CISA KEV CATALOG VULNERABILITIES

Enrichment Dashboard

Intelligence Partners

Explore the Enriched CISA KEV Catalog

The CISA KEV Vulnerability Enrichment Dashboard enables vulnerability researchers to quickly analyze trends of known and exploitable vulnerabilities identified by CISA. The table is free to use and provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog which is then enriched with CVSS, EPSS, and GreyNoise Threat Intelligence.  You can easily sort, search and export the data in the table below. Give it a try!

CVE ID Vendor Product Date Added to Catalog EPSS Score CVSSv4 Base CVSSv3 Base GreyNoise Tags Shadowserver 30d Avg. Nucleus Exploited by Malware Nucleus Public Exploit Available Nucleus Impacts OT CISA Notes VulnCheck XDB Entries
CVE-2019-6693 Fortinet FortiOS 06/25/2025 0.28232 6.5 TRUE TRUE FALSE https://fortiguard.com/advisory/FG-IR-19-007 ; https://nvd.nist.gov/vuln/detail/CVE-2019-6693 https://vulncheck.com/xdb/00a6bf68463d||https://vulncheck.com/xdb/00a6bf68463d , https://vulncheck.com/xdb/664ed0cdf661||https://vulncheck.com/xdb/664ed0cdf661
CVE-2024-54085 AMI MegaRAC SPx 06/25/2025 0.00246 FALSE FALSE FALSE This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf ; https://security.netapp.com/advisory/ntap-20250328-0003/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-54085
CVE-2024-0769 D-Link DIR-859 Router 06/25/2025 0.39732 5.3 https://viz.greynoise.io/tag/dlink-dir-859-information-disclosure-attempt||https://viz.greynoise.io/tag/dlink-dir-859-information-disclosure-attempt FALSE FALSE FALSE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769
CVE-2023-0386 Linux Kernel 06/17/2025 0.56789 7.8 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a ; https://access.redhat.com/security/cve/cve-2023-0386 ; https://security.netapp.com/advisory/ntap-20230420-0004/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-0386 https://vulncheck.com/xdb/8bb70e7dbfc7||https://vulncheck.com/xdb/8bb70e7dbfc7 , https://vulncheck.com/xdb/c79ab92abc39||https://vulncheck.com/xdb/c79ab92abc39 , https://vulncheck.com/xdb/917dedee61f9||https://vulncheck.com/xdb/917dedee61f9 , https://vulncheck.com/xdb/cee2b1a019b8||https://vulncheck.com/xdb/cee2b1a019b8 , https://vulncheck.com/xdb/6278e1e62115||https://vulncheck.com/xdb/6278e1e62115 , https://vulncheck.com/xdb/25bf65fa10ff||https://vulncheck.com/xdb/25bf65fa10ff , https://vulncheck.com/xdb/84dd9b75426f||https://vulncheck.com/xdb/84dd9b75426f , https://vulncheck.com/xdb/6b752e342371||https://vulncheck.com/xdb/6b752e342371 , https://vulncheck.com/xdb/8e83ff46f752||https://vulncheck.com/xdb/8e83ff46f752 , https://vulncheck.com/xdb/6fd75a13aef7||https://vulncheck.com/xdb/6fd75a13aef7
CVE-2023-33538 TP-Link Multiple Routers 06/16/2025 0.89654 8.8 FALSE TRUE FALSE https://www.tp-link.com/nordic/support/faq/3562/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-33538 https://vulncheck.com/xdb/16db4bdedbf0||https://vulncheck.com/xdb/16db4bdedbf0 , https://vulncheck.com/xdb/1c98f82a1773||https://vulncheck.com/xdb/1c98f82a1773
CVE-2025-43200 Apple Multiple Products 06/16/2025 0.00759 4.8 FALSE FALSE FALSE https://support.apple.com/en-us/122174 ; https://support.apple.com/en-us/122173 ; https://support.apple.com/en-us/122900 ; https://support.apple.com/en-us/122901 ; https://support.apple.com/en-us/122902 ; https://support.apple.com/en-us/122903 ; https://support.apple.com/en-us/122904 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43200
CVE-2025-24016 Wazuh Wazuh Server 06/10/2025 0.91855 9.9 0 FALSE TRUE FALSE https://wazuh.com/blog/addressing-the-cve-2025-24016-vulnerability/ ; https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh ; https://nvd.nist.gov/vuln/detail/CVE-2025-24016 https://vulncheck.com/xdb/909b383279ed||https://vulncheck.com/xdb/909b383279ed , https://vulncheck.com/xdb/5a3cacea8ac9||https://vulncheck.com/xdb/5a3cacea8ac9 , https://vulncheck.com/xdb/d107a6d33872||https://vulncheck.com/xdb/d107a6d33872 , https://vulncheck.com/xdb/771d8a208bca||https://vulncheck.com/xdb/771d8a208bca , https://vulncheck.com/xdb/a8a53f5d0129||https://vulncheck.com/xdb/a8a53f5d0129 , https://vulncheck.com/xdb/d157eb797a2f||https://vulncheck.com/xdb/d157eb797a2f
CVE-2025-33053 Microsoft Windows 06/10/2025 0.15008 8.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 ; https://nvd.nist.gov/vuln/detail/CVE-2025-33053 https://vulncheck.com/xdb/e50dcdc5ad53
CVE-2025-32433 Erlang Erlang/OTP 06/09/2025 0.55376 10.0 FALSE TRUE FALSE This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-erlang-otp-ssh-xyZZy ; https://nvd.nist.gov/vuln/detail/CVE-2025-32433 https://vulncheck.com/xdb/a2f1151c609a||https://vulncheck.com/xdb/a2f1151c609a , https://vulncheck.com/xdb/22d7bf70f177||https://vulncheck.com/xdb/22d7bf70f177 , https://vulncheck.com/xdb/874f94accfde||https://vulncheck.com/xdb/874f94accfde , https://vulncheck.com/xdb/49e3a7890ab8||https://vulncheck.com/xdb/49e3a7890ab8 , https://vulncheck.com/xdb/38c75d4fe3df||https://vulncheck.com/xdb/38c75d4fe3df , https://vulncheck.com/xdb/ec3bcdccec72||https://vulncheck.com/xdb/ec3bcdccec72 , https://vulncheck.com/xdb/6b216fd69575||https://vulncheck.com/xdb/6b216fd69575 , https://vulncheck.com/xdb/0b33fe6d7d52||https://vulncheck.com/xdb/0b33fe6d7d52 , https://vulncheck.com/xdb/734f3d7eff96||https://vulncheck.com/xdb/734f3d7eff96 , https://vulncheck.com/xdb/04468c21f876||https://vulncheck.com/xdb/04468c21f876 , https://vulncheck.com/xdb/a78d51fa522e||https://vulncheck.com/xdb/a78d51fa522e , https://vulncheck.com/xdb/eb611c1ee1c0||https://vulncheck.com/xdb/eb611c1ee1c0 , https://vulncheck.com/xdb/774a5554920f||https://vulncheck.com/xdb/774a5554920f , https://vulncheck.com/xdb/822dbe209d89||https://vulncheck.com/xdb/822dbe209d89 , https://vulncheck.com/xdb/0e9bd89eb6d9||https://vulncheck.com/xdb/0e9bd89eb6d9 , https://vulncheck.com/xdb/839147304502||https://vulncheck.com/xdb/839147304502 , https://vulncheck.com/xdb/d7301295748a||https://vulncheck.com/xdb/d7301295748a , https://vulncheck.com/xdb/42214d962233||https://vulncheck.com/xdb/42214d962233
