https://viz.greynoise.io/tag/apache-log4j-rce-attempt | 12 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-44228 | https://vulncheck.com/xdb/dba45441fe51||https://vulncheck.com/xdb/dba45441fe51 , https://vulncheck.com/xdb/a29851f816e5||https://vulncheck.com/xdb/a29851f816e5 , https://vulncheck.com/xdb/54a722d3152a||https://vulncheck.com/xdb/54a722d3152a , https://vulncheck.com/xdb/1f6ed84ff8ce||https://vulncheck.com/xdb/1f6ed84ff8ce , https://vulncheck.com/xdb/c29640a5f3eb||https://vulncheck.com/xdb/c29640a5f3eb , https://vulncheck.com/xdb/d33dca9d017b||https://vulncheck.com/xdb/d33dca9d017b , https://vulncheck.com/xdb/979783a8957b||https://vulncheck.com/xdb/979783a8957b , https://vulncheck.com/xdb/56c1c3c26112||https://vulncheck.com/xdb/56c1c3c26112 , https://vulncheck.com/xdb/5c6c4e68c806||https://vulncheck.com/xdb/5c6c4e68c806 , https://vulncheck.com/xdb/c9cb2e8864a3||https://vulncheck.com/xdb/c9cb2e8864a3 , https://vulncheck.com/xdb/88e63ac32997||https://vulncheck.com/xdb/88e63ac32997 , https://vulncheck.com/xdb/3a9ab83bcad0||https://vulncheck.com/xdb/3a9ab83bcad0 , https://vulncheck.com/xdb/c057d8038a5a||https://vulncheck.com/xdb/c057d8038a5a , https://vulncheck.com/xdb/97d627f4b9ba||https://vulncheck.com/xdb/97d627f4b9ba , https://vulncheck.com/xdb/21a43cd9e827||https://vulncheck.com/xdb/21a43cd9e827 , https://vulncheck.com/xdb/c2e335ff1a21||https://vulncheck.com/xdb/c2e335ff1a21 , https://vulncheck.com/xdb/4620cd5b1d60||https://vulncheck.com/xdb/4620cd5b1d60 , https://vulncheck.com/xdb/d8f0374c0fb9||https://vulncheck.com/xdb/d8f0374c0fb9 , https://vulncheck.com/xdb/5cf83af550fe||https://vulncheck.com/xdb/5cf83af550fe , https://vulncheck.com/xdb/891de99c4645||https://vulncheck.com/xdb/891de99c4645 , https://vulncheck.com/xdb/fb07ce8d99af||https://vulncheck.com/xdb/fb07ce8d99af , https://vulncheck.com/xdb/591512073cfa||https://vulncheck.com/xdb/591512073cfa , https://vulncheck.com/xdb/acf764964e3d||https://vulncheck.com/xdb/acf764964e3d , https://vulncheck.com/xdb/7d9d51922da4||https://vulncheck.com/xdb/7d9d51922da4 , https://vulncheck.com/xdb/3c41edcbcaf2||https://vulncheck.com/xdb/3c41edcbcaf2 , https://vulncheck.com/xdb/a19435132a43||https://vulncheck.com/xdb/a19435132a43 , https://vulncheck.com/xdb/97fe40642663||https://vulncheck.com/xdb/97fe40642663 , https://vulncheck.com/xdb/c0e60d5638ed||https://vulncheck.com/xdb/c0e60d5638ed , https://vulncheck.com/xdb/326e6538c620||https://vulncheck.com/xdb/326e6538c620 , https://vulncheck.com/xdb/7527d4f5f2a0||https://vulncheck.com/xdb/7527d4f5f2a0 , https://vulncheck.com/xdb/c63aff84cb37||https://vulncheck.com/xdb/c63aff84cb37 , https://vulncheck.com/xdb/2da304372505||https://vulncheck.com/xdb/2da304372505 , https://vulncheck.com/xdb/d372d3b26376||https://vulncheck.com/xdb/d372d3b26376 , https://vulncheck.com/xdb/f57f14ebef6c||https://vulncheck.com/xdb/f57f14ebef6c , https://vulncheck.com/xdb/77ee0efab407||https://vulncheck.com/xdb/77ee0efab407 , https://vulncheck.com/xdb/1f9ebf288986||https://vulncheck.com/xdb/1f9ebf288986 , https://vulncheck.com/xdb/33d1b4584ee8||https://vulncheck.com/xdb/33d1b4584ee8 , https://vulncheck.com/xdb/d8fa91bbd26c||https://vulncheck.com/xdb/d8fa91bbd26c , https://vulncheck.com/xdb/067762c45d29||https://vulncheck.com/xdb/067762c45d29 , https://vulncheck.com/xdb/03e32dfe2489||https://vulncheck.com/xdb/03e32dfe2489 , https://vulncheck.com/xdb/f161ac09099f||https://vulncheck.com/xdb/f161ac09099f , https://vulncheck.com/xdb/841758b2d4f4||https://vulncheck.com/xdb/841758b2d4f4 , https://vulncheck.com/xdb/78f6e0136a54||https://vulncheck.com/xdb/78f6e0136a54 , https://vulncheck.com/xdb/3b6093e72b93||https://vulncheck.com/xdb/3b6093e72b93 , https://vulncheck.com/xdb/a0ead52c9280||https://vulncheck.com/xdb/a0ead52c9280 , https://vulncheck.com/xdb/bb0d040b4903||https://vulncheck.com/xdb/bb0d040b4903 , https://vulncheck.com/xdb/fed04c94a2dc||https://vulncheck.com/xdb/fed04c94a2dc , https://vulncheck.com/xdb/586ef33d6a3a||https://vulncheck.com/xdb/586ef33d6a3a , https://vulncheck.com/xdb/ba3e7e5b416c||https://vulncheck.com/xdb/ba3e7e5b416c , https://vulncheck.com/xdb/a313ecfd69ac||https://vulncheck.com/xdb/a313ecfd69ac , https://vulncheck.com/xdb/a6af622ffa8b||https://vulncheck.com/xdb/a6af622ffa8b , https://vulncheck.com/xdb/3d55c6b2d5fb||https://vulncheck.com/xdb/3d55c6b2d5fb , https://vulncheck.com/xdb/620853d6da36||https://vulncheck.com/xdb/620853d6da36 , https://vulncheck.com/xdb/2ae20daa876f||https://vulncheck.com/xdb/2ae20daa876f , https://vulncheck.com/xdb/bc6bb6bf5116||https://vulncheck.com/xdb/bc6bb6bf5116 , https://vulncheck.com/xdb/9516d10f9dc1||https://vulncheck.com/xdb/9516d10f9dc1 , https://vulncheck.com/xdb/1f35dbf46c65||https://vulncheck.com/xdb/1f35dbf46c65 , https://vulncheck.com/xdb/d3b4139ec745||https://vulncheck.com/xdb/d3b4139ec745 , https://vulncheck.com/xdb/193cf7c8c810||https://vulncheck.com/xdb/193cf7c8c810 , https://vulncheck.com/xdb/60c07310e663||https://vulncheck.com/xdb/60c07310e663 , https://vulncheck.com/xdb/c555ac264c6e||https://vulncheck.com/xdb/c555ac264c6e , https://vulncheck.com/xdb/a57024d99795||https://vulncheck.com/xdb/a57024d99795 , https://vulncheck.com/xdb/94dd05cb788b||https://vulncheck.com/xdb/94dd05cb788b | |
CVE-2017-12149 | Red Hat | JBoss Application Server | 12/10/2021 | 0.94313 | 9.8 | https://viz.greynoise.io/tag/jboss-application-server-rce-attempt||https://viz.greynoise.io/tag/jboss-application-server-rce-attempt , https://viz.greynoise.io/tag/jboss-application-server-cve-2017-12149-check||https://viz.greynoise.io/tag/jboss-application-server-cve-2017-12149-check | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-12149 | https://vulncheck.com/xdb/62b031b6de05||https://vulncheck.com/xdb/62b031b6de05 , https://vulncheck.com/xdb/e9c9ec72c858||https://vulncheck.com/xdb/e9c9ec72c858 , https://vulncheck.com/xdb/df44860bdefc||https://vulncheck.com/xdb/df44860bdefc , https://vulncheck.com/xdb/6f98930c129d||https://vulncheck.com/xdb/6f98930c129d , https://vulncheck.com/xdb/0f8c52cba95a||https://vulncheck.com/xdb/0f8c52cba95a , https://vulncheck.com/xdb/048f545b0177||https://vulncheck.com/xdb/048f545b0177 , https://vulncheck.com/xdb/a775feeaa5fd||https://vulncheck.com/xdb/a775feeaa5fd , https://vulncheck.com/xdb/b37a3f028f09||https://vulncheck.com/xdb/b37a3f028f09 , https://vulncheck.com/xdb/93fd63db9635||https://vulncheck.com/xdb/93fd63db9635 , https://vulncheck.com/xdb/9291e025d38e||https://vulncheck.com/xdb/9291e025d38e , https://vulncheck.com/xdb/4f659f46be37||https://vulncheck.com/xdb/4f659f46be37 , https://vulncheck.com/xdb/d9f3bd9b80b5||https://vulncheck.com/xdb/d9f3bd9b80b5 , https://vulncheck.com/xdb/288d8baf4ead||https://vulncheck.com/xdb/288d8baf4ead , https://vulncheck.com/xdb/07509b590e3a||https://vulncheck.com/xdb/07509b590e3a , https://vulncheck.com/xdb/b933736f9e33||https://vulncheck.com/xdb/b933736f9e33 | |
CVE-2021-35394 | Realtek | Jungle Software Development Kit (SDK) | 12/10/2021 | 0.94335 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-35394 | ||||
CVE-2018-14847 | MikroTik | RouterOS | 12/01/2021 | 0.92843 | 9.1 | https://viz.greynoise.io/tag/mikrotik-worm-rce-attempt||https://viz.greynoise.io/tag/mikrotik-worm-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-14847 | https://vulncheck.com/xdb/128e7317908a||https://vulncheck.com/xdb/128e7317908a , https://vulncheck.com/xdb/81478e4d3f7c||https://vulncheck.com/xdb/81478e4d3f7c , https://vulncheck.com/xdb/64a0a764b901||https://vulncheck.com/xdb/64a0a764b901 , https://vulncheck.com/xdb/73631394b47a||https://vulncheck.com/xdb/73631394b47a , https://vulncheck.com/xdb/3a5dba2e76ad||https://vulncheck.com/xdb/3a5dba2e76ad , https://vulncheck.com/xdb/3d8ffb2a755a||https://vulncheck.com/xdb/3d8ffb2a755a , https://vulncheck.com/xdb/5ae17ea456eb||https://vulncheck.com/xdb/5ae17ea456eb , https://vulncheck.com/xdb/b611d9ebb286||https://vulncheck.com/xdb/b611d9ebb286 , https://vulncheck.com/xdb/02375d13c888||https://vulncheck.com/xdb/02375d13c888 , https://vulncheck.com/xdb/895d08413809||https://vulncheck.com/xdb/895d08413809 , https://vulncheck.com/xdb/6e85f1153945||https://vulncheck.com/xdb/6e85f1153945 , https://vulncheck.com/xdb/c9e4be4e4345||https://vulncheck.com/xdb/c9e4be4e4345 , https://vulncheck.com/xdb/ca877293c1a3||https://vulncheck.com/xdb/ca877293c1a3 , https://vulncheck.com/xdb/792af1f0da8f||https://vulncheck.com/xdb/792af1f0da8f , https://vulncheck.com/xdb/572a58ec0205||https://vulncheck.com/xdb/572a58ec0205 , https://vulncheck.com/xdb/6083a1b3aeeb||https://vulncheck.com/xdb/6083a1b3aeeb , https://vulncheck.com/xdb/50f4e94eddfd||https://vulncheck.com/xdb/50f4e94eddfd , https://vulncheck.com/xdb/8317dffde425||https://vulncheck.com/xdb/8317dffde425 | ||
CVE-2021-40438 | Apache | Apache | 12/01/2021 | 0.94432 | 9.0 | https://viz.greynoise.io/tag/apache-http-server-mod-proxy-ssrf-attempt||https://viz.greynoise.io/tag/apache-http-server-mod-proxy-ssrf-attempt | 1 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40438 | https://vulncheck.com/xdb/4961483e1a12||https://vulncheck.com/xdb/4961483e1a12 , https://vulncheck.com/xdb/fa2660f09705||https://vulncheck.com/xdb/fa2660f09705 , https://vulncheck.com/xdb/c2c694adbe9e||https://vulncheck.com/xdb/c2c694adbe9e , https://vulncheck.com/xdb/e06f4c13b530||https://vulncheck.com/xdb/e06f4c13b530 | |
CVE-2020-11261 | Qualcomm | Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | 12/01/2021 | 0.00286 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11261 | ||||
CVE-2021-37415 | Zoho | ManageEngine ServiceDesk Plus (SDP) | 12/01/2021 | 0.89357 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-37415 | ||||
CVE-2021-44077 | Zoho | ManageEngine ServiceDesk Plus (SDP) / SupportCenter Plus | 12/01/2021 | 0.94174 | 9.8 | https://viz.greynoise.io/tag/zoho-manageengine-servicedesk-plus-msiexec-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-servicedesk-plus-msiexec-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-44077 | https://vulncheck.com/xdb/ac0bb8719a41||https://vulncheck.com/xdb/ac0bb8719a41 , https://vulncheck.com/xdb/8f06ee8f835e||https://vulncheck.com/xdb/8f06ee8f835e | ||
CVE-2021-42292 | Microsoft | Office | 11/17/2021 | 0.17906 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42292 | ||||
CVE-2021-40449 | Microsoft | Windows | 11/17/2021 | 0.84576 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40449 | https://vulncheck.com/xdb/581985ad426e||https://vulncheck.com/xdb/581985ad426e , https://vulncheck.com/xdb/1d1392710a3c||https://vulncheck.com/xdb/1d1392710a3c , https://vulncheck.com/xdb/32687d6a60ea||https://vulncheck.com/xdb/32687d6a60ea , https://vulncheck.com/xdb/dccb5f085c09||https://vulncheck.com/xdb/dccb5f085c09 , https://vulncheck.com/xdb/0361271769af||https://vulncheck.com/xdb/0361271769af , https://vulncheck.com/xdb/313e377808dd||https://vulncheck.com/xdb/313e377808dd , https://vulncheck.com/xdb/34af326d80a1||https://vulncheck.com/xdb/34af326d80a1 , https://vulncheck.com/xdb/97c8caf60062||https://vulncheck.com/xdb/97c8caf60062 , https://vulncheck.com/xdb/83a3a8086e22||https://vulncheck.com/xdb/83a3a8086e22 | |||
CVE-2021-22204 | Perl | Exiftool | 11/17/2021 | 0.93188 | 6.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22204 | https://vulncheck.com/xdb/c7f016c6ff9c||https://vulncheck.com/xdb/c7f016c6ff9c , https://vulncheck.com/xdb/c1c6e7d5d1dc||https://vulncheck.com/xdb/c1c6e7d5d1dc , https://vulncheck.com/xdb/228b3b833130||https://vulncheck.com/xdb/228b3b833130 , https://vulncheck.com/xdb/2e739ce176b6||https://vulncheck.com/xdb/2e739ce176b6 , https://vulncheck.com/xdb/9c966b28d48a||https://vulncheck.com/xdb/9c966b28d48a , https://vulncheck.com/xdb/195f85ead56c||https://vulncheck.com/xdb/195f85ead56c , https://vulncheck.com/xdb/c1144f28258f||https://vulncheck.com/xdb/c1144f28258f , https://vulncheck.com/xdb/72105893a08a||https://vulncheck.com/xdb/72105893a08a , https://vulncheck.com/xdb/793a0410f319||https://vulncheck.com/xdb/793a0410f319 , https://vulncheck.com/xdb/0e17974417e2||https://vulncheck.com/xdb/0e17974417e2 , https://vulncheck.com/xdb/0c2c0a7d6b52||https://vulncheck.com/xdb/0c2c0a7d6b52 | |||
CVE-2021-42321 | Microsoft | Exchange | 11/17/2021 | 0.93507 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42321 | https://vulncheck.com/xdb/a0c967a6a2a7||https://vulncheck.com/xdb/a0c967a6a2a7 , https://vulncheck.com/xdb/ccd1d085c51d||https://vulncheck.com/xdb/ccd1d085c51d , https://vulncheck.com/xdb/4887f2112df9||https://vulncheck.com/xdb/4887f2112df9 | |||
CVE-2021-34448 | Microsoft | Windows | 11/03/2021 | 0.02807 | 6.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-34448 | ||||
CVE-2018-6789 | Exim | Exim | 11/03/2021 | 0.84925 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-6789 | https://vulncheck.com/xdb/fdfb46b03625||https://vulncheck.com/xdb/fdfb46b03625 , https://vulncheck.com/xdb/9513d11d58b1||https://vulncheck.com/xdb/9513d11d58b1 , https://vulncheck.com/xdb/648ffe0af5ad||https://vulncheck.com/xdb/648ffe0af5ad , https://vulncheck.com/xdb/59557009b138||https://vulncheck.com/xdb/59557009b138 | |||
CVE-2019-9978 | WordPress | Social Warfare Plugin | 11/03/2021 | 0.88916 | 6.1 | https://viz.greynoise.io/tag/wordpress-social-warfare-stored-xss-attempt||https://viz.greynoise.io/tag/wordpress-social-warfare-stored-xss-attempt | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-9978 | https://vulncheck.com/xdb/4f8c76c78bce||https://vulncheck.com/xdb/4f8c76c78bce , https://vulncheck.com/xdb/e62bb9f01805||https://vulncheck.com/xdb/e62bb9f01805 , https://vulncheck.com/xdb/89a9def6ffed||https://vulncheck.com/xdb/89a9def6ffed , https://vulncheck.com/xdb/b1aa6ec20c75||https://vulncheck.com/xdb/b1aa6ec20c75 , https://vulncheck.com/xdb/797f3f17dcb3||https://vulncheck.com/xdb/797f3f17dcb3 , https://vulncheck.com/xdb/5b8f3f707d29||https://vulncheck.com/xdb/5b8f3f707d29 , https://vulncheck.com/xdb/4c5c4c61dda3||https://vulncheck.com/xdb/4c5c4c61dda3 , https://vulncheck.com/xdb/5fa69ee6d630||https://vulncheck.com/xdb/5fa69ee6d630 , https://vulncheck.com/xdb/7621c2e4cc97||https://vulncheck.com/xdb/7621c2e4cc97 | |
CVE-2017-5638 | Apache | Struts | 11/03/2021 | 0.94267 | 9.8 | https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-worm-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-worm-attempt , https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-5638 | https://vulncheck.com/xdb/24ab649cd1da||https://vulncheck.com/xdb/24ab649cd1da , https://vulncheck.com/xdb/9eeabd073ffe||https://vulncheck.com/xdb/9eeabd073ffe , https://vulncheck.com/xdb/af94773df67e||https://vulncheck.com/xdb/af94773df67e , https://vulncheck.com/xdb/7609b3e7cb98||https://vulncheck.com/xdb/7609b3e7cb98 , https://vulncheck.com/xdb/f47a53762ef3||https://vulncheck.com/xdb/f47a53762ef3 , https://vulncheck.com/xdb/fb291c123615||https://vulncheck.com/xdb/fb291c123615 , https://vulncheck.com/xdb/1992a6b42411||https://vulncheck.com/xdb/1992a6b42411 , https://vulncheck.com/xdb/9b37ededd8ac||https://vulncheck.com/xdb/9b37ededd8ac , https://vulncheck.com/xdb/9c7436629672||https://vulncheck.com/xdb/9c7436629672 , https://vulncheck.com/xdb/fe25757247c8||https://vulncheck.com/xdb/fe25757247c8 , https://vulncheck.com/xdb/a920eeb5ee6a||https://vulncheck.com/xdb/a920eeb5ee6a , https://vulncheck.com/xdb/2372c571d51b||https://vulncheck.com/xdb/2372c571d51b , https://vulncheck.com/xdb/fecafad12e6c||https://vulncheck.com/xdb/fecafad12e6c , https://vulncheck.com/xdb/513b57e55c0f||https://vulncheck.com/xdb/513b57e55c0f , https://vulncheck.com/xdb/dbca6ea08b41||https://vulncheck.com/xdb/dbca6ea08b41 , https://vulncheck.com/xdb/3c19ff65296a||https://vulncheck.com/xdb/3c19ff65296a , https://vulncheck.com/xdb/1e4bb0c90cb0||https://vulncheck.com/xdb/1e4bb0c90cb0 , https://vulncheck.com/xdb/ab1e48aab793||https://vulncheck.com/xdb/ab1e48aab793 , https://vulncheck.com/xdb/bbdb72777ec9||https://vulncheck.com/xdb/bbdb72777ec9 , https://vulncheck.com/xdb/34e73d61d621||https://vulncheck.com/xdb/34e73d61d621 , https://vulncheck.com/xdb/1aeac5628880||https://vulncheck.com/xdb/1aeac5628880 , https://vulncheck.com/xdb/b7fcc6ca47d8||https://vulncheck.com/xdb/b7fcc6ca47d8 , https://vulncheck.com/xdb/337989a2a577||https://vulncheck.com/xdb/337989a2a577 , https://vulncheck.com/xdb/5de84d7d0047||https://vulncheck.com/xdb/5de84d7d0047 , https://vulncheck.com/xdb/92284df22d05||https://vulncheck.com/xdb/92284df22d05 , https://vulncheck.com/xdb/b5c1ab2d5bc5||https://vulncheck.com/xdb/b5c1ab2d5bc5 , https://vulncheck.com/xdb/2ee648e8c5ab||https://vulncheck.com/xdb/2ee648e8c5ab , https://vulncheck.com/xdb/fae964aee837||https://vulncheck.com/xdb/fae964aee837 , https://vulncheck.com/xdb/df60c287f1cd||https://vulncheck.com/xdb/df60c287f1cd , https://vulncheck.com/xdb/20280d4b350b||https://vulncheck.com/xdb/20280d4b350b , https://vulncheck.com/xdb/5773e4ea569b||https://vulncheck.com/xdb/5773e4ea569b , https://vulncheck.com/xdb/b0439ebbc0c0||https://vulncheck.com/xdb/b0439ebbc0c0 , https://vulncheck.com/xdb/961d20815cd2||https://vulncheck.com/xdb/961d20815cd2 , https://vulncheck.com/xdb/5dfed5d68cbc||https://vulncheck.com/xdb/5dfed5d68cbc , https://vulncheck.com/xdb/1b42cf9134f3||https://vulncheck.com/xdb/1b42cf9134f3 , https://vulncheck.com/xdb/5bf0668927e9||https://vulncheck.com/xdb/5bf0668927e9 , https://vulncheck.com/xdb/f0dd214c0a71||https://vulncheck.com/xdb/f0dd214c0a71 | |
CVE-2020-14750 | Oracle | WebLogic Server | 11/03/2021 | 0.94435 | 9.8 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-14750 | https://vulncheck.com/xdb/895ba6c2e154||https://vulncheck.com/xdb/895ba6c2e154 , https://vulncheck.com/xdb/8999db0c6380||https://vulncheck.com/xdb/8999db0c6380 , https://vulncheck.com/xdb/631bc40f2bc1||https://vulncheck.com/xdb/631bc40f2bc1 | ||
CVE-2021-22502 | Micro Focus | Operation Bridge Reporter (OBR) | 11/03/2021 | 0.93981 | 9.8 | https://viz.greynoise.io/tag/micro-focus-obr-rce-attempt||https://viz.greynoise.io/tag/micro-focus-obr-rce-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22502 | ||
CVE-2021-31201 | Microsoft | Enhanced Cryptographic Provider | 11/03/2021 | 0.00172 | 5.2 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31201 | ||||