CVE-2024-42009 Roundcube Webmail 06/09/2025 0.72898 9.3 FALSE TRUE FALSE https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 ; https://nvd.nist.gov/vuln/detail/CVE-2024-42009 https://vulncheck.com/xdb/0f7a6566385d||https://vulncheck.com/xdb/0f7a6566385d , https://vulncheck.com/xdb/38e4d4169186||https://vulncheck.com/xdb/38e4d4169186 , https://vulncheck.com/xdb/c65b1a816cd3||https://vulncheck.com/xdb/c65b1a816cd3 , https://vulncheck.com/xdb/1ccb8f1c8989||https://vulncheck.com/xdb/1ccb8f1c8989
CVE-2025-5419 Google Chromium V8 06/05/2025 0.00207 8.8 FALSE FALSE FALSE https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2025-5419",
CVE-2025-21479 Qualcomm Multiple Chipsets 06/03/2025 0.03288 8.6 FALSE TRUE FALSE Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-21479 https://vulncheck.com/xdb/13d1e869f88c
CVE-2025-21480 Qualcomm Multiple Chipsets 06/03/2025 0.03288 8.6 FALSE FALSE FALSE Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-21480
CVE-2025-27038 Qualcomm Multiple Chipsets 06/03/2025 0.02775 7.5 FALSE FALSE FALSE Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-27038
CVE-2023-39780 ASUS RT-AX55 Routers 06/02/2025 0.66750 8.8 FALSE FALSE FALSE https://www.asus.com/networking-iot-servers/wifi-6/all-series/rt-ax55/helpdesk_bios/?model2Name=RT-AX55 ; https://www.asus.com/content/asus-product-security-advisory/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-39780
CVE-2025-35939 Craft CMS Craft CMS 06/02/2025 0.43970 FALSE FALSE FALSE https://github.com/craftcms/cms/pull/17220 ; https://nvd.nist.gov/vuln/detail/CVE-2025-35939
CVE-2025-3935 ConnectWise ScreenConnect 06/02/2025 0.19467 8.1 FALSE FALSE FALSE https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4 ; https://nvd.nist.gov/vuln/detail/CVE-2025-3935
CVE-2024-56145 Craft CMS Craft CMS 06/02/2025 0.94029 https://viz.greynoise.io/tag/craft-cms-cve-2024-56145-rce-attempt||https://viz.greynoise.io/tag/craft-cms-cve-2024-56145-rce-attempt FALSE TRUE FALSE https://github.com/craftcms/cms/security/advisories/GHSA-2p6p-9rc9-62j9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-56145 https://vulncheck.com/xdb/9fa879d8df13||https://vulncheck.com/xdb/9fa879d8df13 , https://vulncheck.com/xdb/bc0f04bab107||https://vulncheck.com/xdb/bc0f04bab107
CVE-2021-32030 ASUS Routers 06/02/2025 0.94215 9.8 https://viz.greynoise.io/tag/asus-gt-ac2900-auth-bypass-attempt||https://viz.greynoise.io/tag/asus-gt-ac2900-auth-bypass-attempt 6 FALSE FALSE TRUE https://www.asus.com/us/supportonly/lyra%20mini/helpdesk_bios/ ; https://www.asus.com/us/supportonly/rog%20rapture%20gt-ac2900/helpdesk_bios/; https://nvd.nist.gov/vuln/detail/CVE-2021-32030
CVE-2025-4632 Samsung MagicINFO 9 Server 05/22/2025 0.46663 9.8 FALSE FALSE FALSE https://security.samsungtv.com/securityUpdates#SVP-MAY-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2025-4632
CVE-2025-4428 Ivanti Endpoint Manager Mobile (EPMM) 05/19/2025 0.21116 7.2 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4428 https://vulncheck.com/xdb/1d58a0908c17||https://vulncheck.com/xdb/1d58a0908c17 , https://vulncheck.com/xdb/0fb0366ce3c8||https://vulncheck.com/xdb/0fb0366ce3c8
CVE-2025-4427 Ivanti Endpoint Manager Mobile (EPMM) 05/19/2025 0.81049 5.3 6 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https://nvd.nist.gov/vuln/detail/CVE-2025-4427 https://vulncheck.com/xdb/2b5da99e82e5
CVE-2024-11182 MDaemon Email Server 05/19/2025 0.26788 5.3 6.1 FALSE FALSE FALSE https://files.mdaemon.com/mdaemon/beta/RelNotes_en.html ; https://mdaemon.com/pages/downloads-critical-updates ; https://nvd.nist.gov/vuln/detail/CVE-2024-11182
CVE-2023-38950 ZKTeco BioTime 05/19/2025 0.86079 7.5 FALSE FALSE FALSE https://www.zkteco.com/en/Security_Bulletinsibs ; https://nvd.nist.gov/vuln/detail/CVE-2023-38950
CVE-2024-27443 Synacor Zimbra Collaboration Suite (ZCS) 05/19/2025 0.20782 6.1 FALSE FALSE FALSE https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes ; https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P39#Security_Fixes ; https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.7#Security_Fixes ; https://nvd.nist.gov/vuln/detail/CVE-2024-27443
CVE-2025-27920 Srimax Output Messenger 05/19/2025 0.57510 7.2 FALSE FALSE FALSE https://www.outputmessenger.com/cve-2025-27920/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-27920
CVE-2025-42999 SAP NetWeaver 05/15/2025 0.18135 9.1 FALSE FALSE FALSE SAP users must have an account to log in and access the patch: https://me.sap.com/notes/3604119 ; https://nvd.nist.gov/vuln/detail/CVE-2025-42999