CVE-2017-11882 | Microsoft | Office | 11/03/2021 | 0.94384 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-11882 | https://vulncheck.com/xdb/09bbc90e9042||https://vulncheck.com/xdb/09bbc90e9042 , https://vulncheck.com/xdb/1beb5af7f34c||https://vulncheck.com/xdb/1beb5af7f34c , https://vulncheck.com/xdb/884e21913154||https://vulncheck.com/xdb/884e21913154 , https://vulncheck.com/xdb/f1dea32cd138||https://vulncheck.com/xdb/f1dea32cd138 , https://vulncheck.com/xdb/5df312e9ad12||https://vulncheck.com/xdb/5df312e9ad12 , https://vulncheck.com/xdb/b7c60553adc6||https://vulncheck.com/xdb/b7c60553adc6 , https://vulncheck.com/xdb/f3e789735124||https://vulncheck.com/xdb/f3e789735124 , https://vulncheck.com/xdb/29dd95b375f6||https://vulncheck.com/xdb/29dd95b375f6 , https://vulncheck.com/xdb/560639fdbb7b||https://vulncheck.com/xdb/560639fdbb7b , https://vulncheck.com/xdb/a22f4f0b4f81||https://vulncheck.com/xdb/a22f4f0b4f81 , https://vulncheck.com/xdb/7b4a8e276f3c||https://vulncheck.com/xdb/7b4a8e276f3c , https://vulncheck.com/xdb/2c706d9ab4e2||https://vulncheck.com/xdb/2c706d9ab4e2 , https://vulncheck.com/xdb/bd4146cb3e92||https://vulncheck.com/xdb/bd4146cb3e92 , https://vulncheck.com/xdb/f99472e3e149||https://vulncheck.com/xdb/f99472e3e149 , https://vulncheck.com/xdb/1d994aebc6f7||https://vulncheck.com/xdb/1d994aebc6f7 , https://vulncheck.com/xdb/2289a5f14fd6||https://vulncheck.com/xdb/2289a5f14fd6 , https://vulncheck.com/xdb/f148343ee61b||https://vulncheck.com/xdb/f148343ee61b , https://vulncheck.com/xdb/e792aa5f248a||https://vulncheck.com/xdb/e792aa5f248a , https://vulncheck.com/xdb/a5ab3a44d45b||https://vulncheck.com/xdb/a5ab3a44d45b , https://vulncheck.com/xdb/ea0b976f167f||https://vulncheck.com/xdb/ea0b976f167f , https://vulncheck.com/xdb/40468e8cc38a||https://vulncheck.com/xdb/40468e8cc38a , https://vulncheck.com/xdb/94f46950b1a7||https://vulncheck.com/xdb/94f46950b1a7 , https://vulncheck.com/xdb/b33af3e3d9b8||https://vulncheck.com/xdb/b33af3e3d9b8 , https://vulncheck.com/xdb/047b151c3f07||https://vulncheck.com/xdb/047b151c3f07 , https://vulncheck.com/xdb/1ac59b46e457||https://vulncheck.com/xdb/1ac59b46e457 , https://vulncheck.com/xdb/5df1c82ae620||https://vulncheck.com/xdb/5df1c82ae620 , https://vulncheck.com/xdb/ce6706b8e64f||https://vulncheck.com/xdb/ce6706b8e64f , https://vulncheck.com/xdb/a5f8a5153c43||https://vulncheck.com/xdb/a5f8a5153c43 , https://vulncheck.com/xdb/e3d7500258d5||https://vulncheck.com/xdb/e3d7500258d5 , https://vulncheck.com/xdb/e74b79fd3ee0||https://vulncheck.com/xdb/e74b79fd3ee0 | |||
CVE-2021-30762 | Apple | iOS | 11/03/2021 | 0.00097 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30762 | ||||
CVE-2017-6327 | Symantec | Symantec Messaging Gateway | 11/03/2021 | 0.85196 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-6327 | ||||
CVE-2021-34473 | Microsoft | Exchange Server | 11/03/2021 | 0.94302 | 9.1 | https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-34473 | https://vulncheck.com/xdb/1ccb86cf538d||https://vulncheck.com/xdb/1ccb86cf538d , https://vulncheck.com/xdb/02834fa0ca2d||https://vulncheck.com/xdb/02834fa0ca2d , https://vulncheck.com/xdb/08d5fad3f877||https://vulncheck.com/xdb/08d5fad3f877 , https://vulncheck.com/xdb/601ea61e6151||https://vulncheck.com/xdb/601ea61e6151 , https://vulncheck.com/xdb/fb5181ef3b37||https://vulncheck.com/xdb/fb5181ef3b37 , https://vulncheck.com/xdb/e3d11e8fb280||https://vulncheck.com/xdb/e3d11e8fb280 , https://vulncheck.com/xdb/9c56595a8e6c||https://vulncheck.com/xdb/9c56595a8e6c , https://vulncheck.com/xdb/d56981175d63||https://vulncheck.com/xdb/d56981175d63 , https://vulncheck.com/xdb/a8d10fec740c||https://vulncheck.com/xdb/a8d10fec740c , https://vulncheck.com/xdb/578064e03f67||https://vulncheck.com/xdb/578064e03f67 | |
CVE-2017-16651 | Roundcube | Roundcube Webmail | 11/03/2021 | 0.30531 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-16651 | https://vulncheck.com/xdb/c1ac9329385f | |||
CVE-2020-8193 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | 11/03/2021 | 0.94349 | 6.5 | https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-attempt , https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-vuln-check||https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-vuln-check | 3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8193 | https://vulncheck.com/xdb/45094a23fa50||https://vulncheck.com/xdb/45094a23fa50 , https://vulncheck.com/xdb/2f0df8b5e020||https://vulncheck.com/xdb/2f0df8b5e020 , https://vulncheck.com/xdb/81d3716d8fc3||https://vulncheck.com/xdb/81d3716d8fc3 , https://vulncheck.com/xdb/cf51c19c0f4e||https://vulncheck.com/xdb/cf51c19c0f4e | |
CVE-2021-31755 | Tenda | AC11 Router | 11/03/2021 | 0.94230 | 9.8 | https://viz.greynoise.io/tag/tenda-ac11-remote-command-execution-attempt||https://viz.greynoise.io/tag/tenda-ac11-remote-command-execution-attempt | 2 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-31755 | ||
CVE-2021-27104 | Accellion | FTA | 11/03/2021 | 0.03542 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27104 | ||||
CVE-2017-0199 | Microsoft | Office and WordPad | 11/03/2021 | 0.94366 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0199 | https://vulncheck.com/xdb/7c99d68f36e5||https://vulncheck.com/xdb/7c99d68f36e5 , https://vulncheck.com/xdb/5b55113c6830||https://vulncheck.com/xdb/5b55113c6830 , https://vulncheck.com/xdb/9ef95e7ea4b5||https://vulncheck.com/xdb/9ef95e7ea4b5 , https://vulncheck.com/xdb/2924f4e487d3||https://vulncheck.com/xdb/2924f4e487d3 , https://vulncheck.com/xdb/532c2574ee56||https://vulncheck.com/xdb/532c2574ee56 , https://vulncheck.com/xdb/6318b2a065f3||https://vulncheck.com/xdb/6318b2a065f3 , https://vulncheck.com/xdb/306bb11d6afe||https://vulncheck.com/xdb/306bb11d6afe , https://vulncheck.com/xdb/ed3b3ae95b69||https://vulncheck.com/xdb/ed3b3ae95b69 , https://vulncheck.com/xdb/0dd660910a33||https://vulncheck.com/xdb/0dd660910a33 , https://vulncheck.com/xdb/970b6cfbc7fb||https://vulncheck.com/xdb/970b6cfbc7fb , https://vulncheck.com/xdb/aacae3861886||https://vulncheck.com/xdb/aacae3861886 , https://vulncheck.com/xdb/945fef08ea28||https://vulncheck.com/xdb/945fef08ea28 | |||
CVE-2017-9822 | DotNetNuke (DNN) | DotNetNuke (DNN) | 11/03/2021 | 0.94348 | 8.8 | https://viz.greynoise.io/tag/dotnetnuke-remote-code-execution-attempt||https://viz.greynoise.io/tag/dotnetnuke-remote-code-execution-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-9822 | https://vulncheck.com/xdb/4b5fa5369011 | ||
CVE-2021-31199 | Microsoft | Enhanced Cryptographic Provider | 11/03/2021 | 0.00462 | 5.2 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31199 | ||||
CVE-2021-30713 | Apple | macOS | 11/03/2021 | 0.00155 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30713 | ||||
CVE-2021-37975 | Chromium V8 | 11/03/2021 | 0.64079 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-37975 | |||||
CVE-2020-10987 | Tenda | AC1900 Router AC15 Model | 11/03/2021 | 0.93271 | 9.8 | https://viz.greynoise.io/tag/tenda-ac15-ac1900-rce-attempt||https://viz.greynoise.io/tag/tenda-ac15-ac1900-rce-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10987 | |||
CVE-2021-37973 | Chromium Portals | 11/03/2021 | 0.15636 | 9.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-37973 | |||||
CVE-2021-1905 | Qualcomm | Multiple Chipsets | 11/03/2021 | 0.01130 | 8.4 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1905 | ||||
CVE-2021-36742 | Trend Micro | Apex One, Apex One as a Service, and Worry-Free Business Security | 11/03/2021 | 0.01032 | 7.8 | FALSE | FALSE | FALSE | https://success.trendmicro.com/dcx/s/solution/000287819?language=en_US, https://success.trendmicro.com/dcx/s/solution/000287820?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-36742 | ||||
CVE-2021-1870 | Apple | iOS, iPadOS, and macOS | 11/03/2021 | 0.00576 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1870 | ||||
CVE-2021-35395 | Realtek | AP-Router SDK | 11/03/2021 | 0.93834 | 9.8 | https://viz.greynoise.io/tag/realtek-jungle-sdk-formwsc-injection-attempt||https://viz.greynoise.io/tag/realtek-jungle-sdk-formwsc-injection-attempt | 2 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-35395 | ||
CVE-2021-21193 | Chromium Blink | 11/03/2021 | 0.12582 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21193 | |||||
CVE-2021-31979 | Microsoft | Windows | 11/03/2021 | 0.01032 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31979 | ||||
CVE-2020-16010 | Chrome for Android UI | 11/03/2021 | 0.22079 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-16010 | |||||
CVE-2021-30665 | Apple | Multiple Products | 11/03/2021 | 0.00562 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30665 | ||||
CVE-2016-9563 | SAP | NetWeaver | 11/03/2021 | 0.41099 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-9563 | ||||
CVE-2021-30554 | Chromium WebGL | 11/03/2021 | 0.24629 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30554 | |||||
CVE-2020-17530 | Apache | Struts | 11/03/2021 | 0.94395 | 9.8 | https://viz.greynoise.io/tag/apache-struts-2-uibean-rce-attempt||https://viz.greynoise.io/tag/apache-struts-2-uibean-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-17530 | https://vulncheck.com/xdb/5fd88116c567||https://vulncheck.com/xdb/5fd88116c567 , https://vulncheck.com/xdb/dbd52a7e6d06||https://vulncheck.com/xdb/dbd52a7e6d06 , https://vulncheck.com/xdb/e3fa2afdc5f2||https://vulncheck.com/xdb/e3fa2afdc5f2 , https://vulncheck.com/xdb/d5f1da1e2721||https://vulncheck.com/xdb/d5f1da1e2721 , https://vulncheck.com/xdb/de8e0e425aa8||https://vulncheck.com/xdb/de8e0e425aa8 , https://vulncheck.com/xdb/20d585ac92c4||https://vulncheck.com/xdb/20d585ac92c4 , https://vulncheck.com/xdb/2413521dca63||https://vulncheck.com/xdb/2413521dca63 , https://vulncheck.com/xdb/20acac973541||https://vulncheck.com/xdb/20acac973541 , https://vulncheck.com/xdb/bfb08d5ee460||https://vulncheck.com/xdb/bfb08d5ee460 , https://vulncheck.com/xdb/e2133615d248||https://vulncheck.com/xdb/e2133615d248 | ||
CVE-2020-0674 | Microsoft | Internet Explorer | 11/03/2021 | 0.93744 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0674 | https://vulncheck.com/xdb/50d2aa2b3f88||https://vulncheck.com/xdb/50d2aa2b3f88 , https://vulncheck.com/xdb/82aed25ddb79||https://vulncheck.com/xdb/82aed25ddb79 , https://vulncheck.com/xdb/e495092c8724||https://vulncheck.com/xdb/e495092c8724 | |||
CVE-2019-11539 | Ivanti | Pulse Connect Secure and Pulse Policy Secure | 11/03/2021 | 0.93897 | 8.0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11539 | https://vulncheck.com/xdb/35b5c0219071 | |||
CVE-2021-28550 | Adobe | Acrobat and Reader | 11/03/2021 | 0.22947 | 9.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-28550 | ||||
CVE-2019-1367 | Microsoft | Internet Explorer | 11/03/2021 | 0.87865 | 7.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1367 | ||||
CVE-2021-28310 | Microsoft | Win32k | 11/03/2021 | 0.30565 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-28310 | ||||
CVE-2021-1497 | Cisco | HyperFlex HX | 11/03/2021 | 0.94402 | 9.8 | https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt , https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1497 | ||
CVE-2021-27059 | Microsoft | Office | 11/03/2021 | 0.01615 | 7.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27059 | ||||
CVE-2019-5591 | Fortinet | FortiOS | 11/03/2021 | 0.02431 | 6.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-5591 | ||||
CVE-2021-27562 | Arm | Trusted Firmware | 11/03/2021 | 0.69888 | 5.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27562 | ||||
CVE-2018-0798 | Microsoft | Office | 11/03/2021 | 0.94180 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0798 | ||||
CVE-2018-11776 | Apache | Struts | 11/03/2021 | 0.94427 | 8.1 | https://viz.greynoise.io/tag/apache-struts-cve-2018-11776-worm-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2018-11776-worm-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-11776 | https://vulncheck.com/xdb/3c27e7312b41||https://vulncheck.com/xdb/3c27e7312b41 , https://vulncheck.com/xdb/3dd317159905||https://vulncheck.com/xdb/3dd317159905 , https://vulncheck.com/xdb/e1d36328bfd4||https://vulncheck.com/xdb/e1d36328bfd4 , https://vulncheck.com/xdb/df6d7ff7d1ec||https://vulncheck.com/xdb/df6d7ff7d1ec , https://vulncheck.com/xdb/80e42f4cab6b||https://vulncheck.com/xdb/80e42f4cab6b , https://vulncheck.com/xdb/7380914b3f92||https://vulncheck.com/xdb/7380914b3f92 , https://vulncheck.com/xdb/9047aecb9a46||https://vulncheck.com/xdb/9047aecb9a46 , https://vulncheck.com/xdb/306db2bfde48||https://vulncheck.com/xdb/306db2bfde48 , https://vulncheck.com/xdb/b26aba013508||https://vulncheck.com/xdb/b26aba013508 , https://vulncheck.com/xdb/8b73fc205202||https://vulncheck.com/xdb/8b73fc205202 , https://vulncheck.com/xdb/1d30c749488d||https://vulncheck.com/xdb/1d30c749488d , https://vulncheck.com/xdb/4ab6e9a43949||https://vulncheck.com/xdb/4ab6e9a43949 , https://vulncheck.com/xdb/db2bd9c38413||https://vulncheck.com/xdb/db2bd9c38413 , https://vulncheck.com/xdb/515a9f223269||https://vulncheck.com/xdb/515a9f223269 | ||
CVE-2016-7255 | Microsoft | Win32k | 11/03/2021 | 0.89359 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-7255 | https://vulncheck.com/xdb/1dd5ad8d8734||https://vulncheck.com/xdb/1dd5ad8d8734 , https://vulncheck.com/xdb/1e9766c4be72||https://vulncheck.com/xdb/1e9766c4be72 , https://vulncheck.com/xdb/b365d8ec807c||https://vulncheck.com/xdb/b365d8ec807c , https://vulncheck.com/xdb/f21c23b2b8d5||https://vulncheck.com/xdb/f21c23b2b8d5 , https://vulncheck.com/xdb/ab696903a116||https://vulncheck.com/xdb/ab696903a116 | |||
CVE-2021-21017 | Adobe | Acrobat and Reader | 11/03/2021 | 0.90595 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21017 | https://vulncheck.com/xdb/457522b96e6d | |||
CVE-2020-24557 | Trend Micro | Apex One, OfficeScan, and Worry-Free Business Security | 11/03/2021 | 0.01017 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-24557 | ||||
CVE-2021-21224 | Chromium V8 | 11/03/2021 | 0.66739 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21224 | https://vulncheck.com/xdb/7eba2235c681 | ||||
CVE-2021-20021 | SonicWall | SonicWall Email Security | 11/03/2021 | 0.84950 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20021 | ||||
CVE-2021-31207 | Microsoft | Exchange Server | 11/03/2021 | 0.93967 | 6.6 | https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31207 | https://vulncheck.com/xdb/07bd4d555cdf||https://vulncheck.com/xdb/07bd4d555cdf , https://vulncheck.com/xdb/a3fe043e08b0||https://vulncheck.com/xdb/a3fe043e08b0 , https://vulncheck.com/xdb/1d7dc126a5ac||https://vulncheck.com/xdb/1d7dc126a5ac , https://vulncheck.com/xdb/ab905d9d8707||https://vulncheck.com/xdb/ab905d9d8707 , https://vulncheck.com/xdb/8b4ff5e8b18a||https://vulncheck.com/xdb/8b4ff5e8b18a , https://vulncheck.com/xdb/4741f2b07316||https://vulncheck.com/xdb/4741f2b07316 | ||
CVE-2021-40444 | Microsoft | MSHTML | 11/03/2021 | 0.94291 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40444 | https://vulncheck.com/xdb/7e430bace93f||https://vulncheck.com/xdb/7e430bace93f , https://vulncheck.com/xdb/19c332e12d63||https://vulncheck.com/xdb/19c332e12d63 , https://vulncheck.com/xdb/d20aa5c71d42||https://vulncheck.com/xdb/d20aa5c71d42 , https://vulncheck.com/xdb/12be0ac785f6||https://vulncheck.com/xdb/12be0ac785f6 , https://vulncheck.com/xdb/8772ca6900ac||https://vulncheck.com/xdb/8772ca6900ac , https://vulncheck.com/xdb/b0dcf99bb489||https://vulncheck.com/xdb/b0dcf99bb489 , https://vulncheck.com/xdb/df7c894fd424||https://vulncheck.com/xdb/df7c894fd424 , https://vulncheck.com/xdb/7aaf744b4107||https://vulncheck.com/xdb/7aaf744b4107 , https://vulncheck.com/xdb/0314f5542800||https://vulncheck.com/xdb/0314f5542800 , https://vulncheck.com/xdb/0a14a2a0a7d0||https://vulncheck.com/xdb/0a14a2a0a7d0 , https://vulncheck.com/xdb/7ab0ea4d6122||https://vulncheck.com/xdb/7ab0ea4d6122 , https://vulncheck.com/xdb/8898a986e5b4||https://vulncheck.com/xdb/8898a986e5b4 , https://vulncheck.com/xdb/4d7cd714a253||https://vulncheck.com/xdb/4d7cd714a253 , https://vulncheck.com/xdb/8bc0a3fef89c||https://vulncheck.com/xdb/8bc0a3fef89c , https://vulncheck.com/xdb/488dd6b83a3a||https://vulncheck.com/xdb/488dd6b83a3a , https://vulncheck.com/xdb/834486323132||https://vulncheck.com/xdb/834486323132 , https://vulncheck.com/xdb/f40045a34384||https://vulncheck.com/xdb/f40045a34384 , https://vulncheck.com/xdb/82c5f73256d8||https://vulncheck.com/xdb/82c5f73256d8 , https://vulncheck.com/xdb/d5396d15ae8b||https://vulncheck.com/xdb/d5396d15ae8b , https://vulncheck.com/xdb/2b08563b64ee||https://vulncheck.com/xdb/2b08563b64ee | |||
CVE-2020-1054 | Microsoft | Win32k | 11/03/2021 | 0.80387 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1054 | https://vulncheck.com/xdb/4489682b75c5||https://vulncheck.com/xdb/4489682b75c5 , https://vulncheck.com/xdb/12c12764e783||https://vulncheck.com/xdb/12c12764e783 , https://vulncheck.com/xdb/515b78d81889||https://vulncheck.com/xdb/515b78d81889 , https://vulncheck.com/xdb/c99b688a26fb||https://vulncheck.com/xdb/c99b688a26fb , https://vulncheck.com/xdb/665dc3f05a7d||https://vulncheck.com/xdb/665dc3f05a7d | |||
CVE-2021-37976 | Chromium | 11/03/2021 | 0.11445 | 6.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-37976 | |||||
CVE-2018-4939 | Adobe | ColdFusion | 11/03/2021 | 0.85528 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-4939 | ||||
CVE-2021-36741 | Trend Micro | Apex One, Apex One as a Service, and Worry-Free Business Security | 11/03/2021 | 0.00941 | 8.8 | FALSE | FALSE | FALSE | https://success.trendmicro.com/dcx/s/solution/000287819?language=en_US, https://success.trendmicro.com/dcx/s/solution/000287820?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-36741 | ||||
CVE-2020-11738 | WordPress | Snap Creek Duplicator Plugin | 11/03/2021 | 0.94304 | 7.5 | https://viz.greynoise.io/tag/wordpress-duplicator-plugin-directory-traversal-attempt||https://viz.greynoise.io/tag/wordpress-duplicator-plugin-directory-traversal-attempt | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11738 | https://vulncheck.com/xdb/af1b7e9376f3 | |
CVE-2021-33742 | Microsoft | Windows | 11/03/2021 | 0.57248 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-33742 | ||||
CVE-2019-9082 | ThinkPHP | ThinkPHP | 11/03/2021 | 0.94149 | 8.8 | https://viz.greynoise.io/tag/thinkphp-code-execution-attempt||https://viz.greynoise.io/tag/thinkphp-code-execution-attempt , https://viz.greynoise.io/tag/thinkphp-hydra-php-webshell-upload-attempt||https://viz.greynoise.io/tag/thinkphp-hydra-php-webshell-upload-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-9082 | ||
CVE-2021-33739 | Microsoft | Windows | 11/03/2021 | 0.12897 | 8.4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-33739 | https://vulncheck.com/xdb/afe35658a490||https://vulncheck.com/xdb/afe35658a490 , https://vulncheck.com/xdb/31ac107a9305||https://vulncheck.com/xdb/31ac107a9305 | |||
CVE-2018-15811 | DotNetNuke (DNN) | DotNetNuke (DNN) | 11/03/2021 | 0.76118 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-15811 | ||||
CVE-2021-26857 | Microsoft | Exchange Server | 11/03/2021 | 0.06988 | 7.8 | TRUE | TRUE | FALSE | Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26857 | https://vulncheck.com/xdb/44004c1ba2b3 | |||
CVE-2019-19356 | Netis | WF2419 Devices | 11/03/2021 | 0.88896 | 7.5 | https://viz.greynoise.io/tag/netis-wf2419-rce-attempt||https://viz.greynoise.io/tag/netis-wf2419-rce-attempt | 0 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2019-19356 | https://vulncheck.com/xdb/c0731b8ba0cb | |
CVE-2021-21206 | Chromium Blink | 11/03/2021 | 0.22657 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21206 | |||||
CVE-2019-4716 | IBM | Planning Analytics | 11/03/2021 | 0.76966 | 10.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-4716 | ||||