CVE-2025-4664 Google Chromium 05/15/2025 0.00013 4.3 FALSE TRUE FALSE https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-4664 https://vulncheck.com/xdb/70f6cb2db4f9
CVE-2024-12987 DrayTek Vigor Routers 05/15/2025 0.84299 6.9 7.3 0 FALSE FALSE TRUE https://fw.draytek.com.tw/Vigor2960/Firmware/v1.5.1.5/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf ; https://fw.draytek.com.tw/Vigor300B/Firmware/v1.5.1.5/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf ; https://fw.draytek.com.tw/Vigor3900/Firmware/v1.5.1.5/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-12987
CVE-2025-32756 Fortinet Multiple Products 05/14/2025 0.10736 9.8 FALSE TRUE FALSE https://fortiguard.fortinet.com/psirt/FG-IR-25-254 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32756 https://vulncheck.com/xdb/e32aaf91a2c9||https://vulncheck.com/xdb/e32aaf91a2c9 , https://vulncheck.com/xdb/67c085a152a1||https://vulncheck.com/xdb/67c085a152a1 , https://vulncheck.com/xdb/79e4cd0f0df6||https://vulncheck.com/xdb/79e4cd0f0df6 , https://vulncheck.com/xdb/f294010abfe2||https://vulncheck.com/xdb/f294010abfe2
CVE-2025-32701 Microsoft Windows 05/13/2025 0.04192 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32701
CVE-2025-30400 Microsoft Windows 05/13/2025 0.03697 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30400 ; https://nvd.nist.gov/vuln/detail/CVE-2025-30400
CVE-2025-32706 Microsoft Windows 05/13/2025 0.12062 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32706 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32706
CVE-2025-32709 Microsoft Windows 05/13/2025 0.04230 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32709 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32709
CVE-2025-30397 Microsoft Windows 05/13/2025 0.16413 7.5 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-30397 https://vulncheck.com/xdb/2b537fb7d9da
CVE-2025-47729 TeleMessage TM SGNL 05/12/2025 0.07260 1.9 FALSE FALSE FALSE Apply mitigations per vendor instructions. Absent mitigating instructions from the vendor, discontinue use of the product. ; https://nvd.nist.gov/vuln/detail/CVE-2025-47729
CVE-2024-11120 GeoVision Multiple Devices 05/07/2025 0.54555 9.8 0 FALSE FALSE TRUE https://dlcdn.geovision.com.tw/TechNotice/CyberSecurity/Security_Advisory_IP_Device_2024-11.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-11120
CVE-2024-6047 GeoVision Multiple Devices 05/07/2025 0.75403 9.8 FALSE FALSE FALSE https://dlcdn.geovision.com.tw/TechNotice/CyberSecurity/Security_Advisory_IP_Device_2024-11.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-6047
CVE-2025-27363 FreeType FreeType 05/06/2025 0.68423 8.1 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2025-05-01 ; https://nvd.nist.gov/vuln/detail/CVE-2025-27363 https://vulncheck.com/xdb/e5445691adbb
CVE-2025-3248 Langflow Langflow 05/05/2025 0.92388 9.8 3 FALSE TRUE FALSE This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: https://github.com/advisories/GHSA-c995-4fw3-j39m ; https://nvd.nist.gov/vuln/detail/CVE-2025-3248 https://vulncheck.com/xdb/288fea3e2ebf||https://vulncheck.com/xdb/288fea3e2ebf , https://vulncheck.com/xdb/cd6d4cd25599||https://vulncheck.com/xdb/cd6d4cd25599 , https://vulncheck.com/xdb/f4d3bcf9f10f||https://vulncheck.com/xdb/f4d3bcf9f10f , https://vulncheck.com/xdb/58f291eee1de||https://vulncheck.com/xdb/58f291eee1de , https://vulncheck.com/xdb/2098ab2f7185||https://vulncheck.com/xdb/2098ab2f7185 , https://vulncheck.com/xdb/93417d485096||https://vulncheck.com/xdb/93417d485096 , https://vulncheck.com/xdb/be18e792efe8||https://vulncheck.com/xdb/be18e792efe8 , https://vulncheck.com/xdb/36d353279df8||https://vulncheck.com/xdb/36d353279df8 , https://vulncheck.com/xdb/5bba2deca1c3||https://vulncheck.com/xdb/5bba2deca1c3 , https://vulncheck.com/xdb/145490c5ce6f||https://vulncheck.com/xdb/145490c5ce6f , https://vulncheck.com/xdb/631b46774fd7||https://vulncheck.com/xdb/631b46774fd7 , https://vulncheck.com/xdb/ad786ecce441||https://vulncheck.com/xdb/ad786ecce441 , https://vulncheck.com/xdb/e3068430fa4d||https://vulncheck.com/xdb/e3068430fa4d , https://vulncheck.com/xdb/ee9c80f0dd42||https://vulncheck.com/xdb/ee9c80f0dd42 , https://vulncheck.com/xdb/e7c172788c42||https://vulncheck.com/xdb/e7c172788c42 , https://vulncheck.com/xdb/8ae92c1bc671||https://vulncheck.com/xdb/8ae92c1bc671 , https://vulncheck.com/xdb/efad80d04720||https://vulncheck.com/xdb/efad80d04720
CVE-2025-34028 Commvault Command Center 05/02/2025 0.63170 10.0 2 FALSE TRUE FALSE https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-34028 https://vulncheck.com/xdb/56babf971542||https://vulncheck.com/xdb/56babf971542 , https://vulncheck.com/xdb/984fda0f0672||https://vulncheck.com/xdb/984fda0f0672 , https://vulncheck.com/xdb/69bab7633674||https://vulncheck.com/xdb/69bab7633674 , https://vulncheck.com/xdb/14624eb2c48c||https://vulncheck.com/xdb/14624eb2c48c
CVE-2024-58136 Yiiframework Yii 05/02/2025 0.35900 9.0 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.yiiframework.com/news/709/please-upgrade-to-yii-2-0-52 ; https://nvd.nist.gov/vuln/detail/CVE-2024-58136