CVE-2019-2215 | Android | Android Kernel | 11/03/2021 | 0.43886 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-2215 | https://vulncheck.com/xdb/94306aabca16||https://vulncheck.com/xdb/94306aabca16 , https://vulncheck.com/xdb/604294a627ba||https://vulncheck.com/xdb/604294a627ba , https://vulncheck.com/xdb/d23821631cf3||https://vulncheck.com/xdb/d23821631cf3 , https://vulncheck.com/xdb/7c2171bd00f8||https://vulncheck.com/xdb/7c2171bd00f8 , https://vulncheck.com/xdb/5a63ca2255f9||https://vulncheck.com/xdb/5a63ca2255f9 , https://vulncheck.com/xdb/7a600a9b57a1||https://vulncheck.com/xdb/7a600a9b57a1 , https://vulncheck.com/xdb/7c94a8838bcd||https://vulncheck.com/xdb/7c94a8838bcd , https://vulncheck.com/xdb/efc0233357b1||https://vulncheck.com/xdb/efc0233357b1 , https://vulncheck.com/xdb/958e996c14b3||https://vulncheck.com/xdb/958e996c14b3 , https://vulncheck.com/xdb/f0574fcd7f48||https://vulncheck.com/xdb/f0574fcd7f48 , https://vulncheck.com/xdb/570fb66ac36f||https://vulncheck.com/xdb/570fb66ac36f , https://vulncheck.com/xdb/703d7ebd8c6a||https://vulncheck.com/xdb/703d7ebd8c6a , https://vulncheck.com/xdb/bb9d6564de2b||https://vulncheck.com/xdb/bb9d6564de2b , https://vulncheck.com/xdb/48c20484fa71||https://vulncheck.com/xdb/48c20484fa71 , https://vulncheck.com/xdb/382de53322b0||https://vulncheck.com/xdb/382de53322b0 , https://vulncheck.com/xdb/2efb36bee06f||https://vulncheck.com/xdb/2efb36bee06f , https://vulncheck.com/xdb/034793af86bc||https://vulncheck.com/xdb/034793af86bc , https://vulncheck.com/xdb/af8a91dc7ae5||https://vulncheck.com/xdb/af8a91dc7ae5 , https://vulncheck.com/xdb/de8c2754f71a||https://vulncheck.com/xdb/de8c2754f71a , https://vulncheck.com/xdb/30246787d03d||https://vulncheck.com/xdb/30246787d03d , https://vulncheck.com/xdb/b769e46ca29c||https://vulncheck.com/xdb/b769e46ca29c , https://vulncheck.com/xdb/8042323a8edc||https://vulncheck.com/xdb/8042323a8edc | |||
CVE-2020-25506 | D-Link | DNS-320 Device | 11/03/2021 | 0.93863 | 9.8 | https://viz.greynoise.io/tag/d-link-dns-320-rce-attempt||https://viz.greynoise.io/tag/d-link-dns-320-rce-attempt | 3 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-25506 | ||
CVE-2020-0938 | Microsoft | Windows | 11/03/2021 | 0.87450 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0938 | ||||
CVE-2019-16256 | SIMalliance | Toolbox Browser | 11/03/2021 | 0.42681 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-16256 | ||||
CVE-2021-1871 | Apple | iOS, iPadOS, and macOS | 11/03/2021 | 0.00997 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1871 | ||||
CVE-2019-1215 | Microsoft | Windows | 11/03/2021 | 0.02688 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1215 | https://vulncheck.com/xdb/6bee59f3f26d||https://vulncheck.com/xdb/6bee59f3f26d , https://vulncheck.com/xdb/31037adc71bc||https://vulncheck.com/xdb/31037adc71bc | |||
CVE-2019-0604 | Microsoft | SharePoint | 11/03/2021 | 0.94392 | 9.8 | https://viz.greynoise.io/tag/sharepoint-rce-attempt||https://viz.greynoise.io/tag/sharepoint-rce-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0604 | https://vulncheck.com/xdb/cca6def6980c||https://vulncheck.com/xdb/cca6def6980c , https://vulncheck.com/xdb/b321302986c1||https://vulncheck.com/xdb/b321302986c1 | ||
CVE-2020-10199 | Sonatype | Nexus Repository | 11/03/2021 | 0.94379 | 8.8 | https://viz.greynoise.io/tag/nexus-repository-manager-cve-2020-10199-rce-attempt||https://viz.greynoise.io/tag/nexus-repository-manager-cve-2020-10199-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10199 | https://vulncheck.com/xdb/ae19d3a890a2||https://vulncheck.com/xdb/ae19d3a890a2 , https://vulncheck.com/xdb/8f1e150efe66||https://vulncheck.com/xdb/8f1e150efe66 , https://vulncheck.com/xdb/9976ab7ad418||https://vulncheck.com/xdb/9976ab7ad418 , https://vulncheck.com/xdb/048585ad5357||https://vulncheck.com/xdb/048585ad5357 , https://vulncheck.com/xdb/7f2c12104507||https://vulncheck.com/xdb/7f2c12104507 , https://vulncheck.com/xdb/0f9f7c06a94a||https://vulncheck.com/xdb/0f9f7c06a94a | |
CVE-2019-17558 | Apache | Solr | 11/03/2021 | 0.94474 | 7.5 | https://viz.greynoise.io/tag/apache-solr-rce-attempt||https://viz.greynoise.io/tag/apache-solr-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-17558 | https://vulncheck.com/xdb/6918ed306441||https://vulncheck.com/xdb/6918ed306441 , https://vulncheck.com/xdb/7bb322405f10||https://vulncheck.com/xdb/7bb322405f10 | ||
CVE-2019-1214 | Microsoft | Windows | 11/03/2021 | 0.11690 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1214 | ||||
CVE-2021-22986 | F5 | BIG-IP and BIG-IQ Centralized Management | 11/03/2021 | 0.94485 | 9.8 | https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-cve-2021-22986||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-cve-2021-22986 | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22986 | https://vulncheck.com/xdb/7ef17b2a67c8||https://vulncheck.com/xdb/7ef17b2a67c8 , https://vulncheck.com/xdb/f21108c1266d||https://vulncheck.com/xdb/f21108c1266d , https://vulncheck.com/xdb/d01e8176dce5||https://vulncheck.com/xdb/d01e8176dce5 , https://vulncheck.com/xdb/67d59972edde||https://vulncheck.com/xdb/67d59972edde , https://vulncheck.com/xdb/320fae5d1635||https://vulncheck.com/xdb/320fae5d1635 , https://vulncheck.com/xdb/37d1bc32376a||https://vulncheck.com/xdb/37d1bc32376a , https://vulncheck.com/xdb/c553095b1410||https://vulncheck.com/xdb/c553095b1410 , https://vulncheck.com/xdb/022bf13f255c||https://vulncheck.com/xdb/022bf13f255c , https://vulncheck.com/xdb/d719e86bdadb||https://vulncheck.com/xdb/d719e86bdadb , https://vulncheck.com/xdb/9ee47c54b7bd||https://vulncheck.com/xdb/9ee47c54b7bd , https://vulncheck.com/xdb/c08513ca427b||https://vulncheck.com/xdb/c08513ca427b | |
CVE-2019-0541 | Microsoft | MSHTML | 11/03/2021 | 0.84144 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0541 | ||||
CVE-2020-7961 | Liferay | Liferay Portal | 11/03/2021 | 0.94412 | 9.8 | https://viz.greynoise.io/tag/liferay-portal-rce-attempt||https://viz.greynoise.io/tag/liferay-portal-rce-attempt , https://viz.greynoise.io/tag/liferay-rce-vuln-check||https://viz.greynoise.io/tag/liferay-rce-vuln-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-7961 | https://vulncheck.com/xdb/7a60b00ba043||https://vulncheck.com/xdb/7a60b00ba043 , https://vulncheck.com/xdb/132215df805c||https://vulncheck.com/xdb/132215df805c , https://vulncheck.com/xdb/d888e243ebd9||https://vulncheck.com/xdb/d888e243ebd9 , https://vulncheck.com/xdb/6e87149cbdcd||https://vulncheck.com/xdb/6e87149cbdcd , https://vulncheck.com/xdb/beb61a49daa0||https://vulncheck.com/xdb/beb61a49daa0 , https://vulncheck.com/xdb/5fbe8f7dc4b1||https://vulncheck.com/xdb/5fbe8f7dc4b1 , https://vulncheck.com/xdb/76603fe1d8bb||https://vulncheck.com/xdb/76603fe1d8bb | ||
CVE-2019-0859 | Microsoft | Win32k | 11/03/2021 | 0.10172 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0859 | https://vulncheck.com/xdb/58f716d55f23 | |||
CVE-2020-17496 | vBulletin | vBulletin | 11/03/2021 | 0.94222 | 9.8 | https://viz.greynoise.io/tag/vbulletin-remote-command-execution-attempt||https://viz.greynoise.io/tag/vbulletin-remote-command-execution-attempt | 5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-17496 | https://vulncheck.com/xdb/a0ff1cf08dad | |
CVE-2019-0211 | Apache | HTTP Server | 11/03/2021 | 0.88533 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0211 | https://vulncheck.com/xdb/a8a29009807a||https://vulncheck.com/xdb/a8a29009807a , https://vulncheck.com/xdb/dc948a8b0165||https://vulncheck.com/xdb/dc948a8b0165 | |||
CVE-2021-21972 | VMware | vCenter Server | 11/03/2021 | 0.93738 | 9.8 | https://viz.greynoise.io/tag/vmware-vcenter-rce-vuln-check||https://viz.greynoise.io/tag/vmware-vcenter-rce-vuln-check , https://viz.greynoise.io/tag/vmware-vcenter-rce-attempt||https://viz.greynoise.io/tag/vmware-vcenter-rce-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21972 | https://vulncheck.com/xdb/a59690df9cb5||https://vulncheck.com/xdb/a59690df9cb5 , https://vulncheck.com/xdb/a94c832dd944||https://vulncheck.com/xdb/a94c832dd944 , https://vulncheck.com/xdb/6b4434a13dfe||https://vulncheck.com/xdb/6b4434a13dfe , https://vulncheck.com/xdb/b31ce24a2fd8||https://vulncheck.com/xdb/b31ce24a2fd8 , https://vulncheck.com/xdb/dc0b46e20f6f||https://vulncheck.com/xdb/dc0b46e20f6f , https://vulncheck.com/xdb/a7861044684b||https://vulncheck.com/xdb/a7861044684b , https://vulncheck.com/xdb/88eb7edb230d||https://vulncheck.com/xdb/88eb7edb230d , https://vulncheck.com/xdb/631d9af3bfb8||https://vulncheck.com/xdb/631d9af3bfb8 , https://vulncheck.com/xdb/024d4588b4c7||https://vulncheck.com/xdb/024d4588b4c7 , https://vulncheck.com/xdb/e4f7d23fc6bc||https://vulncheck.com/xdb/e4f7d23fc6bc , https://vulncheck.com/xdb/4cd8ec4552ae||https://vulncheck.com/xdb/4cd8ec4552ae , https://vulncheck.com/xdb/e3cd0f2b9c4a||https://vulncheck.com/xdb/e3cd0f2b9c4a , https://vulncheck.com/xdb/bef16d85cf6b||https://vulncheck.com/xdb/bef16d85cf6b , https://vulncheck.com/xdb/faddcda29d3c||https://vulncheck.com/xdb/faddcda29d3c , https://vulncheck.com/xdb/f5085330e7bc||https://vulncheck.com/xdb/f5085330e7bc , https://vulncheck.com/xdb/f10f8971b996||https://vulncheck.com/xdb/f10f8971b996 , https://vulncheck.com/xdb/bf096845ad35||https://vulncheck.com/xdb/bf096845ad35 , https://vulncheck.com/xdb/0881bb35ce65||https://vulncheck.com/xdb/0881bb35ce65 , https://vulncheck.com/xdb/e5087c9a9442||https://vulncheck.com/xdb/e5087c9a9442 , https://vulncheck.com/xdb/2d286a01e9d1||https://vulncheck.com/xdb/2d286a01e9d1 , https://vulncheck.com/xdb/fd2fcce15234||https://vulncheck.com/xdb/fd2fcce15234 , https://vulncheck.com/xdb/4dc77b48cf47||https://vulncheck.com/xdb/4dc77b48cf47 , https://vulncheck.com/xdb/93708da6b80f||https://vulncheck.com/xdb/93708da6b80f , https://vulncheck.com/xdb/51d9db6c8498||https://vulncheck.com/xdb/51d9db6c8498 , https://vulncheck.com/xdb/087036e51a0a||https://vulncheck.com/xdb/087036e51a0a | |
CVE-2020-29557 | D-Link | DIR-825 R1 Devices | 11/03/2021 | 0.91694 | 9.8 | https://viz.greynoise.io/tag/d-link-dir-825-r1-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-825-r1-rce-attempt | 0 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-29557 | ||
CVE-2021-21220 | Chromium V8 | 11/03/2021 | 0.92805 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21220 | |||||
CVE-2020-16013 | Chromium V8 | 11/03/2021 | 0.24031 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-16013 | |||||
CVE-2020-15999 | Chrome FreeType | 11/03/2021 | 0.92732 | 9.6 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-15999 | https://vulncheck.com/xdb/8566ea6250e8 | ||||
CVE-2020-12812 | Fortinet | FortiOS | 11/03/2021 | 0.49477 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-12812 | ||||
CVE-2019-18187 | Trend Micro | OfficeScan | 11/03/2021 | 0.71916 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-18187 | ||||
CVE-2020-4006 | VMware | Multiple Products | 11/03/2021 | 0.15441 | 9.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-4006 | ||||
CVE-2019-1653 | Cisco | Small Business RV320 and RV325 Routers | 11/03/2021 | 0.94357 | 7.5 | https://viz.greynoise.io/tag/cisco-rv320-325-info-disclosure-attempt||https://viz.greynoise.io/tag/cisco-rv320-325-info-disclosure-attempt | 35 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1653 | https://vulncheck.com/xdb/73ff38b98985||https://vulncheck.com/xdb/73ff38b98985 , https://vulncheck.com/xdb/7386ddbc6f1b||https://vulncheck.com/xdb/7386ddbc6f1b , https://vulncheck.com/xdb/c2e452190c82||https://vulncheck.com/xdb/c2e452190c82 , https://vulncheck.com/xdb/a874920087d4||https://vulncheck.com/xdb/a874920087d4 , https://vulncheck.com/xdb/246f2bd3fff7||https://vulncheck.com/xdb/246f2bd3fff7 | |
CVE-2021-1732 | Microsoft | Win32k | 11/03/2021 | 0.90515 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1732 | https://vulncheck.com/xdb/56a692bca459||https://vulncheck.com/xdb/56a692bca459 , https://vulncheck.com/xdb/ad30ecfc7a8d||https://vulncheck.com/xdb/ad30ecfc7a8d , https://vulncheck.com/xdb/24031c7c7e8e||https://vulncheck.com/xdb/24031c7c7e8e , https://vulncheck.com/xdb/d37c0a9bd997||https://vulncheck.com/xdb/d37c0a9bd997 , https://vulncheck.com/xdb/61d86c73450a||https://vulncheck.com/xdb/61d86c73450a , https://vulncheck.com/xdb/bd64b5ebe182||https://vulncheck.com/xdb/bd64b5ebe182 , https://vulncheck.com/xdb/aa79b6239935||https://vulncheck.com/xdb/aa79b6239935 , https://vulncheck.com/xdb/f72c131deebb||https://vulncheck.com/xdb/f72c131deebb , https://vulncheck.com/xdb/09740e97aa0d||https://vulncheck.com/xdb/09740e97aa0d , https://vulncheck.com/xdb/de8ed17d1f87||https://vulncheck.com/xdb/de8ed17d1f87 , https://vulncheck.com/xdb/18e0b48f69bd||https://vulncheck.com/xdb/18e0b48f69bd | |||
CVE-2019-1429 | Microsoft | Internet Explorer | 11/03/2021 | 0.83137 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-1429 | ||||
CVE-2020-16846 | SaltStack | Salt | 11/03/2021 | 0.94387 | 9.8 | https://viz.greynoise.io/tag/saltstack-ssh-rce-attempt||https://viz.greynoise.io/tag/saltstack-ssh-rce-attempt | 7 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-16846 | ||
CVE-2019-11634 | Citrix | Workspace Application and Receiver for Windows | 11/03/2021 | 0.59561 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11634 | ||||
CVE-2020-6207 | SAP | Solution Manager | 11/03/2021 | 0.94274 | 10.0 | https://viz.greynoise.io/tag/sap-solution-manager-rce-attempt||https://viz.greynoise.io/tag/sap-solution-manager-rce-attempt , https://viz.greynoise.io/tag/eem-admin-service-remote-command-execution-attempt||https://viz.greynoise.io/tag/eem-admin-service-remote-command-execution-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6207 | https://vulncheck.com/xdb/453413941eab | ||
CVE-2019-0708 | Microsoft | Remote Desktop Services | 11/03/2021 | 0.94445 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0708 | https://vulncheck.com/xdb/0543fd1784c2||https://vulncheck.com/xdb/0543fd1784c2 , https://vulncheck.com/xdb/9b644acc642d||https://vulncheck.com/xdb/9b644acc642d , https://vulncheck.com/xdb/87091cafec0a||https://vulncheck.com/xdb/87091cafec0a , https://vulncheck.com/xdb/d18cbf862a1b||https://vulncheck.com/xdb/d18cbf862a1b , https://vulncheck.com/xdb/a34013074716||https://vulncheck.com/xdb/a34013074716 , https://vulncheck.com/xdb/bf63479c559b||https://vulncheck.com/xdb/bf63479c559b , https://vulncheck.com/xdb/fd998d08aecc||https://vulncheck.com/xdb/fd998d08aecc , https://vulncheck.com/xdb/1959a82c2e55||https://vulncheck.com/xdb/1959a82c2e55 , https://vulncheck.com/xdb/4447344e0e57||https://vulncheck.com/xdb/4447344e0e57 , https://vulncheck.com/xdb/8b5d56b910c5||https://vulncheck.com/xdb/8b5d56b910c5 , https://vulncheck.com/xdb/b78833c5a34c||https://vulncheck.com/xdb/b78833c5a34c , https://vulncheck.com/xdb/f0d631a0e09b||https://vulncheck.com/xdb/f0d631a0e09b , https://vulncheck.com/xdb/54ea167ea153||https://vulncheck.com/xdb/54ea167ea153 , https://vulncheck.com/xdb/681cd783600b||https://vulncheck.com/xdb/681cd783600b , https://vulncheck.com/xdb/d7b3d9b80819||https://vulncheck.com/xdb/d7b3d9b80819 , https://vulncheck.com/xdb/5c1169f4925c||https://vulncheck.com/xdb/5c1169f4925c , https://vulncheck.com/xdb/83dd1b8c1868||https://vulncheck.com/xdb/83dd1b8c1868 , https://vulncheck.com/xdb/387c8e6971fe||https://vulncheck.com/xdb/387c8e6971fe , https://vulncheck.com/xdb/11d36b021267||https://vulncheck.com/xdb/11d36b021267 , https://vulncheck.com/xdb/ab5a3e05eeeb||https://vulncheck.com/xdb/ab5a3e05eeeb , https://vulncheck.com/xdb/212d4dc490b0||https://vulncheck.com/xdb/212d4dc490b0 , https://vulncheck.com/xdb/3003205270ed||https://vulncheck.com/xdb/3003205270ed , https://vulncheck.com/xdb/bb428db8e94d||https://vulncheck.com/xdb/bb428db8e94d , https://vulncheck.com/xdb/2426c24787e9||https://vulncheck.com/xdb/2426c24787e9 , https://vulncheck.com/xdb/c9d000a1a180||https://vulncheck.com/xdb/c9d000a1a180 , https://vulncheck.com/xdb/0a6b5b0cbd12||https://vulncheck.com/xdb/0a6b5b0cbd12 , https://vulncheck.com/xdb/e72fa18ddcc7||https://vulncheck.com/xdb/e72fa18ddcc7 , https://vulncheck.com/xdb/9d68385aa1c1||https://vulncheck.com/xdb/9d68385aa1c1 , https://vulncheck.com/xdb/d607d811c122||https://vulncheck.com/xdb/d607d811c122 , https://vulncheck.com/xdb/9a50cc3bc409||https://vulncheck.com/xdb/9a50cc3bc409 , https://vulncheck.com/xdb/17163e8dffc6||https://vulncheck.com/xdb/17163e8dffc6 , https://vulncheck.com/xdb/92597113b854||https://vulncheck.com/xdb/92597113b854 , https://vulncheck.com/xdb/3785316d7fc5||https://vulncheck.com/xdb/3785316d7fc5 , https://vulncheck.com/xdb/7536b79e5849||https://vulncheck.com/xdb/7536b79e5849 , https://vulncheck.com/xdb/9565e85eb46c||https://vulncheck.com/xdb/9565e85eb46c , https://vulncheck.com/xdb/2116a08dcafd||https://vulncheck.com/xdb/2116a08dcafd , https://vulncheck.com/xdb/d0813d668813||https://vulncheck.com/xdb/d0813d668813 , https://vulncheck.com/xdb/495f5c9a61a0||https://vulncheck.com/xdb/495f5c9a61a0 , https://vulncheck.com/xdb/92468824377e||https://vulncheck.com/xdb/92468824377e , https://vulncheck.com/xdb/181fc435a9f1||https://vulncheck.com/xdb/181fc435a9f1 , https://vulncheck.com/xdb/1bd6e3d7edf2||https://vulncheck.com/xdb/1bd6e3d7edf2 , https://vulncheck.com/xdb/f783965878ba||https://vulncheck.com/xdb/f783965878ba , https://vulncheck.com/xdb/c67a96a54a2f||https://vulncheck.com/xdb/c67a96a54a2f , https://vulncheck.com/xdb/3a02e0152437||https://vulncheck.com/xdb/3a02e0152437 , https://vulncheck.com/xdb/fee7134123f4||https://vulncheck.com/xdb/fee7134123f4 , https://vulncheck.com/xdb/48acdd34a61b||https://vulncheck.com/xdb/48acdd34a61b , https://vulncheck.com/xdb/9523c9b3ece9||https://vulncheck.com/xdb/9523c9b3ece9 , https://vulncheck.com/xdb/b63c341a0817||https://vulncheck.com/xdb/b63c341a0817 , https://vulncheck.com/xdb/b0cd57c5988d||https://vulncheck.com/xdb/b0cd57c5988d | |||