CVE-2024-38475 Apache HTTP Server 05/01/2025 0.93550 9.1 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://httpd.apache.org/security/vulnerabilities_24.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-38475 https://vulncheck.com/xdb/80a83821ddf6||https://vulncheck.com/xdb/80a83821ddf6 , https://vulncheck.com/xdb/e5dc771322d3||https://vulncheck.com/xdb/e5dc771322d3 , https://vulncheck.com/xdb/624d3509f429||https://vulncheck.com/xdb/624d3509f429 , https://vulncheck.com/xdb/61c7ef7fbe32||https://vulncheck.com/xdb/61c7ef7fbe32
CVE-2023-44221 SonicWall SMA100 Appliances 05/01/2025 0.42318 7.2 FALSE FALSE FALSE https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 ; https://nvd.nist.gov/vuln/detail/CVE-2023-44221
CVE-2025-31324 SAP NetWeaver 04/29/2025 0.63520 10.0 4 TRUE TRUE FALSE https://me.sap.com/notes/3594142 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31324 https://vulncheck.com/xdb/1dbd462ef19f||https://vulncheck.com/xdb/1dbd462ef19f , https://vulncheck.com/xdb/8e5d68f04c35||https://vulncheck.com/xdb/8e5d68f04c35 , https://vulncheck.com/xdb/3a18354253c2||https://vulncheck.com/xdb/3a18354253c2 , https://vulncheck.com/xdb/d9d077bc2000||https://vulncheck.com/xdb/d9d077bc2000 , https://vulncheck.com/xdb/e19c182f0ca9||https://vulncheck.com/xdb/e19c182f0ca9 , https://vulncheck.com/xdb/6b35038ccd06||https://vulncheck.com/xdb/6b35038ccd06 , https://vulncheck.com/xdb/7f7dc0b252eb||https://vulncheck.com/xdb/7f7dc0b252eb , https://vulncheck.com/xdb/9ed2a1a3a049||https://vulncheck.com/xdb/9ed2a1a3a049 , https://vulncheck.com/xdb/aa7f5440b92e||https://vulncheck.com/xdb/aa7f5440b92e , https://vulncheck.com/xdb/21140617b6aa||https://vulncheck.com/xdb/21140617b6aa , https://vulncheck.com/xdb/0c5b7577024a||https://vulncheck.com/xdb/0c5b7577024a , https://vulncheck.com/xdb/18c7f30cc438||https://vulncheck.com/xdb/18c7f30cc438
CVE-2025-1976 Broadcom Brocade Fabric OS 04/28/2025 0.02054 FALSE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602 ; https://nvd.nist.gov/vuln/detail/CVE-2025-1976
CVE-2025-3928 Commvault Web Server 04/28/2025 0.12731 FALSE FALSE FALSE https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html; https://www.commvault.com/blogs/notice-security-advisory-update; https://nvd.nist.gov/vuln/detail/CVE-2025-3928
CVE-2025-42599 Qualitia Active! Mail 04/28/2025 0.10614 9.8 FALSE FALSE FALSE https://www.qualitia.com/jp/news/2025/04/18_1030.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-42599
CVE-2025-31201 Apple Multiple Products 04/17/2025 0.00268 7.5 FALSE FALSE FALSE https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31201
CVE-2025-31200 Apple Multiple Products 04/17/2025 0.00285 6.8 FALSE FALSE FALSE https://support.apple.com/en-us/122282 ; https://support.apple.com/en-us/122400 ; https://support.apple.com/en-us/122401 ; https://support.apple.com/en-us/122402 ; https://nvd.nist.gov/vuln/detail/CVE-2025-31200
CVE-2025-24054 Microsoft Windows 04/17/2025 0.35445 6.5 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24054 https://vulncheck.com/xdb/312833432df9||https://vulncheck.com/xdb/312833432df9 , https://vulncheck.com/xdb/550db84afa9d||https://vulncheck.com/xdb/550db84afa9d , https://vulncheck.com/xdb/8f3733c43997||https://vulncheck.com/xdb/8f3733c43997 , https://vulncheck.com/xdb/39435b65af8c||https://vulncheck.com/xdb/39435b65af8c , https://vulncheck.com/xdb/a73df2b2b792||https://vulncheck.com/xdb/a73df2b2b792 , https://vulncheck.com/xdb/78d3d4d389a8||https://vulncheck.com/xdb/78d3d4d389a8
CVE-2021-20035 SonicWall SMA100 Appliances 04/16/2025 0.14007 6.5 FALSE FALSE FALSE https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022 ; https://nvd.nist.gov/vuln/detail/CVE-2021-20035
CVE-2024-53197 Linux Kernel 04/09/2025 0.00200 7.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53197
CVE-2024-53150 Linux Kernel 04/09/2025 0.00158 7.1 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024122427-CVE-2024-53150-3a7d@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53150
CVE-2025-29824 Microsoft Windows 04/08/2025 0.02690 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 ; https://nvd.nist.gov/vuln/detail/CVE-2025-29824 https://vulncheck.com/xdb/55d280cbffe8
CVE-2025-30406 Gladinet CentreStack 04/08/2025 0.84595 9.0 FALSE TRUE FALSE https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf ; https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2025-triofox.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2025-30406 https://vulncheck.com/xdb/ddfce728e42e
CVE-2025-31161 CrushFTP CrushFTP 04/07/2025 0.83274 9.8 TRUE TRUE FALSE https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update ; https://nvd.nist.gov/vuln/detail/CVE-2025-31161 https://vulncheck.com/xdb/e24d445b54c0||https://vulncheck.com/xdb/e24d445b54c0 , https://vulncheck.com/xdb/dbb333d827c5||https://vulncheck.com/xdb/dbb333d827c5 , https://vulncheck.com/xdb/259d44739ff2||https://vulncheck.com/xdb/259d44739ff2 , https://vulncheck.com/xdb/93ea4025399d||https://vulncheck.com/xdb/93ea4025399d , https://vulncheck.com/xdb/d7039f76e4eb||https://vulncheck.com/xdb/d7039f76e4eb , https://vulncheck.com/xdb/5e71bfa64150||https://vulncheck.com/xdb/5e71bfa64150 , https://vulncheck.com/xdb/5e62161000cc||https://vulncheck.com/xdb/5e62161000cc , https://vulncheck.com/xdb/8930ce0f55b5||https://vulncheck.com/xdb/8930ce0f55b5 , https://vulncheck.com/xdb/c65abd96e3cd||https://vulncheck.com/xdb/c65abd96e3cd
CVE-2025-22457 Ivanti Connect Secure, Policy Secure, and ZTA Gateways 04/04/2025 0.26466 9.0 TRUE TRUE FALSE CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22457 https://vulncheck.com/xdb/ade6954fee43||https://vulncheck.com/xdb/ade6954fee43 , https://vulncheck.com/xdb/79aa4a3559fa||https://vulncheck.com/xdb/79aa4a3559fa , https://vulncheck.com/xdb/e1a9d9a11e79||https://vulncheck.com/xdb/e1a9d9a11e79 , https://vulncheck.com/xdb/3bdca4b1c828||https://vulncheck.com/xdb/3bdca4b1c828 , https://vulncheck.com/xdb/074464a0946f||https://vulncheck.com/xdb/074464a0946f
CVE-2025-24813 Apache Tomcat 04/01/2025 0.93871 9.8 0 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq ; https://nvd.nist.gov/vuln/detail/CVE-2025-24813 https://vulncheck.com/xdb/9e52fea0ddb5||https://vulncheck.com/xdb/9e52fea0ddb5 , https://vulncheck.com/xdb/8229a5ce661e||https://vulncheck.com/xdb/8229a5ce661e , https://vulncheck.com/xdb/c63f2f746a4c||https://vulncheck.com/xdb/c63f2f746a4c , https://vulncheck.com/xdb/66bfb6dc4529||https://vulncheck.com/xdb/66bfb6dc4529 , https://vulncheck.com/xdb/41039969d4bb||https://vulncheck.com/xdb/41039969d4bb , https://vulncheck.com/xdb/2e8121be4e6c||https://vulncheck.com/xdb/2e8121be4e6c , https://vulncheck.com/xdb/f95cb1d5b6af||https://vulncheck.com/xdb/f95cb1d5b6af , https://vulncheck.com/xdb/ecda97c5692c||https://vulncheck.com/xdb/ecda97c5692c , https://vulncheck.com/xdb/2e3eea69a36d||https://vulncheck.com/xdb/2e3eea69a36d , https://vulncheck.com/xdb/3aff79b6f0d4||https://vulncheck.com/xdb/3aff79b6f0d4 , https://vulncheck.com/xdb/31ac53ba66b2||https://vulncheck.com/xdb/31ac53ba66b2 , https://vulncheck.com/xdb/ff7c931b911d||https://vulncheck.com/xdb/ff7c931b911d , https://vulncheck.com/xdb/25d3559a5ca1||https://vulncheck.com/xdb/25d3559a5ca1 , https://vulncheck.com/xdb/1f1e1835349f||https://vulncheck.com/xdb/1f1e1835349f , https://vulncheck.com/xdb/e48dddb86729||https://vulncheck.com/xdb/e48dddb86729 , https://vulncheck.com/xdb/40412144ed11||https://vulncheck.com/xdb/40412144ed11 , https://vulncheck.com/xdb/62ff6f95bed3||https://vulncheck.com/xdb/62ff6f95bed3 , https://vulncheck.com/xdb/62446f11b151||https://vulncheck.com/xdb/62446f11b151 , https://vulncheck.com/xdb/5ff5b290fccd||https://vulncheck.com/xdb/5ff5b290fccd , https://vulncheck.com/xdb/02795c240160||https://vulncheck.com/xdb/02795c240160 , https://vulncheck.com/xdb/bec48551a957||https://vulncheck.com/xdb/bec48551a957 , https://vulncheck.com/xdb/2ed807c5c32c||https://vulncheck.com/xdb/2ed807c5c32c , https://vulncheck.com/xdb/181640a7c0ae||https://vulncheck.com/xdb/181640a7c0ae , https://vulncheck.com/xdb/dbf0b83e164b||https://vulncheck.com/xdb/dbf0b83e164b , https://vulncheck.com/xdb/438c59eda6a1||https://vulncheck.com/xdb/438c59eda6a1 , https://vulncheck.com/xdb/930571969654||https://vulncheck.com/xdb/930571969654 , https://vulncheck.com/xdb/a23cfd526be6||https://vulncheck.com/xdb/a23cfd526be6
CVE-2024-20439 Cisco Smart Licensing Utility 03/31/2025 0.88877 9.8 https://viz.greynoise.io/tag/cisco-smart-licensing-cve-2024-20439-hardcoded-credentials-attempt||https://viz.greynoise.io/tag/cisco-smart-licensing-cve-2024-20439-hardcoded-credentials-attempt FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cslu-7gHMzWmw ; https://nvd.nist.gov/vuln/detail/CVE-2024-20439
CVE-2025-2783 Google Chromium Mojo 03/27/2025 0.05464 8.3 FALSE FALSE FALSE https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_25.html ; https://nvd.nist.gov/vuln/detail/CVE-2025-2783
CVE-2019-9874 Sitecore CMS and Experience Platform (XP) 03/26/2025 0.18393 9.8 FALSE FALSE FALSE https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0334035 ; https://nvd.nist.gov/vuln/detail/CVE-2019-9874
CVE-2019-9875 Sitecore CMS and Experience Platform (XP) 03/26/2025 0.11888 8.8 FALSE FALSE FALSE https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0038556 ; https://nvd.nist.gov/vuln/detail/CVE-2019-9875
CVE-2025-30154 reviewdog action-setup GitHub Action 03/24/2025 0.38636 8.6 FALSE FALSE FALSE This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: CISA Mitigation Instructions: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction ; Additional References: https://github.com/reviewdog/reviewdog/security/advisories/GHSA-qmg3-hpqr-gqvc ; https://nvd.nist.gov/vuln/detail/CVE-2025-30154
CVE-2017-12637 SAP NetWeaver 03/19/2025 0.91938 7.5 FALSE FALSE FALSE SAP users must have an account to log in and access the patch: https://me.sap.com/notes/3476549 ; https://nvd.nist.gov/vuln/detail/CVE-2017-12637
CVE-2025-1316 Edimax IC-7100 IP Camera 03/19/2025 0.78187 0 FALSE FALSE TRUE https://www.edimax.com/edimax/post/post/data/edimax/global/press_releases/4801/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-1316
CVE-2024-48248 NAKIVO Backup and Replication 03/19/2025 0.93529 8.6 1 FALSE TRUE FALSE https://helpcenter.nakivo.com/Release-Notes/Content/Release-Notes.htm ; https://nvd.nist.gov/vuln/detail/CVE-2024-48248 https://vulncheck.com/xdb/f2bd8ffd3b8d
CVE-2025-24472 Fortinet FortiOS and FortiProxy 03/18/2025 0.07265 8.1 TRUE FALSE FALSE https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24472