CVE-2021-26855 | Microsoft | Exchange Server | 11/03/2021 | 0.94366 | 9.1 | https://viz.greynoise.io/tag/proxylogon-ssrf-attempt||https://viz.greynoise.io/tag/proxylogon-ssrf-attempt , https://viz.greynoise.io/tag/proxylogon-ssrf-vuln-check||https://viz.greynoise.io/tag/proxylogon-ssrf-vuln-check | 9 | TRUE | TRUE | FALSE | Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26855 | https://vulncheck.com/xdb/a15ecee3c689||https://vulncheck.com/xdb/a15ecee3c689 , https://vulncheck.com/xdb/83c67e8456f8||https://vulncheck.com/xdb/83c67e8456f8 , https://vulncheck.com/xdb/e988e4b21a5a||https://vulncheck.com/xdb/e988e4b21a5a , https://vulncheck.com/xdb/f0b67c3b0dba||https://vulncheck.com/xdb/f0b67c3b0dba , https://vulncheck.com/xdb/a369a563695a||https://vulncheck.com/xdb/a369a563695a , https://vulncheck.com/xdb/f64e212b9bb9||https://vulncheck.com/xdb/f64e212b9bb9 , https://vulncheck.com/xdb/f4e64f41f675||https://vulncheck.com/xdb/f4e64f41f675 , https://vulncheck.com/xdb/0c24aac0812f||https://vulncheck.com/xdb/0c24aac0812f , https://vulncheck.com/xdb/db86afdc28ec||https://vulncheck.com/xdb/db86afdc28ec , https://vulncheck.com/xdb/e2f6662dc7fa||https://vulncheck.com/xdb/e2f6662dc7fa , https://vulncheck.com/xdb/84f6d976cfa8||https://vulncheck.com/xdb/84f6d976cfa8 , https://vulncheck.com/xdb/41560d8dfafa||https://vulncheck.com/xdb/41560d8dfafa , https://vulncheck.com/xdb/6285ee0370ae||https://vulncheck.com/xdb/6285ee0370ae , https://vulncheck.com/xdb/f1d2fcb25c52||https://vulncheck.com/xdb/f1d2fcb25c52 , https://vulncheck.com/xdb/5a8c766c84ab||https://vulncheck.com/xdb/5a8c766c84ab , https://vulncheck.com/xdb/d311705d5c0f||https://vulncheck.com/xdb/d311705d5c0f , https://vulncheck.com/xdb/28a1acb64734||https://vulncheck.com/xdb/28a1acb64734 , https://vulncheck.com/xdb/94ed869bb771||https://vulncheck.com/xdb/94ed869bb771 , https://vulncheck.com/xdb/2a12da6c6076||https://vulncheck.com/xdb/2a12da6c6076 , https://vulncheck.com/xdb/5c885ac1f498||https://vulncheck.com/xdb/5c885ac1f498 , https://vulncheck.com/xdb/c3f6061e329d||https://vulncheck.com/xdb/c3f6061e329d , https://vulncheck.com/xdb/a0bdc897dbad||https://vulncheck.com/xdb/a0bdc897dbad , https://vulncheck.com/xdb/ee22e208e22e||https://vulncheck.com/xdb/ee22e208e22e , https://vulncheck.com/xdb/8f164084f63f||https://vulncheck.com/xdb/8f164084f63f , https://vulncheck.com/xdb/b21c4b028688||https://vulncheck.com/xdb/b21c4b028688 , https://vulncheck.com/xdb/67248d70edfc||https://vulncheck.com/xdb/67248d70edfc , https://vulncheck.com/xdb/2786587022bf||https://vulncheck.com/xdb/2786587022bf , https://vulncheck.com/xdb/05d9d20036f6||https://vulncheck.com/xdb/05d9d20036f6 , https://vulncheck.com/xdb/d5ace7521e90||https://vulncheck.com/xdb/d5ace7521e90 , https://vulncheck.com/xdb/2036c9063358||https://vulncheck.com/xdb/2036c9063358 , https://vulncheck.com/xdb/2e432cbc1287||https://vulncheck.com/xdb/2e432cbc1287 | |
CVE-2019-0803 | Microsoft | Win32k | 11/03/2021 | 0.84886 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0803 | https://vulncheck.com/xdb/0550a8f285e6||https://vulncheck.com/xdb/0550a8f285e6 , https://vulncheck.com/xdb/c4e15259ee73||https://vulncheck.com/xdb/c4e15259ee73 | |||
CVE-2021-38645 | Microsoft | Open Management Infrastructure (OMI) | 11/03/2021 | 0.31031 | 7.8 | https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38645 | |||
CVE-2020-9859 | Apple | Multiple Products | 11/03/2021 | 0.00295 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-9859 | ||||
CVE-2021-38647 | Microsoft | Open Management Infrastructure (OMI) | 11/03/2021 | 0.94342 | 9.8 | https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38647 | https://vulncheck.com/xdb/6c71255f0196||https://vulncheck.com/xdb/6c71255f0196 , https://vulncheck.com/xdb/3a2d344c375c||https://vulncheck.com/xdb/3a2d344c375c , https://vulncheck.com/xdb/cb8f32e2832e||https://vulncheck.com/xdb/cb8f32e2832e , https://vulncheck.com/xdb/c836b5cab9c2||https://vulncheck.com/xdb/c836b5cab9c2 , https://vulncheck.com/xdb/e624aab49a0d||https://vulncheck.com/xdb/e624aab49a0d , https://vulncheck.com/xdb/291cc7fcd48c||https://vulncheck.com/xdb/291cc7fcd48c , https://vulncheck.com/xdb/52bbf4b31fd5||https://vulncheck.com/xdb/52bbf4b31fd5 , https://vulncheck.com/xdb/cd201b5957ec||https://vulncheck.com/xdb/cd201b5957ec | |
CVE-2019-0808 | Microsoft | Win32k | 11/03/2021 | 0.51367 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0808 | https://vulncheck.com/xdb/68416ef5e53e||https://vulncheck.com/xdb/68416ef5e53e , https://vulncheck.com/xdb/c9383a669787||https://vulncheck.com/xdb/c9383a669787 , https://vulncheck.com/xdb/e81f408aa168||https://vulncheck.com/xdb/e81f408aa168 , https://vulncheck.com/xdb/287ede84f631||https://vulncheck.com/xdb/287ede84f631 | |||
CVE-2014-1812 | Microsoft | Windows | 11/03/2021 | 0.74488 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2014-1812 | ||||
CVE-2020-9818 | Apple | iOS, iPadOS, and watchOS | 11/03/2021 | 0.00561 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-9818 | ||||
CVE-2021-22894 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.49665 | 8.8 | FALSE | FALSE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22894 | ||||
CVE-2020-8196 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | 11/03/2021 | 0.62974 | 4.3 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8196 | ||||
CVE-2020-3452 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 11/03/2021 | 0.94452 | 7.5 | https://viz.greynoise.io/tag/cisco-asa-arbitrary-file-retrieval-attempt||https://viz.greynoise.io/tag/cisco-asa-arbitrary-file-retrieval-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3452 | https://vulncheck.com/xdb/9994be2cbc89||https://vulncheck.com/xdb/9994be2cbc89 , https://vulncheck.com/xdb/12e485c619dd||https://vulncheck.com/xdb/12e485c619dd , https://vulncheck.com/xdb/2a69a67b6102||https://vulncheck.com/xdb/2a69a67b6102 , https://vulncheck.com/xdb/359345081311||https://vulncheck.com/xdb/359345081311 , https://vulncheck.com/xdb/aa17afb12c79||https://vulncheck.com/xdb/aa17afb12c79 , https://vulncheck.com/xdb/14238ed757f7||https://vulncheck.com/xdb/14238ed757f7 , https://vulncheck.com/xdb/ea4e2fe7fa5b||https://vulncheck.com/xdb/ea4e2fe7fa5b , https://vulncheck.com/xdb/38dc36ab63a7||https://vulncheck.com/xdb/38dc36ab63a7 , https://vulncheck.com/xdb/582d43abc71f||https://vulncheck.com/xdb/582d43abc71f , https://vulncheck.com/xdb/cd0659505a89||https://vulncheck.com/xdb/cd0659505a89 , https://vulncheck.com/xdb/c9fadd0b730f||https://vulncheck.com/xdb/c9fadd0b730f , https://vulncheck.com/xdb/2844089d4205||https://vulncheck.com/xdb/2844089d4205 , https://vulncheck.com/xdb/765a6e6e3a97||https://vulncheck.com/xdb/765a6e6e3a97 , https://vulncheck.com/xdb/6b23e00dd9c9||https://vulncheck.com/xdb/6b23e00dd9c9 , https://vulncheck.com/xdb/ce846e08db40||https://vulncheck.com/xdb/ce846e08db40 , https://vulncheck.com/xdb/6f0ce488573d||https://vulncheck.com/xdb/6f0ce488573d , https://vulncheck.com/xdb/9bf142c2d239||https://vulncheck.com/xdb/9bf142c2d239 | |
CVE-2020-17087 | Microsoft | Windows | 11/03/2021 | 0.15027 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-17087 | https://vulncheck.com/xdb/7eed0e9442ec||https://vulncheck.com/xdb/7eed0e9442ec , https://vulncheck.com/xdb/8fe698ce7fbd||https://vulncheck.com/xdb/8fe698ce7fbd | |||
CVE-2021-42013 | Apache | HTTP Server | 11/03/2021 | 0.94428 | 9.8 | https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt||https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt | 77 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42013 | https://vulncheck.com/xdb/5e64583b49f2||https://vulncheck.com/xdb/5e64583b49f2 , https://vulncheck.com/xdb/bfc30889d329||https://vulncheck.com/xdb/bfc30889d329 , https://vulncheck.com/xdb/b1d2ff60b684||https://vulncheck.com/xdb/b1d2ff60b684 , https://vulncheck.com/xdb/4bad25e994e2||https://vulncheck.com/xdb/4bad25e994e2 , https://vulncheck.com/xdb/7ff49021c22e||https://vulncheck.com/xdb/7ff49021c22e , https://vulncheck.com/xdb/7f1b705bcf83||https://vulncheck.com/xdb/7f1b705bcf83 , https://vulncheck.com/xdb/5ca2b55d2782||https://vulncheck.com/xdb/5ca2b55d2782 , https://vulncheck.com/xdb/1049bafbb722||https://vulncheck.com/xdb/1049bafbb722 , https://vulncheck.com/xdb/ef11e24302d0||https://vulncheck.com/xdb/ef11e24302d0 , https://vulncheck.com/xdb/56bd1b4d31bb||https://vulncheck.com/xdb/56bd1b4d31bb , https://vulncheck.com/xdb/e543e9003746||https://vulncheck.com/xdb/e543e9003746 , https://vulncheck.com/xdb/6fea2c044e7a||https://vulncheck.com/xdb/6fea2c044e7a , https://vulncheck.com/xdb/80019b8370af||https://vulncheck.com/xdb/80019b8370af , https://vulncheck.com/xdb/c9583159535c||https://vulncheck.com/xdb/c9583159535c , https://vulncheck.com/xdb/93027facc9f9||https://vulncheck.com/xdb/93027facc9f9 , https://vulncheck.com/xdb/05376c442191||https://vulncheck.com/xdb/05376c442191 , https://vulncheck.com/xdb/cc14508a170c||https://vulncheck.com/xdb/cc14508a170c , https://vulncheck.com/xdb/f480a19ee326||https://vulncheck.com/xdb/f480a19ee326 , https://vulncheck.com/xdb/28d7e8231b1f||https://vulncheck.com/xdb/28d7e8231b1f | |
CVE-2020-6820 | Mozilla | Firefox and Thunderbird | 11/03/2021 | 0.04405 | 8.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6820 | ||||
CVE-2017-7269 | Microsoft | Internet Information Services (IIS) | 11/03/2021 | 0.94358 | 9.8 | https://viz.greynoise.io/tag/iis-webdav-rce-attempt||https://viz.greynoise.io/tag/iis-webdav-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-7269 | https://vulncheck.com/xdb/4e7883d7b859||https://vulncheck.com/xdb/4e7883d7b859 , https://vulncheck.com/xdb/2fe2967c158c||https://vulncheck.com/xdb/2fe2967c158c , https://vulncheck.com/xdb/dfebc9a481ad||https://vulncheck.com/xdb/dfebc9a481ad , https://vulncheck.com/xdb/5c14894b8e0b||https://vulncheck.com/xdb/5c14894b8e0b , https://vulncheck.com/xdb/0048fce3c892||https://vulncheck.com/xdb/0048fce3c892 , https://vulncheck.com/xdb/2c1272e94b39||https://vulncheck.com/xdb/2c1272e94b39 , https://vulncheck.com/xdb/d7e5f1574c94||https://vulncheck.com/xdb/d7e5f1574c94 , https://vulncheck.com/xdb/6eea40a3a674||https://vulncheck.com/xdb/6eea40a3a674 , https://vulncheck.com/xdb/9682afdd91a2||https://vulncheck.com/xdb/9682afdd91a2 , https://vulncheck.com/xdb/f2530a961c06||https://vulncheck.com/xdb/f2530a961c06 , https://vulncheck.com/xdb/63066a0e6113||https://vulncheck.com/xdb/63066a0e6113 , https://vulncheck.com/xdb/8e1eaf4da82d||https://vulncheck.com/xdb/8e1eaf4da82d , https://vulncheck.com/xdb/a36c0cf57665||https://vulncheck.com/xdb/a36c0cf57665 , https://vulncheck.com/xdb/275925d21df7||https://vulncheck.com/xdb/275925d21df7 | ||
CVE-2020-5735 | Amcrest | Cameras and Network Video Recorder (NVR) | 11/03/2021 | 0.48216 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-5735 | ||||
CVE-2020-5902 | F5 | BIG-IP | 11/03/2021 | 0.94442 | 9.8 | https://viz.greynoise.io/tag/f5-big-ip-tmui-rce-vuln-check||https://viz.greynoise.io/tag/f5-big-ip-tmui-rce-vuln-check | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-5902 | https://vulncheck.com/xdb/1a0d5e33fc45||https://vulncheck.com/xdb/1a0d5e33fc45 , https://vulncheck.com/xdb/84da9e97c9d8||https://vulncheck.com/xdb/84da9e97c9d8 , https://vulncheck.com/xdb/83a6db79a08b||https://vulncheck.com/xdb/83a6db79a08b , https://vulncheck.com/xdb/88f1fcaeb598||https://vulncheck.com/xdb/88f1fcaeb598 , https://vulncheck.com/xdb/215e30ad1ec1||https://vulncheck.com/xdb/215e30ad1ec1 , https://vulncheck.com/xdb/7436903b93b3||https://vulncheck.com/xdb/7436903b93b3 , https://vulncheck.com/xdb/9d229282dfa7||https://vulncheck.com/xdb/9d229282dfa7 , https://vulncheck.com/xdb/56bfabceae4a||https://vulncheck.com/xdb/56bfabceae4a , https://vulncheck.com/xdb/73f9e787074d||https://vulncheck.com/xdb/73f9e787074d , https://vulncheck.com/xdb/8221dd68e259||https://vulncheck.com/xdb/8221dd68e259 , https://vulncheck.com/xdb/5e821a582ff3||https://vulncheck.com/xdb/5e821a582ff3 , https://vulncheck.com/xdb/2f35578b6a4e||https://vulncheck.com/xdb/2f35578b6a4e , https://vulncheck.com/xdb/d13ebff2714e||https://vulncheck.com/xdb/d13ebff2714e , https://vulncheck.com/xdb/86fe209dce52||https://vulncheck.com/xdb/86fe209dce52 , https://vulncheck.com/xdb/3d3c1efc21d6||https://vulncheck.com/xdb/3d3c1efc21d6 , https://vulncheck.com/xdb/49a09a65578f||https://vulncheck.com/xdb/49a09a65578f , https://vulncheck.com/xdb/d6c5c4d13a05||https://vulncheck.com/xdb/d6c5c4d13a05 , https://vulncheck.com/xdb/aaa51d1dde07||https://vulncheck.com/xdb/aaa51d1dde07 , https://vulncheck.com/xdb/f4a6551a3d25||https://vulncheck.com/xdb/f4a6551a3d25 , https://vulncheck.com/xdb/c9200a88cc26||https://vulncheck.com/xdb/c9200a88cc26 , https://vulncheck.com/xdb/9b34669e9e6b||https://vulncheck.com/xdb/9b34669e9e6b , https://vulncheck.com/xdb/cb20275ece2f||https://vulncheck.com/xdb/cb20275ece2f , https://vulncheck.com/xdb/015b4ecd80f4||https://vulncheck.com/xdb/015b4ecd80f4 , https://vulncheck.com/xdb/f74eaaf672bc||https://vulncheck.com/xdb/f74eaaf672bc , https://vulncheck.com/xdb/a8f50138be81||https://vulncheck.com/xdb/a8f50138be81 , https://vulncheck.com/xdb/9fa6bc3af413||https://vulncheck.com/xdb/9fa6bc3af413 , https://vulncheck.com/xdb/ee5ad494cf44||https://vulncheck.com/xdb/ee5ad494cf44 , https://vulncheck.com/xdb/80de95eed85c||https://vulncheck.com/xdb/80de95eed85c , https://vulncheck.com/xdb/d2deaeca3c8d||https://vulncheck.com/xdb/d2deaeca3c8d , https://vulncheck.com/xdb/ad3e875990f5||https://vulncheck.com/xdb/ad3e875990f5 , https://vulncheck.com/xdb/5965f23f2c23||https://vulncheck.com/xdb/5965f23f2c23 , https://vulncheck.com/xdb/5283a75d948b||https://vulncheck.com/xdb/5283a75d948b | |
CVE-2020-4430 | IBM | Data Risk Manager | 11/03/2021 | 0.55164 | 4.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-4430 | ||||
CVE-2018-13379 | Fortinet | FortiOS | 11/03/2021 | 0.94454 | 9.1 | https://viz.greynoise.io/tag/fortios-info-disclosure-attempt||https://viz.greynoise.io/tag/fortios-info-disclosure-attempt | 16 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-13379 | https://vulncheck.com/xdb/3a05ce486979||https://vulncheck.com/xdb/3a05ce486979 , https://vulncheck.com/xdb/8fb0631d9c5b||https://vulncheck.com/xdb/8fb0631d9c5b , https://vulncheck.com/xdb/c0c18041153d||https://vulncheck.com/xdb/c0c18041153d , https://vulncheck.com/xdb/166599b1677b||https://vulncheck.com/xdb/166599b1677b , https://vulncheck.com/xdb/3fddec329111||https://vulncheck.com/xdb/3fddec329111 , https://vulncheck.com/xdb/efee6a4d87ee||https://vulncheck.com/xdb/efee6a4d87ee , https://vulncheck.com/xdb/f3cfffdc4419||https://vulncheck.com/xdb/f3cfffdc4419 , https://vulncheck.com/xdb/beecdbe5f919||https://vulncheck.com/xdb/beecdbe5f919 , https://vulncheck.com/xdb/2a7ceeb9e031||https://vulncheck.com/xdb/2a7ceeb9e031 | |
CVE-2017-9805 | Apache | Struts | 11/03/2021 | 0.94390 | 8.1 | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-9805 | https://vulncheck.com/xdb/e922bd12de1d||https://vulncheck.com/xdb/e922bd12de1d , https://vulncheck.com/xdb/018ad44965dd||https://vulncheck.com/xdb/018ad44965dd , https://vulncheck.com/xdb/1924e716f393||https://vulncheck.com/xdb/1924e716f393 , https://vulncheck.com/xdb/89e15b68ef36||https://vulncheck.com/xdb/89e15b68ef36 , https://vulncheck.com/xdb/1fa5f1889be6||https://vulncheck.com/xdb/1fa5f1889be6 , https://vulncheck.com/xdb/0ea476fd1c98||https://vulncheck.com/xdb/0ea476fd1c98 , https://vulncheck.com/xdb/bd12f850ebbe||https://vulncheck.com/xdb/bd12f850ebbe , https://vulncheck.com/xdb/dc089c9c541c||https://vulncheck.com/xdb/dc089c9c541c , https://vulncheck.com/xdb/6300c647a9ba||https://vulncheck.com/xdb/6300c647a9ba , https://vulncheck.com/xdb/43c0e5c2df29||https://vulncheck.com/xdb/43c0e5c2df29 , https://vulncheck.com/xdb/5d8bf4c938d9||https://vulncheck.com/xdb/5d8bf4c938d9 , https://vulncheck.com/xdb/c82af784f562||https://vulncheck.com/xdb/c82af784f562 , https://vulncheck.com/xdb/c7c9392dc94b||https://vulncheck.com/xdb/c7c9392dc94b , https://vulncheck.com/xdb/78bca3ee80a0||https://vulncheck.com/xdb/78bca3ee80a0 | ||
CVE-2021-22899 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.44951 | 8.8 | FALSE | FALSE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22899 | ||||
CVE-2020-4427 | IBM | Data Risk Manager | 11/03/2021 | 0.49175 | 9.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-4427 | ||||
CVE-2019-20085 | TVT | NVMS-1000 | 11/03/2021 | 0.93648 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-20085 | https://vulncheck.com/xdb/48cf542ed3af||https://vulncheck.com/xdb/48cf542ed3af , https://vulncheck.com/xdb/b69ae39519f9||https://vulncheck.com/xdb/b69ae39519f9 , https://vulncheck.com/xdb/7e163b7e9b71||https://vulncheck.com/xdb/7e163b7e9b71 | |||
CVE-2016-3976 | SAP | NetWeaver | 11/03/2021 | 0.77789 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3976 | ||||
CVE-2021-22900 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.01668 | 7.2 | FALSE | FALSE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22900 | ||||
CVE-2021-42258 | BQE | BillQuick Web Suite | 11/03/2021 | 0.93901 | 9.8 | https://viz.greynoise.io/tag/billquick-web-suite-sql-injection-attempt||https://viz.greynoise.io/tag/billquick-web-suite-sql-injection-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-42258 | |||
CVE-2020-3566 | Cisco | IOS XR | 11/03/2021 | 0.18957 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3566 | ||||
CVE-2020-27932 | Apple | Multiple Products | 11/03/2021 | 0.01976 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-27932 | ||||
CVE-2019-0863 | Microsoft | Windows | 11/03/2021 | 0.13544 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0863 | ||||
CVE-2020-14871 | Oracle | Solaris and Zettabyte File System (ZFS) | 11/03/2021 | 0.88872 | 10.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-14871 | https://vulncheck.com/xdb/471415817e60||https://vulncheck.com/xdb/471415817e60 , https://vulncheck.com/xdb/5164fb652cf7||https://vulncheck.com/xdb/5164fb652cf7 | |||
CVE-2020-8243 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.22622 | 7.2 | TRUE | FALSE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8243 | ||||
CVE-2012-0158 | Microsoft | MSCOMCTL.OCX | 11/03/2021 | 0.94314 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-0158 | ||||
CVE-2018-0171 | Cisco | IOS and IOS XE | 11/03/2021 | 0.91351 | 9.8 | https://viz.greynoise.io/tag/cisco-ios-software-smart-install-cve-2018-0171-rce-attempt||https://viz.greynoise.io/tag/cisco-ios-software-smart-install-cve-2018-0171-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0171 | https://vulncheck.com/xdb/6d4b443f23fc | ||
CVE-2015-1641 | Microsoft | Office | 11/03/2021 | 0.93530 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-1641 | ||||
CVE-2020-8467 | Trend Micro | Apex One and OfficeScan | 11/03/2021 | 0.07689 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8467 | ||||
CVE-2021-20090 | Arcadyan | Buffalo Firmware | 11/03/2021 | 0.94401 | 9.8 | https://viz.greynoise.io/tag/buffalo-router-rce-attempt||https://viz.greynoise.io/tag/buffalo-router-rce-attempt , https://viz.greynoise.io/tag/buffalo-router-rce-check||https://viz.greynoise.io/tag/buffalo-router-rce-check | 0 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-20090 | ||
CVE-2018-18325 | DotNetNuke (DNN) | DotNetNuke (DNN) | 11/03/2021 | 0.76118 | 7.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-18325 | ||||
CVE-2018-14558 | Tenda | AC7, AC9, and AC10 Routers | 11/03/2021 | 0.81989 | 9.8 | 0 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2018-14558 | |||
CVE-2018-2380 | SAP | Customer Relationship Management (CRM) | 11/03/2021 | 0.45321 | 6.6 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-2380 | https://vulncheck.com/xdb/a7644be4c7b5||https://vulncheck.com/xdb/a7644be4c7b5 , https://vulncheck.com/xdb/fdfc155ac83e||https://vulncheck.com/xdb/fdfc155ac83e | |||
CVE-2021-22893 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.93511 | 10.0 | TRUE | FALSE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22893 | ||||
CVE-2020-6819 | Mozilla | Firefox and Thunderbird | 11/03/2021 | 0.00350 | 8.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6819 | ||||
CVE-2020-8515 | DrayTek | Multiple Vigor Routers | 11/03/2021 | 0.94357 | 9.8 | https://viz.greynoise.io/tag/draytek-rce-attempt||https://viz.greynoise.io/tag/draytek-rce-attempt | 3 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-8515 | https://vulncheck.com/xdb/ec025a943dc1||https://vulncheck.com/xdb/ec025a943dc1 , https://vulncheck.com/xdb/7f8fd0ec1666||https://vulncheck.com/xdb/7f8fd0ec1666 , https://vulncheck.com/xdb/0f4bef153327||https://vulncheck.com/xdb/0f4bef153327 | |
CVE-2020-3992 | VMware | ESXi | 11/03/2021 | 0.90757 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3992 | https://vulncheck.com/xdb/8d466afc3103||https://vulncheck.com/xdb/8d466afc3103 , https://vulncheck.com/xdb/f152d01f6c20||https://vulncheck.com/xdb/f152d01f6c20 , https://vulncheck.com/xdb/d1ae6f5c4bc7||https://vulncheck.com/xdb/d1ae6f5c4bc7 | |||
CVE-2019-11510 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.94464 | 9.9 | https://viz.greynoise.io/tag/pulse-secure-vpn-file-disclosure-attempt||https://viz.greynoise.io/tag/pulse-secure-vpn-file-disclosure-attempt | 7 | TRUE | TRUE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2019-11510 | https://vulncheck.com/xdb/dc6cb57a366e||https://vulncheck.com/xdb/dc6cb57a366e , https://vulncheck.com/xdb/3d7363fb7873||https://vulncheck.com/xdb/3d7363fb7873 , https://vulncheck.com/xdb/a25cc59141d7||https://vulncheck.com/xdb/a25cc59141d7 , https://vulncheck.com/xdb/2f9e05a2128d||https://vulncheck.com/xdb/2f9e05a2128d , https://vulncheck.com/xdb/480362951743||https://vulncheck.com/xdb/480362951743 , https://vulncheck.com/xdb/50d07a7e420f||https://vulncheck.com/xdb/50d07a7e420f , https://vulncheck.com/xdb/1061b5294e83||https://vulncheck.com/xdb/1061b5294e83 , https://vulncheck.com/xdb/2d6771299af4||https://vulncheck.com/xdb/2d6771299af4 , https://vulncheck.com/xdb/6c8292ec05c6||https://vulncheck.com/xdb/6c8292ec05c6 , https://vulncheck.com/xdb/2f72c6e36a8e||https://vulncheck.com/xdb/2f72c6e36a8e | |
CVE-2020-1020 | Microsoft | Windows | 11/03/2021 | 0.87870 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1020 | https://vulncheck.com/xdb/07ba1df2e806||https://vulncheck.com/xdb/07ba1df2e806 , https://vulncheck.com/xdb/161b29524907||https://vulncheck.com/xdb/161b29524907 | |||
CVE-2021-22205 | GitLab | Community and Enterprise Editions | 11/03/2021 | 0.94467 | 10.0 | https://viz.greynoise.io/tag/gitlab-ce-rce-attempt||https://viz.greynoise.io/tag/gitlab-ce-rce-attempt | 0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22205 | https://vulncheck.com/xdb/8e28f16d2f29||https://vulncheck.com/xdb/8e28f16d2f29 , https://vulncheck.com/xdb/4c0b2d5b4974||https://vulncheck.com/xdb/4c0b2d5b4974 , https://vulncheck.com/xdb/82ceb748c97f||https://vulncheck.com/xdb/82ceb748c97f , https://vulncheck.com/xdb/8f0f2fc2bf7a||https://vulncheck.com/xdb/8f0f2fc2bf7a , https://vulncheck.com/xdb/214fae59f95a||https://vulncheck.com/xdb/214fae59f95a , https://vulncheck.com/xdb/7be0e6a85009||https://vulncheck.com/xdb/7be0e6a85009 , https://vulncheck.com/xdb/a7a4a4af582e||https://vulncheck.com/xdb/a7a4a4af582e , https://vulncheck.com/xdb/75d6cfb95543||https://vulncheck.com/xdb/75d6cfb95543 , https://vulncheck.com/xdb/6de3fd36464c||https://vulncheck.com/xdb/6de3fd36464c , https://vulncheck.com/xdb/a225f95f8778||https://vulncheck.com/xdb/a225f95f8778 , https://vulncheck.com/xdb/c38dd496f070||https://vulncheck.com/xdb/c38dd496f070 , https://vulncheck.com/xdb/2c9ecaf997fd||https://vulncheck.com/xdb/2c9ecaf997fd , https://vulncheck.com/xdb/fee8067e489b||https://vulncheck.com/xdb/fee8067e489b , https://vulncheck.com/xdb/1df329ab1571||https://vulncheck.com/xdb/1df329ab1571 , https://vulncheck.com/xdb/f8b573dcb225||https://vulncheck.com/xdb/f8b573dcb225 , https://vulncheck.com/xdb/67ac8dff2a01||https://vulncheck.com/xdb/67ac8dff2a01 , https://vulncheck.com/xdb/c4cbe11e130c||https://vulncheck.com/xdb/c4cbe11e130c , https://vulncheck.com/xdb/4f08d429923e||https://vulncheck.com/xdb/4f08d429923e , https://vulncheck.com/xdb/779a26749ee1||https://vulncheck.com/xdb/779a26749ee1 | |
CVE-2019-15949 | Nagios | Nagios XI | 11/03/2021 | 0.87190 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-15949 | https://vulncheck.com/xdb/eccfb0ae16cd | |||
CVE-2019-16759 | vBulletin | vBulletin | 11/03/2021 | 0.94429 | 9.8 | https://viz.greynoise.io/tag/vbulletin-5-x-rce-attempt||https://viz.greynoise.io/tag/vbulletin-5-x-rce-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-16759 | https://vulncheck.com/xdb/864418406fc2||https://vulncheck.com/xdb/864418406fc2 , https://vulncheck.com/xdb/d853d7e336d8||https://vulncheck.com/xdb/d853d7e336d8 , https://vulncheck.com/xdb/7275122ff481||https://vulncheck.com/xdb/7275122ff481 , https://vulncheck.com/xdb/1947002334c8||https://vulncheck.com/xdb/1947002334c8 , https://vulncheck.com/xdb/60d80aaa798d||https://vulncheck.com/xdb/60d80aaa798d , https://vulncheck.com/xdb/4587d75eac06||https://vulncheck.com/xdb/4587d75eac06 , https://vulncheck.com/xdb/e94e5a578e27||https://vulncheck.com/xdb/e94e5a578e27 , https://vulncheck.com/xdb/5075aca956f4||https://vulncheck.com/xdb/5075aca956f4 , https://vulncheck.com/xdb/7d63cbd8af55||https://vulncheck.com/xdb/7d63cbd8af55 , https://vulncheck.com/xdb/f77f6e256780||https://vulncheck.com/xdb/f77f6e256780 | ||
CVE-2020-0069 | MediaTek | Multiple Chipsets | 11/03/2021 | 0.01722 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0069 | https://vulncheck.com/xdb/466ce736a0d4||https://vulncheck.com/xdb/466ce736a0d4 , https://vulncheck.com/xdb/c9d83d8c80bb||https://vulncheck.com/xdb/c9d83d8c80bb , https://vulncheck.com/xdb/9a931c619e3c||https://vulncheck.com/xdb/9a931c619e3c | |||
CVE-2020-11651 | SaltStack | Salt | 11/03/2021 | 0.94390 | 9.8 | https://viz.greynoise.io/tag/saltstack-scanner||https://viz.greynoise.io/tag/saltstack-scanner | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11651 | https://vulncheck.com/xdb/6941178da516||https://vulncheck.com/xdb/6941178da516 , https://vulncheck.com/xdb/f2d4106b8900||https://vulncheck.com/xdb/f2d4106b8900 , https://vulncheck.com/xdb/8e2c5b54e098||https://vulncheck.com/xdb/8e2c5b54e098 , https://vulncheck.com/xdb/ad2b3134eaad||https://vulncheck.com/xdb/ad2b3134eaad , https://vulncheck.com/xdb/51575fb7e19d||https://vulncheck.com/xdb/51575fb7e19d , https://vulncheck.com/xdb/25e4169b7213||https://vulncheck.com/xdb/25e4169b7213 , https://vulncheck.com/xdb/f1a425abf2c5||https://vulncheck.com/xdb/f1a425abf2c5 , https://vulncheck.com/xdb/aaa9b5889efa||https://vulncheck.com/xdb/aaa9b5889efa , https://vulncheck.com/xdb/ed4dc5fcce7f||https://vulncheck.com/xdb/ed4dc5fcce7f , https://vulncheck.com/xdb/731f17c6b531||https://vulncheck.com/xdb/731f17c6b531 , https://vulncheck.com/xdb/9705a4dc0d5d||https://vulncheck.com/xdb/9705a4dc0d5d , https://vulncheck.com/xdb/605b3d9a1c77||https://vulncheck.com/xdb/605b3d9a1c77 , https://vulncheck.com/xdb/126bde061e76||https://vulncheck.com/xdb/126bde061e76 | ||
CVE-2021-22005 | VMware | vCenter Server | 11/03/2021 | 0.94455 | 9.8 | https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check , https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22005 | https://vulncheck.com/xdb/9da5675367c8||https://vulncheck.com/xdb/9da5675367c8 , https://vulncheck.com/xdb/893ecfaa7d37||https://vulncheck.com/xdb/893ecfaa7d37 , https://vulncheck.com/xdb/bc4416405b99||https://vulncheck.com/xdb/bc4416405b99 , https://vulncheck.com/xdb/ec495678c2bc||https://vulncheck.com/xdb/ec495678c2bc , https://vulncheck.com/xdb/422d2b1bd22d||https://vulncheck.com/xdb/422d2b1bd22d , https://vulncheck.com/xdb/d369b492a41d||https://vulncheck.com/xdb/d369b492a41d , https://vulncheck.com/xdb/3647939d992b||https://vulncheck.com/xdb/3647939d992b , https://vulncheck.com/xdb/ba93a3b960a8||https://vulncheck.com/xdb/ba93a3b960a8 , https://vulncheck.com/xdb/bfc1743eb154||https://vulncheck.com/xdb/bfc1743eb154 | |
CVE-2020-3580 | Cisco | Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) | 11/03/2021 | 0.93247 | 6.1 | https://viz.greynoise.io/tag/cisco-asa-xss-attempt||https://viz.greynoise.io/tag/cisco-asa-xss-attempt | 1 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3580 | https://vulncheck.com/xdb/72298381b675||https://vulncheck.com/xdb/72298381b675 , https://vulncheck.com/xdb/30702ae3c60c||https://vulncheck.com/xdb/30702ae3c60c , https://vulncheck.com/xdb/929ab8c7b4bf||https://vulncheck.com/xdb/929ab8c7b4bf , https://vulncheck.com/xdb/d29ebf0afcf2||https://vulncheck.com/xdb/d29ebf0afcf2 | |
CVE-2021-36942 | Microsoft | Windows | 11/03/2021 | 0.93632 | 7.5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-36942 | https://vulncheck.com/xdb/2387bcbc47ae | |||
CVE-2019-3396 | Atlassian | Confluence Server and Data Server | 11/03/2021 | 0.94486 | 9.8 | https://viz.greynoise.io/tag/atlassian-confluence-template-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-template-injection-attempt | 4 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-3396 | https://vulncheck.com/xdb/fb022ff5fe3a||https://vulncheck.com/xdb/fb022ff5fe3a , https://vulncheck.com/xdb/cf39bffa0254||https://vulncheck.com/xdb/cf39bffa0254 , https://vulncheck.com/xdb/f0c5b22fe8f3||https://vulncheck.com/xdb/f0c5b22fe8f3 , https://vulncheck.com/xdb/c0e4abf9eb81||https://vulncheck.com/xdb/c0e4abf9eb81 , https://vulncheck.com/xdb/fb62fcd4b481||https://vulncheck.com/xdb/fb62fcd4b481 , https://vulncheck.com/xdb/7f52c8890f19||https://vulncheck.com/xdb/7f52c8890f19 | |
CVE-2021-38000 | Chromium Intents | 11/03/2021 | 0.03408 | 6.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38000 | |||||
CVE-2021-38648 | Microsoft | Open Management Infrastructure (OMI) | 11/03/2021 | 0.25851 | 7.8 | https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38648 | |||
CVE-2021-35211 | SolarWinds | Serv-U | 11/03/2021 | 0.94139 | 9.0 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-35211 | https://vulncheck.com/xdb/f28c021f6b0c||https://vulncheck.com/xdb/f28c021f6b0c , https://vulncheck.com/xdb/3df6460c659f||https://vulncheck.com/xdb/3df6460c659f , https://vulncheck.com/xdb/44b493399f2c||https://vulncheck.com/xdb/44b493399f2c | |||
CVE-2020-6287 | SAP | NetWeaver | 11/03/2021 | 0.94395 | 10.0 | https://viz.greynoise.io/tag/sap-netweaver-application-server-for-java-rce-attempt||https://viz.greynoise.io/tag/sap-netweaver-application-server-for-java-rce-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6287 | https://vulncheck.com/xdb/cf2bffbae837||https://vulncheck.com/xdb/cf2bffbae837 , https://vulncheck.com/xdb/85f301721ead||https://vulncheck.com/xdb/85f301721ead , https://vulncheck.com/xdb/dcab3513d95c||https://vulncheck.com/xdb/dcab3513d95c , https://vulncheck.com/xdb/5fd49cf1fa28||https://vulncheck.com/xdb/5fd49cf1fa28 , https://vulncheck.com/xdb/76887e2664e5||https://vulncheck.com/xdb/76887e2664e5 , https://vulncheck.com/xdb/28d90963af15||https://vulncheck.com/xdb/28d90963af15 | |
CVE-2021-31956 | Microsoft | Windows | 11/03/2021 | 0.85551 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31956 | https://vulncheck.com/xdb/ef8974070480||https://vulncheck.com/xdb/ef8974070480 , https://vulncheck.com/xdb/736c14a7215d||https://vulncheck.com/xdb/736c14a7215d , https://vulncheck.com/xdb/189db9bb950f||https://vulncheck.com/xdb/189db9bb950f | |||
CVE-2021-1647 | Microsoft | Defender | 11/03/2021 | 0.59390 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1647 | ||||
CVE-2021-30666 | Apple | iOS | 11/03/2021 | 0.00901 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30666 | ||||
CVE-2021-1879 | Apple | iOS, iPadOS, and watchOS | 11/03/2021 | 0.02049 | 6.1 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1879 | ||||
CVE-2021-28664 | Arm | Mali Graphics Processing Unit (GPU) | 11/03/2021 | 0.00264 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-28664 | ||||
CVE-2021-20016 | SonicWall | SSLVPN SMA100 | 11/03/2021 | 0.80445 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20016 | ||||
CVE-2021-26858 | Microsoft | Exchange Server | 11/03/2021 | 0.77893 | 7.8 | TRUE | FALSE | FALSE | Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26858 | ||||
CVE-2021-1906 | Qualcomm | Multiple Chipsets | 11/03/2021 | 0.00136 | 6.2 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1906 | ||||
CVE-2021-27102 | Accellion | FTA | 11/03/2021 | 0.00339 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27102 | ||||
CVE-2021-22506 | Micro Focus | Micro Focus Access Manager | 11/03/2021 | 0.37554 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-22506 | ||||
CVE-2010-5326 | SAP | NetWeaver | 11/03/2021 | 0.26416 | 10.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2010-5326 | ||||
CVE-2021-26411 | Microsoft | Internet Explorer | 11/03/2021 | 0.89559 | 8.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-26411 | ||||
CVE-2016-3718 | ImageMagick | ImageMagick | 11/03/2021 | 0.87335 | 5.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3718 | ||||
CVE-2019-6223 | Apple | iOS and macOS | 11/03/2021 | 0.00451 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-6223 | ||||
CVE-2018-8653 | Microsoft | Internet Explorer | 11/03/2021 | 0.35296 | 7.5 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-8653 | ||||
CVE-2021-27101 | Accellion | FTA | 11/03/2021 | 0.01452 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27101 | ||||
CVE-2016-0167 | Microsoft | Win32k | 11/03/2021 | 0.02024 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0167 | ||||
CVE-2021-30563 | Chromium V8 | 11/03/2021 | 0.08751 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30563 | |||||
CVE-2015-4852 | Oracle | WebLogic Server | 11/03/2021 | 0.92306 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2015-4852 | https://vulncheck.com/xdb/3b46068ce37d||https://vulncheck.com/xdb/3b46068ce37d , https://vulncheck.com/xdb/d6ab148d5191||https://vulncheck.com/xdb/d6ab148d5191 , https://vulncheck.com/xdb/bae8da7c0ecd||https://vulncheck.com/xdb/bae8da7c0ecd , https://vulncheck.com/xdb/d3997c03feb1||https://vulncheck.com/xdb/d3997c03feb1 , https://vulncheck.com/xdb/8424221cddad||https://vulncheck.com/xdb/8424221cddad | |||
CVE-2021-36948 | Microsoft | Windows | 11/03/2021 | 0.00129 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-36948 | ||||
CVE-2017-11774 | Microsoft | Office | 11/03/2021 | 0.84604 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-11774 | https://vulncheck.com/xdb/1cb06cbff067 | |||
CVE-2020-0601 | Microsoft | Windows | 11/03/2021 | 0.93911 | 8.1 | TRUE | TRUE | FALSE | Reference CISA's ED 20-02 (https://www.cisa.gov/news-events/directives/ed-20-02-mitigate-windows-vulnerabilities-january-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-02. https://nvd.nist.gov/vuln/detail/CVE-2020-0601 | https://vulncheck.com/xdb/740afa3911a0||https://vulncheck.com/xdb/740afa3911a0 , https://vulncheck.com/xdb/0766cc1abe5d||https://vulncheck.com/xdb/0766cc1abe5d , https://vulncheck.com/xdb/09c5af32c1d7||https://vulncheck.com/xdb/09c5af32c1d7 , https://vulncheck.com/xdb/6abcb18100dc||https://vulncheck.com/xdb/6abcb18100dc , https://vulncheck.com/xdb/6bc84901f00a||https://vulncheck.com/xdb/6bc84901f00a , https://vulncheck.com/xdb/839b9e7e2e93||https://vulncheck.com/xdb/839b9e7e2e93 , https://vulncheck.com/xdb/f3005b474479||https://vulncheck.com/xdb/f3005b474479 , https://vulncheck.com/xdb/496d3fc0b8d0||https://vulncheck.com/xdb/496d3fc0b8d0 , https://vulncheck.com/xdb/cc5ed1f3625f||https://vulncheck.com/xdb/cc5ed1f3625f , https://vulncheck.com/xdb/08bffaffbac2||https://vulncheck.com/xdb/08bffaffbac2 , https://vulncheck.com/xdb/2269fe47fe2f||https://vulncheck.com/xdb/2269fe47fe2f , https://vulncheck.com/xdb/1ab56e688532||https://vulncheck.com/xdb/1ab56e688532 | |||
CVE-2016-3715 | ImageMagick | ImageMagick | 11/03/2021 | 0.89383 | 5.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3715 | ||||
CVE-2020-0986 | Microsoft | Windows | 11/03/2021 | 0.21079 | 7.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0986 | ||||
CVE-2020-14883 | Oracle | WebLogic Server | 11/03/2021 | 0.94437 | 7.2 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-14883 | https://vulncheck.com/xdb/44c3b7e2464d||https://vulncheck.com/xdb/44c3b7e2464d , https://vulncheck.com/xdb/deddd47ed62a||https://vulncheck.com/xdb/deddd47ed62a , https://vulncheck.com/xdb/0a5d3f5f71c2||https://vulncheck.com/xdb/0a5d3f5f71c2 , https://vulncheck.com/xdb/c5c6975fb276||https://vulncheck.com/xdb/c5c6975fb276 | |
CVE-2020-16017 | Chrome | 11/03/2021 | 0.21930 | 9.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-16017 | |||||
CVE-2020-0968 | Microsoft | Internet Explorer | 11/03/2021 | 0.43238 | 7.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0968 | ||||
CVE-2020-27930 | Apple | Multiple Products | 11/03/2021 | 0.47457 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-27930 | https://vulncheck.com/xdb/ba050b6e89d5 | |||
CVE-2018-0296 | Cisco | Adaptive Security Appliance (ASA) | 11/03/2021 | 0.94436 | 7.5 | 1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0296 | https://vulncheck.com/xdb/ad80b13bd026||https://vulncheck.com/xdb/ad80b13bd026 , https://vulncheck.com/xdb/02e9e2c8837a||https://vulncheck.com/xdb/02e9e2c8837a , https://vulncheck.com/xdb/766776ee90cd||https://vulncheck.com/xdb/766776ee90cd , https://vulncheck.com/xdb/990d9dcf809d||https://vulncheck.com/xdb/990d9dcf809d | ||
CVE-2020-3118 | Cisco | IOS XR | 11/03/2021 | 0.00168 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3118 | ||||
CVE-2020-29583 | Zyxel | Multiple Products | 11/03/2021 | 0.94211 | 9.8 | https://viz.greynoise.io/tag/zyxel-usg-ssh-backdoor-attempt||https://viz.greynoise.io/tag/zyxel-usg-ssh-backdoor-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-29583 | https://vulncheck.com/xdb/13164d2ee525 | ||
CVE-2020-3952 | VMware | vCenter Server | 11/03/2021 | 0.93234 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3952 | https://vulncheck.com/xdb/0b7e18965378||https://vulncheck.com/xdb/0b7e18965378 , https://vulncheck.com/xdb/12b54f8ddd08||https://vulncheck.com/xdb/12b54f8ddd08 , https://vulncheck.com/xdb/2dc27965feae||https://vulncheck.com/xdb/2dc27965feae | |||
CVE-2021-30807 | Apple | Multiple Products | 11/03/2021 | 0.17750 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30807 | https://vulncheck.com/xdb/cfe59e0ba463||https://vulncheck.com/xdb/cfe59e0ba463 , https://vulncheck.com/xdb/3f1ddac51672||https://vulncheck.com/xdb/3f1ddac51672 , https://vulncheck.com/xdb/227b555675d3||https://vulncheck.com/xdb/227b555675d3 | |||
CVE-2020-3569 | Cisco | IOS XR | 11/03/2021 | 0.19978 | 8.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3569 | ||||
CVE-2021-30633 | Chromium Indexed DB API | 11/03/2021 | 0.46777 | 9.6 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30633 | |||||
CVE-2019-0797 | Microsoft | Win32k | 11/03/2021 | 0.03027 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-0797 | ||||
CVE-2021-30116 | Kaseya | Virtual System/Server Administrator (VSA) | 11/03/2021 | 0.18048 | 10.0 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30116 | ||||
CVE-2019-15752 | Docker | Desktop Community Edition | 11/03/2021 | 0.60846 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-15752 | ||||
CVE-2021-28663 | Arm | Mali Graphics Processing Unit (GPU) | 11/03/2021 | 0.07289 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-28663 | https://vulncheck.com/xdb/7fe79c6d9e0d | |||
CVE-2019-3398 | Atlassian | Confluence Server and Data Center | 11/03/2021 | 0.93966 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-3398 | https://vulncheck.com/xdb/02ff19858062||https://vulncheck.com/xdb/02ff19858062 , https://vulncheck.com/xdb/0cf9ade08db1||https://vulncheck.com/xdb/0cf9ade08db1 | |||