CVE-2025-30066 tj-actions changed-files GitHub Action 03/18/2025 0.74591 8.6 FALSE FALSE FALSE This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: CISA Mitigation Instructions: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction ; Additional References: https://github.com/tj-actions/changed-files/blob/45fb12d7a8bedb4da42342e52fe054c6c2c3fd73/README.md?plain=1#L20-L28 ; https://nvd.nist.gov/vuln/detail/CVE-20
CVE-2025-24201 Apple Multiple Products 03/13/2025 0.00042 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/122281 ; https://support.apple.com/en-us/122283 ; https://support.apple.com/en-us/122284 ; https://support.apple.com/en-us/122285 ; ; https://nvd.nist.gov/vuln/detail/CVE-2025-24201
CVE-2025-21590 Juniper Junos OS 03/13/2025 0.00963 FALSE FALSE FALSE https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-21590
CVE-2025-26633 Microsoft Windows 03/11/2025 0.05485 7.0 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26633 ; https://nvd.nist.gov/vuln/detail/CVE-2025-26633 https://vulncheck.com/xdb/32970494431d
CVE-2025-24983 Microsoft Windows 03/11/2025 0.01664 7.0 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24983 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24983
CVE-2025-24984 Microsoft Windows 03/11/2025 0.18721 4.6 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24984 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24984
CVE-2025-24985 Microsoft Windows 03/11/2025 0.01183 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24985 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24985
CVE-2025-24991 Microsoft Windows 03/11/2025 0.03088 5.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24991 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24991
CVE-2025-24993 Microsoft Windows 03/11/2025 0.05500 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24993 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24993
CVE-2025-25181 Advantive VeraCore 03/10/2025 0.65857 5.8 FALSE FALSE FALSE https://advantive.my.site.com/support/s/article/Veracore-Release-Notes-2025-1-1-3 ; https://nvd.nist.gov/vuln/detail/CVE-2025-25181
CVE-2024-13159 Ivanti Endpoint Manager (EPM) 03/10/2025 0.94121 9.8 3 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13159 https://vulncheck.com/xdb/a83b2bb45c99
CVE-2024-13161 Ivanti Endpoint Manager (EPM) 03/10/2025 0.92138 9.8 2 FALSE FALSE FALSE https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13161
CVE-2024-57968 Advantive VeraCore 03/10/2025 0.09755 9.9 FALSE FALSE FALSE https://advantive.my.site.com/support/s/article/VeraCore-Release-Notes-2024-4-2-1 ; https://nvd.nist.gov/vuln/detail/CVE-2024-57968
CVE-2024-13160 Ivanti Endpoint Manager (EPM) 03/10/2025 0.93513 9.8 2 FALSE FALSE FALSE https://forums.ivanti.com/s/article/Security-Advisory-EPM-January-2025-for-EPM-2024-and-EPM-2022-SU6?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-13160
CVE-2024-50302 Linux Kernel 03/04/2025 0.00213 5.5 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/ ; https://source.android.com/docs/security/bulletin/2025-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-50302
CVE-2025-22224 VMware ESXi and Workstation 03/04/2025 0.30629 9.3 TRUE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224
CVE-2025-22226 VMware ESXi, Workstation, and Fusion 03/04/2025 0.04915 7.1 FALSE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22226
CVE-2025-22225 VMware ESXi 03/04/2025 0.04699 8.2 FALSE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22225
CVE-2024-4885 Progress WhatsUp Gold 03/03/2025 0.94278 9.8 https://viz.greynoise.io/tag/progress-whatsup-gold-rce-cve-2024-4885-attempt||https://viz.greynoise.io/tag/progress-whatsup-gold-rce-cve-2024-4885-attempt 2 FALSE TRUE FALSE https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-4885 https://vulncheck.com/xdb/3ffa6851bf72
CVE-2022-43769 Hitachi Vantara Pentaho Business Analytics (BA) Server 03/03/2025 0.93769 8.8 https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt||https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt FALSE TRUE FALSE https://support.pentaho.com/hc/en-us/articles/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769 ; https://nvd.nist.gov/vuln/detail/CVE-2022-43769 https://vulncheck.com/xdb/ee3a42a38210
CVE-2023-20118 Cisco Small Business RV Series Routers 03/03/2025 0.03546 6.5 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5 ; https://nvd.nist.gov/vuln/detail/CVE-2023-20118
CVE-2022-43939 Hitachi Vantara Pentaho Business Analytics (BA) Server 03/03/2025 0.85909 8.6 https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt||https://viz.greynoise.io/tag/pentaho-business-analytics-server-rce-attempt 2 FALSE TRUE FALSE https://support.pentaho.com/hc/en-us/articles/14455394120333--Resolved-Pentaho-BA-Server-Use-of-Non-Canonical-URL-Paths-for-Authorization-Decisions-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43939- ; https://nvd.nist.gov/vuln/detail/CVE-2022-43939 https://vulncheck.com/xdb/915c4e634580
CVE-2018-8639 Microsoft Windows 03/03/2025 0.20821 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-8639 ; https://nvd.nist.gov/vuln/detail/CVE-2018-8639 https://vulncheck.com/xdb/1f273f25f0fa||https://vulncheck.com/xdb/1f273f25f0fa , https://vulncheck.com/xdb/07b9ec25ec52||https://vulncheck.com/xdb/07b9ec25ec52 , https://vulncheck.com/xdb/103ce63ab269||https://vulncheck.com/xdb/103ce63ab269 , https://vulncheck.com/xdb/aa765b244430||https://vulncheck.com/xdb/aa765b244430 , https://vulncheck.com/xdb/5619ec246b0f||https://vulncheck.com/xdb/5619ec246b0f