CVE-2021-27085 | Microsoft | Internet Explorer | 11/03/2021 | 0.04438 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27085 | ||||
CVE-2019-5544 | VMware | VMware ESXi and Horizon DaaS | 11/03/2021 | 0.87066 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-5544 | https://vulncheck.com/xdb/8a8375ae7774||https://vulncheck.com/xdb/8a8375ae7774 , https://vulncheck.com/xdb/51f10d5e647f||https://vulncheck.com/xdb/51f10d5e647f | |||
CVE-2021-21166 | Chromium | 11/03/2021 | 0.41931 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21166 | |||||
CVE-2020-12271 | Sophos | SFOS | 11/03/2021 | 0.83191 | 10.0 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-12271 | ||||
CVE-2021-34523 | Microsoft | Exchange Server | 11/03/2021 | 0.94149 | 9.0 | https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-34523 | https://vulncheck.com/xdb/20bfc44ad41e||https://vulncheck.com/xdb/20bfc44ad41e , https://vulncheck.com/xdb/10fdd6a575c1||https://vulncheck.com/xdb/10fdd6a575c1 , https://vulncheck.com/xdb/2654f9566e2c||https://vulncheck.com/xdb/2654f9566e2c , https://vulncheck.com/xdb/c0acd90670f6||https://vulncheck.com/xdb/c0acd90670f6 , https://vulncheck.com/xdb/8ef1d6c449bf||https://vulncheck.com/xdb/8ef1d6c449bf , https://vulncheck.com/xdb/c9e3ac579e16||https://vulncheck.com/xdb/c9e3ac579e16 , https://vulncheck.com/xdb/674ca66d77f8||https://vulncheck.com/xdb/674ca66d77f8 , https://vulncheck.com/xdb/a80b26c8261b||https://vulncheck.com/xdb/a80b26c8261b | ||
CVE-2019-18935 | Progress | Telerik UI for ASP.NET AJAX | 11/03/2021 | 0.93471 | 9.8 | https://viz.greynoise.io/tag/telerik-ui-deserialization-rce-attempt||https://viz.greynoise.io/tag/telerik-ui-deserialization-rce-attempt | 5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-18935 | https://vulncheck.com/xdb/dd4d5145d7fd||https://vulncheck.com/xdb/dd4d5145d7fd , https://vulncheck.com/xdb/6733f1b67fb2||https://vulncheck.com/xdb/6733f1b67fb2 , https://vulncheck.com/xdb/569e3fec38c8||https://vulncheck.com/xdb/569e3fec38c8 , https://vulncheck.com/xdb/dffdf06b5f8a||https://vulncheck.com/xdb/dffdf06b5f8a , https://vulncheck.com/xdb/48d2eb3dee46||https://vulncheck.com/xdb/48d2eb3dee46 , https://vulncheck.com/xdb/8dc793fec147||https://vulncheck.com/xdb/8dc793fec147 , https://vulncheck.com/xdb/c621c71a9bf3||https://vulncheck.com/xdb/c621c71a9bf3 , https://vulncheck.com/xdb/de3ebe4e8ea8||https://vulncheck.com/xdb/de3ebe4e8ea8 | |
CVE-2021-30632 | Chromium V8 | 11/03/2021 | 0.84245 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30632 | https://vulncheck.com/xdb/dd5a92616e09||https://vulncheck.com/xdb/dd5a92616e09 , https://vulncheck.com/xdb/9f7f048bd1a9||https://vulncheck.com/xdb/9f7f048bd1a9 , https://vulncheck.com/xdb/4aa5278c2fd2||https://vulncheck.com/xdb/4aa5278c2fd2 | ||||
CVE-2021-41773 | Apache | HTTP Server | 11/03/2021 | 0.94398 | 7.5 | https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt||https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-41773 | https://vulncheck.com/xdb/b176f463fd70||https://vulncheck.com/xdb/b176f463fd70 , https://vulncheck.com/xdb/c3290a9c4bc7||https://vulncheck.com/xdb/c3290a9c4bc7 , https://vulncheck.com/xdb/a64e3f6930db||https://vulncheck.com/xdb/a64e3f6930db , https://vulncheck.com/xdb/5e909ea4a3d5||https://vulncheck.com/xdb/5e909ea4a3d5 , https://vulncheck.com/xdb/0876a430eb18||https://vulncheck.com/xdb/0876a430eb18 , https://vulncheck.com/xdb/c7958f390e0c||https://vulncheck.com/xdb/c7958f390e0c , https://vulncheck.com/xdb/f8b4bb1e6c3e||https://vulncheck.com/xdb/f8b4bb1e6c3e , https://vulncheck.com/xdb/01d74e61f225||https://vulncheck.com/xdb/01d74e61f225 , https://vulncheck.com/xdb/416f536ef47f||https://vulncheck.com/xdb/416f536ef47f , https://vulncheck.com/xdb/116dd0497f92||https://vulncheck.com/xdb/116dd0497f92 , https://vulncheck.com/xdb/80d7b284f950||https://vulncheck.com/xdb/80d7b284f950 , https://vulncheck.com/xdb/54be1024b6bc||https://vulncheck.com/xdb/54be1024b6bc , https://vulncheck.com/xdb/7f7042705dd4||https://vulncheck.com/xdb/7f7042705dd4 , https://vulncheck.com/xdb/91cf2dd89533||https://vulncheck.com/xdb/91cf2dd89533 , https://vulncheck.com/xdb/a5f2ac9f054b||https://vulncheck.com/xdb/a5f2ac9f054b , https://vulncheck.com/xdb/f7be65b2ebfc||https://vulncheck.com/xdb/f7be65b2ebfc , https://vulncheck.com/xdb/79a7215a4e02||https://vulncheck.com/xdb/79a7215a4e02 , https://vulncheck.com/xdb/91738f2d976d||https://vulncheck.com/xdb/91738f2d976d , https://vulncheck.com/xdb/c454ef5641d0||https://vulncheck.com/xdb/c454ef5641d0 , https://vulncheck.com/xdb/dde0bdc0bae9||https://vulncheck.com/xdb/dde0bdc0bae9 , https://vulncheck.com/xdb/24d12a4a7fc7||https://vulncheck.com/xdb/24d12a4a7fc7 , https://vulncheck.com/xdb/772d5bced9ba||https://vulncheck.com/xdb/772d5bced9ba , https://vulncheck.com/xdb/151bc6d65f04||https://vulncheck.com/xdb/151bc6d65f04 , https://vulncheck.com/xdb/93df6b255322||https://vulncheck.com/xdb/93df6b255322 , https://vulncheck.com/xdb/58a64b19ebbb||https://vulncheck.com/xdb/58a64b19ebbb , https://vulncheck.com/xdb/e476521c9afa||https://vulncheck.com/xdb/e476521c9afa , https://vulncheck.com/xdb/42e9c7e067d3||https://vulncheck.com/xdb/42e9c7e067d3 , https://vulncheck.com/xdb/1c63893823c9||https://vulncheck.com/xdb/1c63893823c9 , https://vulncheck.com/xdb/c32e5f532570||https://vulncheck.com/xdb/c32e5f532570 , https://vulncheck.com/xdb/f0e7324b9b25||https://vulncheck.com/xdb/f0e7324b9b25 , https://vulncheck.com/xdb/25c6171f0d20||https://vulncheck.com/xdb/25c6171f0d20 , https://vulncheck.com/xdb/c46ab2084dd8||https://vulncheck.com/xdb/c46ab2084dd8 , https://vulncheck.com/xdb/d0086a5bdeec||https://vulncheck.com/xdb/d0086a5bdeec , https://vulncheck.com/xdb/b8ddde495298||https://vulncheck.com/xdb/b8ddde495298 , https://vulncheck.com/xdb/5876e9463bbd||https://vulncheck.com/xdb/5876e9463bbd , https://vulncheck.com/xdb/a6c3bff27ae4||https://vulncheck.com/xdb/a6c3bff27ae4 , https://vulncheck.com/xdb/5cb3eb657c95||https://vulncheck.com/xdb/5cb3eb657c95 , https://vulncheck.com/xdb/af8ec6c8371f||https://vulncheck.com/xdb/af8ec6c8371f , https://vulncheck.com/xdb/7cb588641bcf||https://vulncheck.com/xdb/7cb588641bcf , https://vulncheck.com/xdb/3bbc73bf5a53||https://vulncheck.com/xdb/3bbc73bf5a53 , https://vulncheck.com/xdb/80eefccf1e05||https://vulncheck.com/xdb/80eefccf1e05 , https://vulncheck.com/xdb/4aeca6685d2b||https://vulncheck.com/xdb/4aeca6685d2b , https://vulncheck.com/xdb/4641bb9539f4||https://vulncheck.com/xdb/4641bb9539f4 , https://vulncheck.com/xdb/90b14fb65ee8||https://vulncheck.com/xdb/90b14fb65ee8 , https://vulncheck.com/xdb/7efd496306c2||https://vulncheck.com/xdb/7efd496306c2 , https://vulncheck.com/xdb/8c3d9bc94733||https://vulncheck.com/xdb/8c3d9bc94733 , https://vulncheck.com/xdb/5283f9042bf8||https://vulncheck.com/xdb/5283f9042bf8 , https://vulncheck.com/xdb/78d9ef784392||https://vulncheck.com/xdb/78d9ef784392 , https://vulncheck.com/xdb/0c20fdde6dd8||https://vulncheck.com/xdb/0c20fdde6dd8 , https://vulncheck.com/xdb/0542adb90818||https://vulncheck.com/xdb/0542adb90818 , https://vulncheck.com/xdb/6cf46a065e42||https://vulncheck.com/xdb/6cf46a065e42 , https://vulncheck.com/xdb/f9ab3269f3b5||https://vulncheck.com/xdb/f9ab3269f3b5 , https://vulncheck.com/xdb/d98a494ae032||https://vulncheck.com/xdb/d98a494ae032 , https://vulncheck.com/xdb/3211ee9a55c9||https://vulncheck.com/xdb/3211ee9a55c9 , https://vulncheck.com/xdb/4e2e5e6c7181||https://vulncheck.com/xdb/4e2e5e6c7181 , https://vulncheck.com/xdb/37f7e7cf267d||https://vulncheck.com/xdb/37f7e7cf267d , https://vulncheck.com/xdb/044ea91b2193||https://vulncheck.com/xdb/044ea91b2193 , https://vulncheck.com/xdb/8867c4e1c307||https://vulncheck.com/xdb/8867c4e1c307 , https://vulncheck.com/xdb/94a06b6dd90b||https://vulncheck.com/xdb/94a06b6dd90b , https://vulncheck.com/xdb/19daa216be3e||https://vulncheck.com/xdb/19daa216be3e , https://vulncheck.com/xdb/8818ad910e2f||https://vulncheck.com/xdb/8818ad910e2f , https://vulncheck.com/xdb/bce26bf9a7db||https://vulncheck.com/xdb/bce26bf9a7db , https://vulncheck.com/xdb/96f1c731b1dc||https://vulncheck.com/xdb/96f1c731b1dc , https://vulncheck.com/xdb/7f994d193496||https://vulncheck.com/xdb/7f994d193496 , https://vulncheck.com/xdb/85f36fa22d39||https://vulncheck.com/xdb/85f36fa22d39 , https://vulncheck.com/xdb/a4cf0cfa21f6||https://vulncheck.com/xdb/a4cf0cfa21f6 , https://vulncheck.com/xdb/bb58b7001b1f||https://vulncheck.com/xdb/bb58b7001b1f , https://vulncheck.com/xdb/b598961f144e||https://vulncheck.com/xdb/b598961f144e , https://vulncheck.com/xdb/809430868585||https://vulncheck.com/xdb/809430868585 , https://vulncheck.com/xdb/846a361d532a||https://vulncheck.com/xdb/846a361d532a , https://vulncheck.com/xdb/56fc1e32325a||https://vulncheck.com/xdb/56fc1e32325a , https://vulncheck.com/xdb/e53c96b7f8c4||https://vulncheck.com/xdb/e53c96b7f8c4 , https://vulncheck.com/xdb/d0972a06acee||https://vulncheck.com/xdb/d0972a06acee , https://vulncheck.com/xdb/ff16564070fa||https://vulncheck.com/xdb/ff16564070fa | ||
CVE-2021-27561 | Yealink | Device Management | 11/03/2021 | 0.94106 | 9.8 | https://viz.greynoise.io/tag/yealink-device-management-rce-attempt||https://viz.greynoise.io/tag/yealink-device-management-rce-attempt | 2 | FALSE | FALSE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2021-27561 | ||
CVE-2021-1782 | Apple | Multiple Products | 11/03/2021 | 0.07419 | 7.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1782 | https://vulncheck.com/xdb/5d442d6d99aa | |||
CVE-2020-10148 | SolarWinds | Orion | 11/03/2021 | 0.94345 | 9.8 | https://viz.greynoise.io/tag/solarwinds-orion-api-authentication-bypass-attempt||https://viz.greynoise.io/tag/solarwinds-orion-api-authentication-bypass-attempt | 2 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10148 | https://vulncheck.com/xdb/95b8cd641b31||https://vulncheck.com/xdb/95b8cd641b31 , https://vulncheck.com/xdb/90c4b509e3c2||https://vulncheck.com/xdb/90c4b509e3c2 | |
CVE-2021-38649 | Microsoft | Open Management Infrastructure (OMI) | 11/03/2021 | 0.20227 | 7.0 | https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38649 | |||
CVE-2021-40539 | Zoho | ManageEngine | 11/03/2021 | 0.94424 | 9.8 | https://viz.greynoise.io/tag/zoho-manageengine-rce-check||https://viz.greynoise.io/tag/zoho-manageengine-rce-check , https://viz.greynoise.io/tag/zoho-manageengine-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-rce-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-40539 | https://vulncheck.com/xdb/9c5da6b32721||https://vulncheck.com/xdb/9c5da6b32721 , https://vulncheck.com/xdb/7e476fa6ce71||https://vulncheck.com/xdb/7e476fa6ce71 , https://vulncheck.com/xdb/512a715c6eb9||https://vulncheck.com/xdb/512a715c6eb9 , https://vulncheck.com/xdb/a29bf4bbff47||https://vulncheck.com/xdb/a29bf4bbff47 | |
CVE-2020-25213 | WordPress | File Manager Plugin | 11/03/2021 | 0.94420 | 10.0 | https://viz.greynoise.io/tag/wordpress-file-manager-plugin-rce-attempt||https://viz.greynoise.io/tag/wordpress-file-manager-plugin-rce-attempt | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-25213 | https://vulncheck.com/xdb/989ad429d25b||https://vulncheck.com/xdb/989ad429d25b , https://vulncheck.com/xdb/eaec3e2b975b||https://vulncheck.com/xdb/eaec3e2b975b , https://vulncheck.com/xdb/669397d52e31||https://vulncheck.com/xdb/669397d52e31 , https://vulncheck.com/xdb/39148855248e||https://vulncheck.com/xdb/39148855248e | |
CVE-2021-1498 | Cisco | HyperFlex HX | 11/03/2021 | 0.94059 | 9.8 | https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt , https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1498 | |||
CVE-2021-30858 | Apple | iOS, iPadOS, and macOS | 11/03/2021 | 0.01026 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30858 | https://vulncheck.com/xdb/44738a8de35b||https://vulncheck.com/xdb/44738a8de35b , https://vulncheck.com/xdb/5a806de612f9||https://vulncheck.com/xdb/5a806de612f9 | |||
CVE-2020-15505 | Ivanti | MobileIron Multiple Products | 11/03/2021 | 0.94388 | 9.8 | https://viz.greynoise.io/tag/mobileiron-rce-vuln-check||https://viz.greynoise.io/tag/mobileiron-rce-vuln-check , https://viz.greynoise.io/tag/mobileiron-rce-attempt||https://viz.greynoise.io/tag/mobileiron-rce-attempt | 4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-15505 | https://vulncheck.com/xdb/45aadad7e394 | |
CVE-2021-30761 | Apple | iOS | 11/03/2021 | 0.00413 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30761 | ||||
CVE-2018-15961 | Adobe | ColdFusion | 11/03/2021 | 0.94396 | 9.8 | https://viz.greynoise.io/tag/adobe-coldfusion-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-attempt | 3 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-15961 | https://vulncheck.com/xdb/30b10a753cfb||https://vulncheck.com/xdb/30b10a753cfb , https://vulncheck.com/xdb/2064f6e531de||https://vulncheck.com/xdb/2064f6e531de , https://vulncheck.com/xdb/82ee6a663df4||https://vulncheck.com/xdb/82ee6a663df4 , https://vulncheck.com/xdb/4b30bcb1fa25||https://vulncheck.com/xdb/4b30bcb1fa25 | |
CVE-2020-14882 | Oracle | WebLogic Server | 11/03/2021 | 0.94454 | 9.8 | https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt | 4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-14882 | https://vulncheck.com/xdb/ee66647244c0||https://vulncheck.com/xdb/ee66647244c0 , https://vulncheck.com/xdb/ce68066c259e||https://vulncheck.com/xdb/ce68066c259e , https://vulncheck.com/xdb/263de78f8cf4||https://vulncheck.com/xdb/263de78f8cf4 , https://vulncheck.com/xdb/72df0e276603||https://vulncheck.com/xdb/72df0e276603 , https://vulncheck.com/xdb/65ab3b9c2eba||https://vulncheck.com/xdb/65ab3b9c2eba , https://vulncheck.com/xdb/9476c651d5c0||https://vulncheck.com/xdb/9476c651d5c0 , https://vulncheck.com/xdb/1219b099cdb5||https://vulncheck.com/xdb/1219b099cdb5 , https://vulncheck.com/xdb/2539687dc0ee||https://vulncheck.com/xdb/2539687dc0ee , https://vulncheck.com/xdb/0973a77bd68e||https://vulncheck.com/xdb/0973a77bd68e , https://vulncheck.com/xdb/358f9960e478||https://vulncheck.com/xdb/358f9960e478 , https://vulncheck.com/xdb/1bc750482298||https://vulncheck.com/xdb/1bc750482298 , https://vulncheck.com/xdb/5adef887fb7e||https://vulncheck.com/xdb/5adef887fb7e , https://vulncheck.com/xdb/78305831909c||https://vulncheck.com/xdb/78305831909c , https://vulncheck.com/xdb/fb1c79c789bd||https://vulncheck.com/xdb/fb1c79c789bd , https://vulncheck.com/xdb/49e9f36f16d8||https://vulncheck.com/xdb/49e9f36f16d8 , https://vulncheck.com/xdb/91590177ee0d||https://vulncheck.com/xdb/91590177ee0d , https://vulncheck.com/xdb/038d453cd70d||https://vulncheck.com/xdb/038d453cd70d , https://vulncheck.com/xdb/3b3ffa595f0c||https://vulncheck.com/xdb/3b3ffa595f0c , https://vulncheck.com/xdb/a0b529fd1da1||https://vulncheck.com/xdb/a0b529fd1da1 , https://vulncheck.com/xdb/0b1c82ba94b9||https://vulncheck.com/xdb/0b1c82ba94b9 , https://vulncheck.com/xdb/7c45f41c9580||https://vulncheck.com/xdb/7c45f41c9580 , https://vulncheck.com/xdb/d3a3f91fa307||https://vulncheck.com/xdb/d3a3f91fa307 , https://vulncheck.com/xdb/179b4fcf93ef||https://vulncheck.com/xdb/179b4fcf93ef , https://vulncheck.com/xdb/7abe5b874cdf||https://vulncheck.com/xdb/7abe5b874cdf , https://vulncheck.com/xdb/c13d71ba7622||https://vulncheck.com/xdb/c13d71ba7622 , https://vulncheck.com/xdb/7232b7797539||https://vulncheck.com/xdb/7232b7797539 , https://vulncheck.com/xdb/da9f3f6e7e1f||https://vulncheck.com/xdb/da9f3f6e7e1f , https://vulncheck.com/xdb/e962ac877371||https://vulncheck.com/xdb/e962ac877371 , https://vulncheck.com/xdb/c05a01763211||https://vulncheck.com/xdb/c05a01763211 , https://vulncheck.com/xdb/59c38bcb5664||https://vulncheck.com/xdb/59c38bcb5664 , https://vulncheck.com/xdb/8035aa262c64||https://vulncheck.com/xdb/8035aa262c64 , https://vulncheck.com/xdb/b539b7bd0520||https://vulncheck.com/xdb/b539b7bd0520 , https://vulncheck.com/xdb/8270081cbc20||https://vulncheck.com/xdb/8270081cbc20 , https://vulncheck.com/xdb/a13fcf8de8fc||https://vulncheck.com/xdb/a13fcf8de8fc , https://vulncheck.com/xdb/5f6f99d250bd||https://vulncheck.com/xdb/5f6f99d250bd | |
CVE-2021-30551 | Chromium V8 | 11/03/2021 | 0.76954 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30551 | https://vulncheck.com/xdb/82e25211c4d6 | ||||
CVE-2021-30663 | Apple | Multiple Products | 11/03/2021 | 0.00215 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30663 | ||||
CVE-2021-30661 | Apple | Multiple Products | 11/03/2021 | 0.00218 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30661 | ||||
CVE-2021-20022 | SonicWall | SonicWall Email Security | 11/03/2021 | 0.46261 | 7.2 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20022 | ||||
CVE-2019-8394 | Zoho | ManageEngine | 11/03/2021 | 0.87936 | 6.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-8394 | ||||
CVE-2021-23874 | McAfee | McAfee Total Protection (MTP) | 11/03/2021 | 0.00833 | 8.2 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-23874 | ||||
CVE-2020-1380 | Microsoft | Internet Explorer | 11/03/2021 | 0.86305 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1380 | ||||
CVE-2021-35464 | ForgeRock | Access Management (AM) | 11/03/2021 | 0.94386 | 9.8 | https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-vuln-check||https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-vuln-check , https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-attempt||https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-attempt | 2 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-35464 | https://vulncheck.com/xdb/aaf393a9e76d||https://vulncheck.com/xdb/aaf393a9e76d , https://vulncheck.com/xdb/19031593f3fb||https://vulncheck.com/xdb/19031593f3fb | |
CVE-2019-13608 | Citrix | StoreFront Server | 11/03/2021 | 0.29403 | 7.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-13608 | ||||
CVE-2020-0041 | Android | Android Kernel | 11/03/2021 | 0.22373 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0041 | https://vulncheck.com/xdb/c2368cc50b93||https://vulncheck.com/xdb/c2368cc50b93 , https://vulncheck.com/xdb/95ece15b5070||https://vulncheck.com/xdb/95ece15b5070 , https://vulncheck.com/xdb/b8a8ac784158||https://vulncheck.com/xdb/b8a8ac784158 | |||
CVE-2020-8644 | PlaySMS | PlaySMS | 11/03/2021 | 0.93305 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8644 | https://vulncheck.com/xdb/7f9ab9f4fabb | |||
CVE-2018-4878 | Adobe | Flash Player | 11/03/2021 | 0.93326 | 9.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-4878 | https://vulncheck.com/xdb/a06e4b00cea1||https://vulncheck.com/xdb/a06e4b00cea1 , https://vulncheck.com/xdb/b5e2c274615b||https://vulncheck.com/xdb/b5e2c274615b , https://vulncheck.com/xdb/b0c5ef430944||https://vulncheck.com/xdb/b0c5ef430944 , https://vulncheck.com/xdb/e9db4ff1ab08||https://vulncheck.com/xdb/e9db4ff1ab08 , https://vulncheck.com/xdb/75f0db8b4ce5||https://vulncheck.com/xdb/75f0db8b4ce5 , https://vulncheck.com/xdb/e84f85632f4d||https://vulncheck.com/xdb/e84f85632f4d , https://vulncheck.com/xdb/b960fd82858a||https://vulncheck.com/xdb/b960fd82858a , https://vulncheck.com/xdb/89973b88277b||https://vulncheck.com/xdb/89973b88277b | |||