CVE-2023-34192 Synacor Zimbra Collaboration Suite (ZCS) 02/25/2025 0.86293 9.0 FALSE FALSE FALSE https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2023-34192
CVE-2024-49035 Microsoft Partner Center 02/25/2025 0.04504 8.7 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49035 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49035
CVE-2017-3066 Adobe ColdFusion 02/24/2025 0.93642 9.8 FALSE TRUE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb17-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2017-3066 https://vulncheck.com/xdb/f8b1d5f82123
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) 02/24/2025 0.70927 8.8 FALSE FALSE FALSE https://www.oracle.com/security-alerts/cpujan2024.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20953
CVE-2025-24989 Microsoft Power Pages 02/21/2025 0.10164 8.2 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24989 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24989
CVE-2025-23209 Craft CMS Craft CMS 02/20/2025 0.03309 8.0 FALSE FALSE FALSE https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x ; https://nvd.nist.gov/vuln/detail/CVE-2025-23209
CVE-2025-0111 Palo Alto Networks PAN-OS 02/20/2025 0.03255 7.1 6.5 FALSE FALSE FALSE https://security.paloaltonetworks.com/CVE-2025-0111 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0111
CVE-2025-0108 Palo Alto Networks PAN-OS 02/18/2025 0.93982 8.8 9.1 8 FALSE TRUE FALSE https://security.paloaltonetworks.com/CVE-2025-0108 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0108 https://vulncheck.com/xdb/e534e54d74a7||https://vulncheck.com/xdb/e534e54d74a7 , https://vulncheck.com/xdb/c7b1b239539d||https://vulncheck.com/xdb/c7b1b239539d , https://vulncheck.com/xdb/b12dbc5cd9c9||https://vulncheck.com/xdb/b12dbc5cd9c9 , https://vulncheck.com/xdb/1b50d3d89443||https://vulncheck.com/xdb/1b50d3d89443 , https://vulncheck.com/xdb/f70f1cc5b204||https://vulncheck.com/xdb/f70f1cc5b204 , https://vulncheck.com/xdb/81f131d1f00d||https://vulncheck.com/xdb/81f131d1f00d
CVE-2024-53704 SonicWall SonicOS 02/18/2025 0.93906 9.8 3 FALSE TRUE FALSE https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003 ; https://nvd.nist.gov/vuln/detail/CVE-2024-53704 https://vulncheck.com/xdb/364cc4eceb03
CVE-2024-57727 SimpleHelp SimpleHelp 02/13/2025 0.93972 7.5 0 TRUE TRUE FALSE https://simple-help.com/kb---security-vulnerabilities-01-2025 ; Additional CISA Mitigation Instructions: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a ; https://nvd.nist.gov/vuln/detail/CVE-2024-57727 https://vulncheck.com/xdb/2d0a6de76da1
CVE-2025-24200 Apple iOS and iPadOS 02/12/2025 0.44842 6.1 FALSE FALSE FALSE https://support.apple.com/en-us/122173 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24200
CVE-2024-41710 Mitel SIP Phones 02/12/2025 0.08515 7.2 FALSE FALSE FALSE https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0019-001-v2.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-41710
CVE-2025-21418 Microsoft Windows 02/11/2025 0.12183 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21418
CVE-2024-40890 Zyxel DSL CPE Devices 02/11/2025 0.19444 8.8 https://viz.greynoise.io/tag/zyxel-cpe-backdoor-account-attempt||https://viz.greynoise.io/tag/zyxel-cpe-backdoor-account-attempt , https://viz.greynoise.io/tag/zyxel-cpe-cve-2024-40890-command-injection-attempt||https://viz.greynoise.io/tag/zyxel-cpe-cve-2024-40890-command-injection-attempt FALSE FALSE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40890
CVE-2025-21391 Microsoft Windows 02/11/2025 0.04198 7.1 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21391
CVE-2024-40891 Zyxel DSL CPE Devices 02/11/2025 0.50002 8.8 FALSE FALSE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025 ; https://www.zyxel.com/service-provider/global/en/security-advisories/zyxel-security-advisory-command-injection-insecure-in-certain-legacy-dsl-cpe-02-04-2025 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40891
CVE-2025-0994 Trimble Cityworks 02/07/2025 0.68627 8.6 8.8 FALSE FALSE FALSE https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?; https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0994
CVE-2025-0411 7-Zip 7-Zip 02/06/2025 0.36788 7.0 FALSE TRUE FALSE https://www.7-zip.org/history.txt ; https://nvd.nist.gov/vuln/detail/CVE-2025-0411 https://vulncheck.com/xdb/3dceaa95f37d||https://vulncheck.com/xdb/3dceaa95f37d , https://vulncheck.com/xdb/379529f376bf||https://vulncheck.com/xdb/379529f376bf , https://vulncheck.com/xdb/7259dd836b0b||https://vulncheck.com/xdb/7259dd836b0b
CVE-2020-15069 Sophos XG Firewall 02/06/2025 0.57377 9.8 FALSE FALSE FALSE https://community.sophos.com/b/security-blog/posts/advisory-buffer-overflow-vulnerability-in-user-portal ; https://nvd.nist.gov/vuln/detail/CVE-2020-15069
CVE-2022-23748 Audinate Dante Discovery 02/06/2025 0.16272 7.8 FALSE FALSE FALSE https://www.getdante.com/support/faq/audinate-response-to-dante-discovery-mdnsresponder-exe-security-issue-cve-2022-23748/ ; https://nvd.nist.gov/vuln/detail/CVE-2022-23748