CVE-2020-8655 | EyesOfNetwork | EyesOfNetwork | 11/03/2021 | 0.84094 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8655 | https://vulncheck.com/xdb/743d1c5492ba | |||
CVE-2020-10221 | rConfig | rConfig | 11/03/2021 | 0.90366 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10221 | ||||
CVE-2020-6418 | Chromium V8 | 11/03/2021 | 0.84596 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-6418 | https://vulncheck.com/xdb/68df06773b3b||https://vulncheck.com/xdb/68df06773b3b , https://vulncheck.com/xdb/f153146b6e74||https://vulncheck.com/xdb/f153146b6e74 , https://vulncheck.com/xdb/09aef40e5781||https://vulncheck.com/xdb/09aef40e5781 | ||||
CVE-2020-10189 | Zoho | ManageEngine | 11/03/2021 | 0.94248 | 9.8 | 4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10189 | https://vulncheck.com/xdb/5eb1a844d5f5 | ||
CVE-2020-8195 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | 11/03/2021 | 0.85271 | 6.5 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8195 | ||||
CVE-2020-1464 | Microsoft | Windows | 11/03/2021 | 0.05831 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1464 | ||||
CVE-2020-1350 | Microsoft | Windows | 11/03/2021 | 0.93577 | 10.0 | FALSE | TRUE | FALSE | Reference CISA's ED 20-03 (https://www.cisa.gov/news-events/directives/ed-20-03-mitigate-windows-dns-server-remote-code-execution-vulnerability-july-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-03. https://nvd.nist.gov/vuln/detail/CVE-2020-1350 | https://vulncheck.com/xdb/352dbf3a9e75||https://vulncheck.com/xdb/352dbf3a9e75 , https://vulncheck.com/xdb/5f894c317342||https://vulncheck.com/xdb/5f894c317342 , https://vulncheck.com/xdb/51b1a2bf598f||https://vulncheck.com/xdb/51b1a2bf598f , https://vulncheck.com/xdb/25e55fac1438||https://vulncheck.com/xdb/25e55fac1438 , https://vulncheck.com/xdb/7caf699a1681||https://vulncheck.com/xdb/7caf699a1681 , https://vulncheck.com/xdb/76424953d73e||https://vulncheck.com/xdb/76424953d73e , https://vulncheck.com/xdb/98fbd62a7f31||https://vulncheck.com/xdb/98fbd62a7f31 | |||
CVE-2020-16009 | Chromium V8 | 11/03/2021 | 0.80718 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-16009 | |||||
CVE-2019-11580 | Atlassian | Crowd and Crowd Data Center | 11/03/2021 | 0.94406 | 9.8 | https://viz.greynoise.io/tag/atlassian-crowd-remote-code-execution-attempt||https://viz.greynoise.io/tag/atlassian-crowd-remote-code-execution-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-11580 | https://vulncheck.com/xdb/acc7c542752b||https://vulncheck.com/xdb/acc7c542752b , https://vulncheck.com/xdb/82ed45a27b08||https://vulncheck.com/xdb/82ed45a27b08 , https://vulncheck.com/xdb/841b26515764||https://vulncheck.com/xdb/841b26515764 , https://vulncheck.com/xdb/c2f1ca456ea3||https://vulncheck.com/xdb/c2f1ca456ea3 | |
CVE-2020-27950 | Apple | Multiple Products | 11/03/2021 | 0.37741 | 5.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-27950 | https://vulncheck.com/xdb/3f008773d321||https://vulncheck.com/xdb/3f008773d321 , https://vulncheck.com/xdb/f02168cd5ede||https://vulncheck.com/xdb/f02168cd5ede , https://vulncheck.com/xdb/30d794c9b6ce||https://vulncheck.com/xdb/30d794c9b6ce | |||
CVE-2021-30657 | Apple | macOS | 11/03/2021 | 0.75513 | 5.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30657 | https://vulncheck.com/xdb/5a5cb257b016 | |||
CVE-2017-9248 | Progress | ASP.NET AJAX and Sitefinity | 11/03/2021 | 0.85305 | 9.8 | https://viz.greynoise.io/tag/telerik-ui-information-disclosure-vuln-check||https://viz.greynoise.io/tag/telerik-ui-information-disclosure-vuln-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-9248 | https://vulncheck.com/xdb/2e3387e756d8||https://vulncheck.com/xdb/2e3387e756d8 , https://vulncheck.com/xdb/0c5d66215a26||https://vulncheck.com/xdb/0c5d66215a26 , https://vulncheck.com/xdb/369fcaab6d25||https://vulncheck.com/xdb/369fcaab6d25 , https://vulncheck.com/xdb/cbd541a8cca4||https://vulncheck.com/xdb/cbd541a8cca4 , https://vulncheck.com/xdb/77f3f6d6f643||https://vulncheck.com/xdb/77f3f6d6f643 , https://vulncheck.com/xdb/54d9b4e7ea66||https://vulncheck.com/xdb/54d9b4e7ea66 , https://vulncheck.com/xdb/89ae1abf1d84||https://vulncheck.com/xdb/89ae1abf1d84 | ||
CVE-2020-1040 | Microsoft | Hyper-V RemoteFX | 11/03/2021 | 0.00314 | 9.0 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1040 | ||||
CVE-2020-4428 | IBM | Data Risk Manager | 11/03/2021 | 0.48308 | 9.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-4428 | ||||
CVE-2020-10181 | Sumavision | Enhanced Multimedia Router (EMR) | 11/03/2021 | 0.29896 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-10181 | ||||
CVE-2021-26084 | Atlassian | Confluence Server and Data Center | 11/03/2021 | 0.94437 | 9.8 | https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-attempt , https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-vuln-check||https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-vuln-check | 5 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-26084 | https://vulncheck.com/xdb/93070dc771b1||https://vulncheck.com/xdb/93070dc771b1 , https://vulncheck.com/xdb/5c17feb787aa||https://vulncheck.com/xdb/5c17feb787aa , https://vulncheck.com/xdb/01737250181e||https://vulncheck.com/xdb/01737250181e , https://vulncheck.com/xdb/63829d0fe9e7||https://vulncheck.com/xdb/63829d0fe9e7 , https://vulncheck.com/xdb/631e95d7b76d||https://vulncheck.com/xdb/631e95d7b76d , https://vulncheck.com/xdb/d646562bd095||https://vulncheck.com/xdb/d646562bd095 , https://vulncheck.com/xdb/8be80a290f5d||https://vulncheck.com/xdb/8be80a290f5d , https://vulncheck.com/xdb/2bffe1a2b81e||https://vulncheck.com/xdb/2bffe1a2b81e , https://vulncheck.com/xdb/6a9526ec7989||https://vulncheck.com/xdb/6a9526ec7989 , https://vulncheck.com/xdb/ed3988e8b8c4||https://vulncheck.com/xdb/ed3988e8b8c4 , https://vulncheck.com/xdb/c8f148869b4d||https://vulncheck.com/xdb/c8f148869b4d , https://vulncheck.com/xdb/9ebbdbc964c1||https://vulncheck.com/xdb/9ebbdbc964c1 , https://vulncheck.com/xdb/cc01e52836c0||https://vulncheck.com/xdb/cc01e52836c0 , https://vulncheck.com/xdb/905f9ba1f0cc||https://vulncheck.com/xdb/905f9ba1f0cc , https://vulncheck.com/xdb/68069c40edf2||https://vulncheck.com/xdb/68069c40edf2 , https://vulncheck.com/xdb/a406fe433633||https://vulncheck.com/xdb/a406fe433633 , https://vulncheck.com/xdb/527ea731c62f||https://vulncheck.com/xdb/527ea731c62f , https://vulncheck.com/xdb/9c5a5da647e7||https://vulncheck.com/xdb/9c5a5da647e7 , https://vulncheck.com/xdb/da4f3471f7d5||https://vulncheck.com/xdb/da4f3471f7d5 , https://vulncheck.com/xdb/3e2ccb0c6937||https://vulncheck.com/xdb/3e2ccb0c6937 , https://vulncheck.com/xdb/8b9e22d2ce4a||https://vulncheck.com/xdb/8b9e22d2ce4a , https://vulncheck.com/xdb/fc81f3df4a7f||https://vulncheck.com/xdb/fc81f3df4a7f , https://vulncheck.com/xdb/40de1a55603f||https://vulncheck.com/xdb/40de1a55603f , https://vulncheck.com/xdb/0c50354d6f93||https://vulncheck.com/xdb/0c50354d6f93 | |
CVE-2020-0688 | Microsoft | Exchange Server | 11/03/2021 | 0.94418 | 8.8 | https://viz.greynoise.io/tag/exchange-memory-corruption-rce-attempt||https://viz.greynoise.io/tag/exchange-memory-corruption-rce-attempt | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0688 | https://vulncheck.com/xdb/ac5f11e6a30d||https://vulncheck.com/xdb/ac5f11e6a30d , https://vulncheck.com/xdb/ab48dae2440a||https://vulncheck.com/xdb/ab48dae2440a , https://vulncheck.com/xdb/f58d70470909||https://vulncheck.com/xdb/f58d70470909 , https://vulncheck.com/xdb/96c707bb39f5||https://vulncheck.com/xdb/96c707bb39f5 , https://vulncheck.com/xdb/868234a5c9b7||https://vulncheck.com/xdb/868234a5c9b7 , https://vulncheck.com/xdb/ed6eb904124b||https://vulncheck.com/xdb/ed6eb904124b , https://vulncheck.com/xdb/1fe8a75efd31||https://vulncheck.com/xdb/1fe8a75efd31 , https://vulncheck.com/xdb/42b75e809382||https://vulncheck.com/xdb/42b75e809382 , https://vulncheck.com/xdb/e502b8576da7||https://vulncheck.com/xdb/e502b8576da7 , https://vulncheck.com/xdb/730fc9157ab0||https://vulncheck.com/xdb/730fc9157ab0 , https://vulncheck.com/xdb/c2dc4dbb6f66||https://vulncheck.com/xdb/c2dc4dbb6f66 , https://vulncheck.com/xdb/7f793deb1114||https://vulncheck.com/xdb/7f793deb1114 , https://vulncheck.com/xdb/05c78c55c273||https://vulncheck.com/xdb/05c78c55c273 , https://vulncheck.com/xdb/8a20e8eac65d||https://vulncheck.com/xdb/8a20e8eac65d | ||
CVE-2020-8468 | Trend Micro | Apex One, OfficeScan and Worry-Free Business Security Agents | 11/03/2021 | 0.04484 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8468 | ||||
CVE-2020-0683 | Microsoft | Windows | 11/03/2021 | 0.32718 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0683 | https://vulncheck.com/xdb/e62d999afd19||https://vulncheck.com/xdb/e62d999afd19 , https://vulncheck.com/xdb/a3d5574cb924||https://vulncheck.com/xdb/a3d5574cb924 , https://vulncheck.com/xdb/d9a4a6ac4c63||https://vulncheck.com/xdb/d9a4a6ac4c63 | |||
CVE-2016-3235 | Microsoft | Office | 11/03/2021 | 0.85808 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3235 | ||||
CVE-2021-38003 | Chromium V8 | 11/03/2021 | 0.76400 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-38003 | https://vulncheck.com/xdb/1a0b1ef4a809||https://vulncheck.com/xdb/1a0b1ef4a809 , https://vulncheck.com/xdb/72c3951ee77e||https://vulncheck.com/xdb/72c3951ee77e | ||||
CVE-2018-20062 | ThinkPHP | noneCms | 11/03/2021 | 0.94306 | 9.8 | 0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-20062 | https://vulncheck.com/xdb/b3f4b7a0b588||https://vulncheck.com/xdb/b3f4b7a0b588 , https://vulncheck.com/xdb/5c5fbabe0573||https://vulncheck.com/xdb/5c5fbabe0573 | ||
CVE-2021-31955 | Microsoft | Windows | 11/03/2021 | 0.14639 | 5.5 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-31955 | https://vulncheck.com/xdb/7188402bf1ec | |||
CVE-2016-0185 | Microsoft | Windows | 11/03/2021 | 0.82752 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-0185 | ||||
CVE-2021-34527 | Microsoft | Windows | 11/03/2021 | 0.94265 | 8.8 | TRUE | TRUE | FALSE | Reference CISA's ED 21-04 (https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-spooler-service-vulnerability) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527 | https://vulncheck.com/xdb/aafd327559cb||https://vulncheck.com/xdb/aafd327559cb , https://vulncheck.com/xdb/0544e277335e||https://vulncheck.com/xdb/0544e277335e , https://vulncheck.com/xdb/94dfa232ad84||https://vulncheck.com/xdb/94dfa232ad84 , https://vulncheck.com/xdb/66146f087766||https://vulncheck.com/xdb/66146f087766 , https://vulncheck.com/xdb/8b8ea9fe1124||https://vulncheck.com/xdb/8b8ea9fe1124 , https://vulncheck.com/xdb/f06e206bb116||https://vulncheck.com/xdb/f06e206bb116 , https://vulncheck.com/xdb/a9a05728c824||https://vulncheck.com/xdb/a9a05728c824 , https://vulncheck.com/xdb/f4a2f262c1e1||https://vulncheck.com/xdb/f4a2f262c1e1 , https://vulncheck.com/xdb/161c77693a74||https://vulncheck.com/xdb/161c77693a74 , https://vulncheck.com/xdb/236b4901d545||https://vulncheck.com/xdb/236b4901d545 | |||
CVE-2020-3161 | Cisco | Cisco IP Phones | 11/03/2021 | 0.80825 | 9.8 | https://viz.greynoise.io/tag/cisco-ip-phones-stack-overflow-cve-2020-3161-attempt||https://viz.greynoise.io/tag/cisco-ip-phones-stack-overflow-cve-2020-3161-attempt | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3161 | https://vulncheck.com/xdb/683ddbd88289 | ||
CVE-2012-3152 | Oracle | Fusion Middleware | 11/03/2021 | 0.91310 | 9.1 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2012-3152 | ||||
CVE-2020-11652 | SaltStack | Salt | 11/03/2021 | 0.94200 | 6.5 | https://viz.greynoise.io/tag/saltstack-scanner||https://viz.greynoise.io/tag/saltstack-scanner | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-11652 | https://vulncheck.com/xdb/a45373fdc023||https://vulncheck.com/xdb/a45373fdc023 , https://vulncheck.com/xdb/11b5248fe04c||https://vulncheck.com/xdb/11b5248fe04c , https://vulncheck.com/xdb/d9b31f42dc98||https://vulncheck.com/xdb/d9b31f42dc98 , https://vulncheck.com/xdb/d7a39011635d||https://vulncheck.com/xdb/d7a39011635d , https://vulncheck.com/xdb/d28267b60453||https://vulncheck.com/xdb/d28267b60453 , https://vulncheck.com/xdb/5840ac3783ac||https://vulncheck.com/xdb/5840ac3783ac , https://vulncheck.com/xdb/cf1bedb2b8aa||https://vulncheck.com/xdb/cf1bedb2b8aa | ||
CVE-2019-19781 | Citrix | Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance | 11/03/2021 | 0.94442 | 9.8 | https://viz.greynoise.io/tag/citrix-netscaler-lfi-attempt||https://viz.greynoise.io/tag/citrix-netscaler-lfi-attempt | 8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-19781 | https://vulncheck.com/xdb/88021ad0e77b||https://vulncheck.com/xdb/88021ad0e77b , https://vulncheck.com/xdb/103163214ca9||https://vulncheck.com/xdb/103163214ca9 , https://vulncheck.com/xdb/eea607d2d8a4||https://vulncheck.com/xdb/eea607d2d8a4 , https://vulncheck.com/xdb/69c8311e600c||https://vulncheck.com/xdb/69c8311e600c , https://vulncheck.com/xdb/d55aabb8e817||https://vulncheck.com/xdb/d55aabb8e817 , https://vulncheck.com/xdb/d61ce8c7068d||https://vulncheck.com/xdb/d61ce8c7068d , https://vulncheck.com/xdb/224739a35737||https://vulncheck.com/xdb/224739a35737 , https://vulncheck.com/xdb/03c8862d3d11||https://vulncheck.com/xdb/03c8862d3d11 , https://vulncheck.com/xdb/987910f7a39d||https://vulncheck.com/xdb/987910f7a39d , https://vulncheck.com/xdb/1b40df6017f7||https://vulncheck.com/xdb/1b40df6017f7 , https://vulncheck.com/xdb/5ebd889262c7||https://vulncheck.com/xdb/5ebd889262c7 , https://vulncheck.com/xdb/7ab2e8a707c8||https://vulncheck.com/xdb/7ab2e8a707c8 , https://vulncheck.com/xdb/bd1a9acc8fcf||https://vulncheck.com/xdb/bd1a9acc8fcf , https://vulncheck.com/xdb/8d2aa3944ef3||https://vulncheck.com/xdb/8d2aa3944ef3 , https://vulncheck.com/xdb/553ce4defd35||https://vulncheck.com/xdb/553ce4defd35 , https://vulncheck.com/xdb/34b27d809743||https://vulncheck.com/xdb/34b27d809743 , https://vulncheck.com/xdb/f3b2f3994c60||https://vulncheck.com/xdb/f3b2f3994c60 , https://vulncheck.com/xdb/f641370d0cf1||https://vulncheck.com/xdb/f641370d0cf1 , https://vulncheck.com/xdb/5daef00ab695||https://vulncheck.com/xdb/5daef00ab695 , https://vulncheck.com/xdb/0b44b71192dd||https://vulncheck.com/xdb/0b44b71192dd , https://vulncheck.com/xdb/02742865c3b9||https://vulncheck.com/xdb/02742865c3b9 , https://vulncheck.com/xdb/f2880bad85d1||https://vulncheck.com/xdb/f2880bad85d1 , https://vulncheck.com/xdb/ebfe92f86902||https://vulncheck.com/xdb/ebfe92f86902 | |
CVE-2018-7600 | Drupal | Drupal Core | 11/03/2021 | 0.94489 | 9.8 | https://viz.greynoise.io/tag/drupal-rce-attempt||https://viz.greynoise.io/tag/drupal-rce-attempt | 4 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-7600 | https://vulncheck.com/xdb/0f9b4b5c3fdd||https://vulncheck.com/xdb/0f9b4b5c3fdd , https://vulncheck.com/xdb/6210c8efb8c0||https://vulncheck.com/xdb/6210c8efb8c0 , https://vulncheck.com/xdb/1df8d0e011f7||https://vulncheck.com/xdb/1df8d0e011f7 , https://vulncheck.com/xdb/06e3c416c2d9||https://vulncheck.com/xdb/06e3c416c2d9 , https://vulncheck.com/xdb/62fa544a97dc||https://vulncheck.com/xdb/62fa544a97dc , https://vulncheck.com/xdb/020a6d58ef57||https://vulncheck.com/xdb/020a6d58ef57 , https://vulncheck.com/xdb/c878141c1b57||https://vulncheck.com/xdb/c878141c1b57 , https://vulncheck.com/xdb/e07a02c6c680||https://vulncheck.com/xdb/e07a02c6c680 , https://vulncheck.com/xdb/2cb73a6f32d0||https://vulncheck.com/xdb/2cb73a6f32d0 , https://vulncheck.com/xdb/8bb18d909af8||https://vulncheck.com/xdb/8bb18d909af8 , https://vulncheck.com/xdb/f6840124d312||https://vulncheck.com/xdb/f6840124d312 , https://vulncheck.com/xdb/c7637bac32d5||https://vulncheck.com/xdb/c7637bac32d5 , https://vulncheck.com/xdb/70444c690e44||https://vulncheck.com/xdb/70444c690e44 , https://vulncheck.com/xdb/b2ad4ba89de6||https://vulncheck.com/xdb/b2ad4ba89de6 , https://vulncheck.com/xdb/464985de7ded||https://vulncheck.com/xdb/464985de7ded , https://vulncheck.com/xdb/e00c4f0f2628||https://vulncheck.com/xdb/e00c4f0f2628 , https://vulncheck.com/xdb/49097e1fdbbb||https://vulncheck.com/xdb/49097e1fdbbb , https://vulncheck.com/xdb/6f85920c0670||https://vulncheck.com/xdb/6f85920c0670 , https://vulncheck.com/xdb/d4d58bdc2983||https://vulncheck.com/xdb/d4d58bdc2983 , https://vulncheck.com/xdb/d1a4b59d693c||https://vulncheck.com/xdb/d1a4b59d693c , https://vulncheck.com/xdb/9b1b9ea4c421||https://vulncheck.com/xdb/9b1b9ea4c421 , https://vulncheck.com/xdb/36d1b1902163||https://vulncheck.com/xdb/36d1b1902163 , https://vulncheck.com/xdb/4649e1e3eb49||https://vulncheck.com/xdb/4649e1e3eb49 , https://vulncheck.com/xdb/0bef2689fa42||https://vulncheck.com/xdb/0bef2689fa42 , https://vulncheck.com/xdb/e104ec642cd7||https://vulncheck.com/xdb/e104ec642cd7 , https://vulncheck.com/xdb/275e04b88ebe||https://vulncheck.com/xdb/275e04b88ebe , https://vulncheck.com/xdb/ccc6bd53fd2b||https://vulncheck.com/xdb/ccc6bd53fd2b , https://vulncheck.com/xdb/18441ff73017||https://vulncheck.com/xdb/18441ff73017 , https://vulncheck.com/xdb/8fd9c335c455||https://vulncheck.com/xdb/8fd9c335c455 , https://vulncheck.com/xdb/2c29ea901266||https://vulncheck.com/xdb/2c29ea901266 , https://vulncheck.com/xdb/a91d4aaab05c||https://vulncheck.com/xdb/a91d4aaab05c , https://vulncheck.com/xdb/85edc13d35ba||https://vulncheck.com/xdb/85edc13d35ba , https://vulncheck.com/xdb/53767629a229||https://vulncheck.com/xdb/53767629a229 | |
CVE-2020-5847 | Unraid | Unraid | 11/03/2021 | 0.93510 | 9.8 | https://viz.greynoise.io/tag/unraid-unauth-rce-attempt||https://viz.greynoise.io/tag/unraid-unauth-rce-attempt , https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check||https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check | 2 | FALSE | TRUE | TRUE | https://nvd.nist.gov/vuln/detail/CVE-2020-5847 | ||
CVE-2019-17026 | Mozilla | Firefox and Thunderbird | 11/03/2021 | 0.42007 | 8.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-17026 | https://vulncheck.com/xdb/3ff9de1f6fb7||https://vulncheck.com/xdb/3ff9de1f6fb7 , https://vulncheck.com/xdb/1c3f5236eacb||https://vulncheck.com/xdb/1c3f5236eacb | |||
CVE-2016-4437 | Apache | Shiro | 11/03/2021 | 0.94303 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-4437 | https://vulncheck.com/xdb/c53d22555992||https://vulncheck.com/xdb/c53d22555992 , https://vulncheck.com/xdb/6535af761e5c||https://vulncheck.com/xdb/6535af761e5c , https://vulncheck.com/xdb/d7a43fa66a9e||https://vulncheck.com/xdb/d7a43fa66a9e , https://vulncheck.com/xdb/67abb858193d||https://vulncheck.com/xdb/67abb858193d | |||
CVE-2020-0878 | Microsoft | Edge and Internet Explorer | 11/03/2021 | 0.23317 | 4.2 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0878 | ||||
CVE-2021-1675 | Microsoft | Windows | 11/03/2021 | 0.94349 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-1675 | https://vulncheck.com/xdb/381c98d00dfc||https://vulncheck.com/xdb/381c98d00dfc , https://vulncheck.com/xdb/fd141cadfdd9||https://vulncheck.com/xdb/fd141cadfdd9 , https://vulncheck.com/xdb/debfb4d8ee62||https://vulncheck.com/xdb/debfb4d8ee62 , https://vulncheck.com/xdb/5761c571065d||https://vulncheck.com/xdb/5761c571065d , https://vulncheck.com/xdb/a3f29455981b||https://vulncheck.com/xdb/a3f29455981b , https://vulncheck.com/xdb/b2ee9973a014||https://vulncheck.com/xdb/b2ee9973a014 , https://vulncheck.com/xdb/b90c284dc523||https://vulncheck.com/xdb/b90c284dc523 , https://vulncheck.com/xdb/6365096d731b||https://vulncheck.com/xdb/6365096d731b , https://vulncheck.com/xdb/a45b8faa5940||https://vulncheck.com/xdb/a45b8faa5940 , https://vulncheck.com/xdb/ea76e3b517da||https://vulncheck.com/xdb/ea76e3b517da , https://vulncheck.com/xdb/22ddb70101f9||https://vulncheck.com/xdb/22ddb70101f9 , https://vulncheck.com/xdb/d01d428e5b4c||https://vulncheck.com/xdb/d01d428e5b4c , https://vulncheck.com/xdb/ddf90bbea093||https://vulncheck.com/xdb/ddf90bbea093 , https://vulncheck.com/xdb/da0d5a88e5db||https://vulncheck.com/xdb/da0d5a88e5db , https://vulncheck.com/xdb/132e026d2027||https://vulncheck.com/xdb/132e026d2027 , https://vulncheck.com/xdb/dcea18151317||https://vulncheck.com/xdb/dcea18151317 , https://vulncheck.com/xdb/3d814c23dd9d||https://vulncheck.com/xdb/3d814c23dd9d , https://vulncheck.com/xdb/a272e3e91f3a||https://vulncheck.com/xdb/a272e3e91f3a , https://vulncheck.com/xdb/ded60e94a061||https://vulncheck.com/xdb/ded60e94a061 , https://vulncheck.com/xdb/0c06ba53c498||https://vulncheck.com/xdb/0c06ba53c498 , https://vulncheck.com/xdb/29f9009b9be9||https://vulncheck.com/xdb/29f9009b9be9 , https://vulncheck.com/xdb/b93501b21b35||https://vulncheck.com/xdb/b93501b21b35 , https://vulncheck.com/xdb/0300146c83c2||https://vulncheck.com/xdb/0300146c83c2 , https://vulncheck.com/xdb/0d51bca37337||https://vulncheck.com/xdb/0d51bca37337 , https://vulncheck.com/xdb/a80f7a9e25f2||https://vulncheck.com/xdb/a80f7a9e25f2 , https://vulncheck.com/xdb/613d6b9bd25f||https://vulncheck.com/xdb/613d6b9bd25f , https://vulncheck.com/xdb/490a73431a10||https://vulncheck.com/xdb/490a73431a10 , https://vulncheck.com/xdb/7cc2f4d6f2d5||https://vulncheck.com/xdb/7cc2f4d6f2d5 , https://vulncheck.com/xdb/462712fb0096||https://vulncheck.com/xdb/462712fb0096 , https://vulncheck.com/xdb/97af0436c96d||https://vulncheck.com/xdb/97af0436c96d , https://vulncheck.com/xdb/ffee1c151af9||https://vulncheck.com/xdb/ffee1c151af9 , https://vulncheck.com/xdb/60402fe4962c||https://vulncheck.com/xdb/60402fe4962c | |||
CVE-2021-21985 | VMware | vCenter Server | 11/03/2021 | 0.94370 | 9.8 | https://viz.greynoise.io/tag/vmware-vsphere-client-rce-vuln-check||https://viz.greynoise.io/tag/vmware-vsphere-client-rce-vuln-check , https://viz.greynoise.io/tag/vmware-vsphere-client-rce-attempt||https://viz.greynoise.io/tag/vmware-vsphere-client-rce-attempt | 3 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21985 | https://vulncheck.com/xdb/743530fc8fc0||https://vulncheck.com/xdb/743530fc8fc0 , https://vulncheck.com/xdb/21b7feee22dd||https://vulncheck.com/xdb/21b7feee22dd , https://vulncheck.com/xdb/8852763d165c||https://vulncheck.com/xdb/8852763d165c , https://vulncheck.com/xdb/ec790bf05bc8||https://vulncheck.com/xdb/ec790bf05bc8 , https://vulncheck.com/xdb/b3a451f18da0||https://vulncheck.com/xdb/b3a451f18da0 , https://vulncheck.com/xdb/f0b52d0eb738||https://vulncheck.com/xdb/f0b52d0eb738 , https://vulncheck.com/xdb/08882943728b||https://vulncheck.com/xdb/08882943728b | |
CVE-2021-20023 | SonicWall | SonicWall Email Security | 11/03/2021 | 0.67205 | 4.9 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-20023 | ||||
CVE-2021-21148 | Chromium V8 | 11/03/2021 | 0.50292 | 8.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-21148 | |||||
CVE-2021-27103 | Accellion | FTA | 11/03/2021 | 0.05462 | 9.8 | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-27103 | ||||
CVE-2020-5849 | Unraid | Unraid | 11/03/2021 | 0.93710 | 7.5 | https://viz.greynoise.io/tag/unraid-unauth-rce-attempt||https://viz.greynoise.io/tag/unraid-unauth-rce-attempt , https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check||https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-5849 | |||
CVE-2020-26919 | NETGEAR | JGS516PE Devices | 11/03/2021 | 0.93066 | 9.8 | https://viz.greynoise.io/tag/netgear-prosafe-plus-remote-command-execution-attempt||https://viz.greynoise.io/tag/netgear-prosafe-plus-remote-command-execution-attempt | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-26919 | |||
CVE-2021-27065 | Microsoft | Exchange Server | 11/03/2021 | 0.94174 | 7.8 | TRUE | TRUE | FALSE | Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-27065 | https://vulncheck.com/xdb/cc79093ff9c5||https://vulncheck.com/xdb/cc79093ff9c5 , https://vulncheck.com/xdb/035cb0a06ecd||https://vulncheck.com/xdb/035cb0a06ecd , https://vulncheck.com/xdb/4440a0603d4e||https://vulncheck.com/xdb/4440a0603d4e | |||
CVE-2021-30860 | Apple | Multiple Products | 11/03/2021 | 0.69382 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30860 | ||||
CVE-2021-30869 | Apple | iOS, iPadOS, and macOS | 11/03/2021 | 0.04229 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-30869 | ||||
CVE-2021-33771 | Microsoft | Windows | 11/03/2021 | 0.01557 | 7.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-33771 | ||||
CVE-2021-36955 | Microsoft | Windows | 11/03/2021 | 0.18971 | 7.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2021-36955 | https://vulncheck.com/xdb/64cb88a140f3 | |||
CVE-2020-0646 | Microsoft | .NET Framework | 11/03/2021 | 0.92775 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-0646 | ||||
CVE-2016-3643 | SolarWinds | Virtualization Manager | 11/03/2021 | 0.06995 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2016-3643 | ||||
CVE-2020-1147 | Microsoft | .NET Framework, SharePoint, Visual Studio | 11/03/2021 | 0.92846 | 7.8 | https://viz.greynoise.io/tag/sharepoint-rce-vuln-check||https://viz.greynoise.io/tag/sharepoint-rce-vuln-check | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-1147 | |||
CVE-2020-17144 | Microsoft | Exchange Server | 11/03/2021 | 0.92223 | 8.4 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-17144 | https://vulncheck.com/xdb/3c6c5d3ca673||https://vulncheck.com/xdb/3c6c5d3ca673 , https://vulncheck.com/xdb/bbc21fba2ce0||https://vulncheck.com/xdb/bbc21fba2ce0 , https://vulncheck.com/xdb/bf12a0733fb9||https://vulncheck.com/xdb/bf12a0733fb9 , https://vulncheck.com/xdb/78f51572c784||https://vulncheck.com/xdb/78f51572c784 , https://vulncheck.com/xdb/72b878cc1c22||https://vulncheck.com/xdb/72b878cc1c22 | |||
CVE-2020-2555 | Oracle | Multiple Products | 11/03/2021 | 0.93183 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-2555 | https://vulncheck.com/xdb/1003dc67ff34||https://vulncheck.com/xdb/1003dc67ff34 , https://vulncheck.com/xdb/e667362e551e||https://vulncheck.com/xdb/e667362e551e , https://vulncheck.com/xdb/2c95cddac1b5||https://vulncheck.com/xdb/2c95cddac1b5 , https://vulncheck.com/xdb/6179b4e1d51c||https://vulncheck.com/xdb/6179b4e1d51c , https://vulncheck.com/xdb/c9e0223955e2||https://vulncheck.com/xdb/c9e0223955e2 , https://vulncheck.com/xdb/322326255843||https://vulncheck.com/xdb/322326255843 , https://vulncheck.com/xdb/235a5c344d3f||https://vulncheck.com/xdb/235a5c344d3f | |||
CVE-2020-3950 | VMware | Multiple Products | 11/03/2021 | 0.09431 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-3950 | ||||
CVE-2020-8599 | Trend Micro | Apex One and OfficeScan | 11/03/2021 | 0.58420 | 9.8 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8599 | ||||
CVE-2020-8657 | EyesOfNetwork | EyesOfNetwork | 11/03/2021 | 0.86143 | 9.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-8657 | ||||
CVE-2020-8260 | Ivanti | Pulse Connect Secure | 11/03/2021 | 0.72598 | 7.2 | TRUE | TRUE | FALSE | Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8260 | ||||
CVE-2020-9819 | Apple | iOS, iPadOS, and watchOS | 11/03/2021 | 0.00446 | 4.3 | FALSE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2020-9819 | ||||
CVE-2019-7481 | SonicWall | SMA100 | 11/03/2021 | 0.94344 | 7.5 | https://viz.greynoise.io/tag/sonicwall-sra-4600-sql-injection-attempt||https://viz.greynoise.io/tag/sonicwall-sra-4600-sql-injection-attempt | TRUE | FALSE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-7481 | |||
CVE-2019-18988 | TeamViewer | Desktop | 11/03/2021 | 0.11779 | 7.0 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2019-18988 | https://vulncheck.com/xdb/ab7ae9b0b03e||https://vulncheck.com/xdb/ab7ae9b0b03e , https://vulncheck.com/xdb/15aa9088b9e8||https://vulncheck.com/xdb/15aa9088b9e8 | |||
CVE-2018-0802 | Microsoft | Office | 11/03/2021 | 0.94103 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2018-0802 | https://vulncheck.com/xdb/9de5d4bf2056||https://vulncheck.com/xdb/9de5d4bf2056 , https://vulncheck.com/xdb/3eb61ae72bb4||https://vulncheck.com/xdb/3eb61ae72bb4 , https://vulncheck.com/xdb/d2e01d805674||https://vulncheck.com/xdb/d2e01d805674 , https://vulncheck.com/xdb/79b5c2826fcb||https://vulncheck.com/xdb/79b5c2826fcb , https://vulncheck.com/xdb/e0e7653da293||https://vulncheck.com/xdb/e0e7653da293 , https://vulncheck.com/xdb/2b50b68aab89||https://vulncheck.com/xdb/2b50b68aab89 | |||
CVE-2017-0143 | Microsoft | Windows | 11/03/2021 | 0.94022 | 8.8 | TRUE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-0143 | https://vulncheck.com/xdb/3ec88a1770ac||https://vulncheck.com/xdb/3ec88a1770ac , https://vulncheck.com/xdb/3e4890416f69||https://vulncheck.com/xdb/3e4890416f69 , https://vulncheck.com/xdb/5a99b35253e9||https://vulncheck.com/xdb/5a99b35253e9 | |||
CVE-2017-8759 | Microsoft | .NET Framework | 11/03/2021 | 0.93905 | 7.8 | FALSE | TRUE | FALSE | https://nvd.nist.gov/vuln/detail/CVE-2017-8759 | https://vulncheck.com/xdb/c10cc081a401||https://vulncheck.com/xdb/c10cc081a401 , https://vulncheck.com/xdb/8334ffed12fa||https://vulncheck.com/xdb/8334ffed12fa , https://vulncheck.com/xdb/78581acb6157||https://vulncheck.com/xdb/78581acb6157 , https://vulncheck.com/xdb/4b60da5761a0||https://vulncheck.com/xdb/4b60da5761a0 , https://vulncheck.com/xdb/9b87d37fcb73||https://vulncheck.com/xdb/9b87d37fcb73 , https://vulncheck.com/xdb/ed1021bf7878||https://vulncheck.com/xdb/ed1021bf7878 , https://vulncheck.com/xdb/4107da43504a||https://vulncheck.com/xdb/4107da43504a , https://vulncheck.com/xdb/0187c7bde1e5||https://vulncheck.com/xdb/0187c7bde1e5 , https://vulncheck.com/xdb/2c3cc4e5f0ef||https://vulncheck.com/xdb/2c3cc4e5f0ef , https://vulncheck.com/xdb/e28825904312||https://vulncheck.com/xdb/e28825904312 , https://vulncheck.com/xdb/b9285bd07a5a||https://vulncheck.com/xdb/b9285bd07a5a , https://vulncheck.com/xdb/074916446e1c||https://vulncheck.com/xdb/074916446e1c , https://vulncheck.com/xdb/229e0e29b71b||https://vulncheck.com/xdb/229e0e29b71b | |||
CVE-2020-1472 | Microsoft | Netlogon | 11/03/2021 | 0.94448 | 5.5 | TRUE | TRUE | FALSE | Reference CISA's ED 20-04 (https://www.cisa.gov/news-events/directives/ed-20-04-mitigate-netlogon-elevation-privilege-vulnerability-august-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-04. https://nvd.nist.gov/vuln/detail/CVE-2020-1472 | https://vulncheck.com/xdb/a1b9b1f814a4||https://vulncheck.com/xdb/a1b9b1f814a4 , https://vulncheck.com/xdb/7d0ea12835e6||https://vulncheck.com/xdb/7d0ea12835e6 , https://vulncheck.com/xdb/a89dd51de0e3||https://vulncheck.com/xdb/a89dd51de0e3 , https://vulncheck.com/xdb/e4924536cdc3||https://vulncheck.com/xdb/e4924536cdc3 , https://vulncheck.com/xdb/20af17b721b6||https://vulncheck.com/xdb/20af17b721b6 , https://vulncheck.com/xdb/1b38ed7bf92e||https://vulncheck.com/xdb/1b38ed7bf92e , https://vulncheck.com/xdb/141011b9f610||https://vulncheck.com/xdb/141011b9f610 , https://vulncheck.com/xdb/ffa521c6d50d||https://vulncheck.com/xdb/ffa521c6d50d , https://vulncheck.com/xdb/21a822495611||https://vulncheck.com/xdb/21a822495611 , https://vulncheck.com/xdb/907edaa608a7||https://vulncheck.com/xdb/907edaa608a7 , https://vulncheck.com/xdb/0878132c0998||https://vulncheck.com/xdb/0878132c0998 , https://vulncheck.com/xdb/273d08fc4891||https://vulncheck.com/xdb/273d08fc4891 , https://vulncheck.com/xdb/11534d8099c0||https://vulncheck.com/xdb/11534d8099c0 , https://vulncheck.com/xdb/7e3fb5cd52b5||https://vulncheck.com/xdb/7e3fb5cd52b5 , https://vulncheck.com/xdb/65af2cf69e5f||https://vulncheck.com/xdb/65af2cf69e5f , https://vulncheck.com/xdb/d4088276b3d3||https://vulncheck.com/xdb/d4088276b3d3 , https://vulncheck.com/xdb/614d9bc21087||https://vulncheck.com/xdb/614d9bc21087 , https://vulncheck.com/xdb/b3e7553472c0||https://vulncheck.com/xdb/b3e7553472c0 , https://vulncheck.com/xdb/6f61ec3202ab||https://vulncheck.com/xdb/6f61ec3202ab , https://vulncheck.com/xdb/f31d61268a71||https://vulncheck.com/xdb/f31d61268a71 , https://vulncheck.com/xdb/47718882bf35||https://vulncheck.com/xdb/47718882bf35 , https://vulncheck.com/xdb/5ec098e97c2b||https://vulncheck.com/xdb/5ec098e97c2b , https://vulncheck.com/xdb/d3b02f321a67||https://vulncheck.com/xdb/d3b02f321a67 , https://vulncheck.com/xdb/d5db0229692d||https://vulncheck.com/xdb/d5db0229692d , https://vulncheck.com/xdb/f2386616a5f6||https://vulncheck.com/xdb/f2386616a5f6 , https://vulncheck.com/xdb/15295a0728a1||https://vulncheck.com/xdb/15295a0728a1 , https://vulncheck.com/xdb/91a82e32aebb||https://vulncheck.com/xdb/91a82e32aebb , https://vulncheck.com/xdb/2b2746cff079||https://vulncheck.com/xdb/2b2746cff079 , https://vulncheck.com/xdb/f6d507143d13||https://vulncheck.com/xdb/f6d507143d13 , https://vulncheck.com/xdb/981d68eb93dc||https://vulncheck.com/xdb/981d68eb93dc , https://vulncheck.com/xdb/cc70b2cf77c2||https://vulncheck.com/xdb/cc70b2cf77c2 , https://vulncheck.com/xdb/ded3b5e316de||https://vulncheck.com/xdb/ded3b5e316de , https://vulncheck.com/xdb/baa1d498a5f5||https://vulncheck.com/xdb/baa1d498a5f5 , https://vulncheck.com/xdb/de09f764488a||https://vulncheck.com/xdb/de09f764488a , https://vulncheck.com/xdb/4266c54f6888||https://vulncheck.com/xdb/4266c54f6888 , https://vulncheck.com/xdb/b802c327864b||https://vulncheck.com/xdb/b802c327864b , https://vulncheck.com/xdb/082957aab268||https://vulncheck.com/xdb/082957aab268 , https://vulncheck.com/xdb/aab99fa8bb77||https://vulncheck.com/xdb/aab99fa8bb77 , https://vulncheck.com/xdb/fc4cb42e3317||https://vulncheck.com/xdb/fc4cb42e3317 , https://vulncheck.com/xdb/56246df0d671||https://vulncheck.com/xdb/56246df0d671 , https://vulncheck.com/xdb/0f6d43740f56||https://vulncheck.com/xdb/0f6d43740f56 , https://vulncheck.com/xdb/cf64e2ea741f||https://vulncheck.com/xdb/cf64e2ea741f , https://vulncheck.com/xdb/c5fc872daa6a||https://vulncheck.com/xdb/c5fc872daa6a , https://vulncheck.com/xdb/983f39e3a57e||https://vulncheck.com/xdb/983f39e3a57e , https://vulncheck.com/xdb/3ce5076013bb||https://vulncheck.com/xdb/3ce5076013bb , https://vulncheck.com/xdb/ef4224f7e535||https://vulncheck.com/xdb/ef4224f7e535 , https://vulncheck.com/xdb/9da3143dc5c2||https://vulncheck.com/xdb/9da3143dc5c2 , https://vulncheck.com/xdb/dd4ae8009961||https://vulncheck.com/xdb/dd4ae8009961 , https://vulncheck.com/xdb/945ac6f44b35||https://vulncheck.com/xdb/945ac6f44b35 , https://vulncheck.com/xdb/22611416152e||https://vulncheck.com/xdb/22611416152e , https://vulncheck.com/xdb/25c4330dd5bc||https://vulncheck.com/xdb/25c4330dd5bc , https://vulncheck.com/xdb/6869949be286||https://vulncheck.com/xdb/6869949be286 , https://vulncheck.com/xdb/819d8120f6b4||https://vulncheck.com/xdb/819d8120f6b4 , https://vulncheck.com/xdb/8240eab3ecba||https://vulncheck.com/xdb/8240eab3ecba , https://vulncheck.com/xdb/ec3302cc4035||https://vulncheck.com/xdb/ec3302cc4035 , https://vulncheck.com/xdb/85bb14853591||https://vulncheck.com/xdb/85bb14853591 , https://vulncheck.com/xdb/1561d5b8edd9||https://vulncheck.com/xdb/1561d5b8edd9 , https://vulncheck.com/xdb/869e2256552c||https://vulncheck.com/xdb/869e2256552c , https://vulncheck.com/xdb/5063a30af753||https://vulncheck.com/xdb/5063a30af753 , https://vulncheck.com/xdb/7a9717baaae0||https://vulncheck.com/xdb/7a9717baaae0 , https://vulncheck.com/xdb/e6e9f7eb96c4||https://vulncheck.com/xdb/e6e9f7eb96c4 , https://vulncheck.com/xdb/743025db6559||https://vulncheck.com/xdb/743025db6559 , https://vulncheck.com/xdb/44550fddd054||https://vulncheck.com/xdb/44550fddd054 , https://vulncheck.com/xdb/992b98c5b3a6||https://vulncheck.com/xdb/992b98c5b3a6 , https://vulncheck.com/xdb/dcd5b16f0af2||https://vulncheck.com/xdb/dcd5b16f0af2 , https://vulncheck.com/xdb/4cc91a55dad4||https://vulncheck.com/xdb/4cc91a55dad4 | |||
CVE ID | Vendor | Product | Date Added to Catalog | EPSS Score | CVSSv4 Base | CVSSv3 Base | GreyNoise Tags | Shadowserver 30d Avg. | Nucleus Exploited by Malware | Nucleus Public Exploit Available | Nucleus Impacts OT | CISA Notes | VulnCheck XDB Entries |
The Dashboard above provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog, as well as essential information about each vulnerability, including:
- CVE Identifier: The unique Common Vulnerabilities and Exposures (CVE) identification number assigned to each vulnerability.
- Vendor: The organization who developed the product associated with the CVE.
- Product: The product associated with the CVE.
- Date Added: The date CISA added the vulnerability to the CISA KEV list.
- Due Date: Federal organizations are required to comply with remediation dates that are set by CISA BOD 22-01. The due date reflects the date federal agencies must comply with the mandate by.
Frequently Asked Questions
Why did Nucleus create the CISA KEV Enrichment Dashboard?
We created this tool out of our own curiosity to learn more about the vulnerabilities CISA identifies on the CISA KEV catalog as the information provided by CISA is extremely limited. We believe having additional context can help organizations better understand the value of incorporating CISA KEV, Greynoise, EPSS, and other threat intelligence into vulnerability management prioritization and remediation efforts.
What is the CISA KEV (Known Exploitable Vulnerabilities) Catalog?
The CISA KEV Catalog is a managed threat intelligence source that provides a list of known exploited vulnerabilities that carry a significant risk to federal agencies. CISA KEV was developed as a part of the CISA Binding Operating Directive 22-01. The catalog is available for free from CISA and we recommend any organizations should consider using this and other threat intelligence sources to help prioritize vulnerability remediation.
What vulnerability enrichment is included on the dashboard?
Nucleus CISA KEV Vulnerability Enrichment Dashboard mirrors the CISA KEV list, and is enriched with CVSS, EPSS and GreyNoise Threat Intelligence.
How can I identify CISA Known Exploitable Vulnerabilities within my environment?
Lucky you should ask! Enriching your vulnerabilities findings data with vulnerability intelligence is a key way to prioritize vulnerability remediation efforts and significantly reduce your risk of being the victim of an exploited vulnerability. Nucleus enables you to aggregate all of your assets and vulnerabilities and quickly identify what CISA Known Exploitable Vulnerabilities are within your environment.
Watch a Demo Today
Learn more about the Nucleus Unified Vulnerability Management platform right away.
Watch our in-depth, on-demand demo to see us in action.