CVE-2024-21413 Microsoft Office Outlook 02/06/2025 0.93681 9.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21413 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21413 https://vulncheck.com/xdb/f843c9fab927||https://vulncheck.com/xdb/f843c9fab927 , https://vulncheck.com/xdb/7e98d318e5ee||https://vulncheck.com/xdb/7e98d318e5ee , https://vulncheck.com/xdb/f5432e60cf3a||https://vulncheck.com/xdb/f5432e60cf3a , https://vulncheck.com/xdb/903f7c89226e||https://vulncheck.com/xdb/903f7c89226e , https://vulncheck.com/xdb/e5743c4aa3d6||https://vulncheck.com/xdb/e5743c4aa3d6 , https://vulncheck.com/xdb/38f03d75ef65||https://vulncheck.com/xdb/38f03d75ef65 , https://vulncheck.com/xdb/22ef4fecc344||https://vulncheck.com/xdb/22ef4fecc344 , https://vulncheck.com/xdb/9d1931bf8b43||https://vulncheck.com/xdb/9d1931bf8b43 , https://vulncheck.com/xdb/e742b4b6b811||https://vulncheck.com/xdb/e742b4b6b811 , https://vulncheck.com/xdb/3a5fa2dbf482||https://vulncheck.com/xdb/3a5fa2dbf482 , https://vulncheck.com/xdb/353be747e705||https://vulncheck.com/xdb/353be747e705 , https://vulncheck.com/xdb/44a78f4aa71f||https://vulncheck.com/xdb/44a78f4aa71f , https://vulncheck.com/xdb/4424d059b825||https://vulncheck.com/xdb/4424d059b825 , https://vulncheck.com/xdb/b009e7e8de7f||https://vulncheck.com/xdb/b009e7e8de7f , https://vulncheck.com/xdb/9d498f414ca6||https://vulncheck.com/xdb/9d498f414ca6 , https://vulncheck.com/xdb/bf0ad298ff8b||https://vulncheck.com/xdb/bf0ad298ff8b
CVE-2020-29574 Sophos CyberoamOS 02/06/2025 0.12237 9.8 FALSE FALSE FALSE https://support.sophos.com/support/s/article/KBA-000007526 ; https://nvd.nist.gov/vuln/detail/CVE-2020-29574
CVE-2024-53104 Linux Kernel 02/05/2025 0.02472 7.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lore.kernel.org/linux-cve-announce/2024120232-CVE-2024-53104-d781@gregkh/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-53104
CVE-2024-29059 Microsoft .NET Framework 02/04/2025 0.93675 7.5 https://viz.greynoise.io/tag/microsoft--net-framework-information-disclosure-attempt||https://viz.greynoise.io/tag/microsoft--net-framework-information-disclosure-attempt 3 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29059 https://vulncheck.com/xdb/4b06223bcea0
CVE-2018-19410 Paessler PRTG Network Monitor 02/04/2025 0.91484 9.8 https://viz.greynoise.io/tag/prtg-network-monitor-auth-bypass-attempt-cve-2018-19410||https://viz.greynoise.io/tag/prtg-network-monitor-auth-bypass-attempt-cve-2018-19410 FALSE TRUE FALSE https://www.paessler.com/prtg/history/prtg-18#18.2.41.1652 ; https://nvd.nist.gov/vuln/detail/CVE-2018-19410 https://vulncheck.com/xdb/997f2d3dc749
CVE-2018-9276 Paessler PRTG Network Monitor 02/04/2025 0.80858 7.2 FALSE TRUE FALSE https://www.paessler.com/prtg/history/prtg-18#18.2.39 ; https://nvd.nist.gov/vuln/detail/CVE-2018-9276 https://vulncheck.com/xdb/0086801811ed
CVE-2024-45195 Apache OFBiz 02/04/2025 0.94139 7.5 https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-45195-data-file-validation-rce-attempt||https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-45195-data-file-validation-rce-attempt 1 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://ofbiz.apache.org/security.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-45195
CVE-2025-24085 Apple Multiple Products 01/29/2025 0.08548 7.8 FALSE TRUE FALSE https://support.apple.com/en-us/122066 ; https://support.apple.com/en-us/122068 ; https://support.apple.com/en-us/122071 ; https://support.apple.com/en-us/122072 ; https://support.apple.com/en-us/122073 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24085 https://vulncheck.com/xdb/0a1058ad5867||https://vulncheck.com/xdb/0a1058ad5867 , https://vulncheck.com/xdb/0a1058ad5867||https://vulncheck.com/xdb/0a1058ad5867
CVE-2025-23006 SonicWall SMA1000 Appliances 01/24/2025 0.49846 9.8 TRUE FALSE FALSE https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 ; https://nvd.nist.gov/vuln/detail/CVE-2025-23006
CVE-2020-11023 JQuery JQuery 01/23/2025 0.21831 6.9 FALSE TRUE FALSE https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2020-11023
CVE-2024-50603 Aviatrix Controllers 01/16/2025 0.94352 10.0 2 FALSE TRUE FALSE https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true ; https://nvd.nist.gov/vuln/detail/CVE-2024-50603 https://vulncheck.com/xdb/cfd9552d3699||https://vulncheck.com/xdb/cfd9552d3699 , https://vulncheck.com/xdb/513baacd981d||https://vulncheck.com/xdb/513baacd981d
CVE-2025-21334 Microsoft Windows 01/14/2025 0.04626 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21334 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21334
CVE-2025-21335 Microsoft Windows 01/14/2025 0.06104 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21335 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21335
CVE-2025-21333 Microsoft Windows 01/14/2025 0.56696 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21333 ; https://nvd.nist.gov/vuln/detail/CVE-2025-21333 https://vulncheck.com/xdb/089575034e07||https://vulncheck.com/xdb/089575034e07 , https://vulncheck.com/xdb/4e8247ebe2f4||https://vulncheck.com/xdb/4e8247ebe2f4
CVE-2024-55591 Fortinet FortiOS and FortiProxy 01/14/2025 0.94176 9.8 TRUE TRUE FALSE https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55591 https://vulncheck.com/xdb/2112e05b2905||https://vulncheck.com/xdb/2112e05b2905 , https://vulncheck.com/xdb/92d9a3d86d34||https://vulncheck.com/xdb/92d9a3d86d34 , https://vulncheck.com/xdb/584a6c464304||https://vulncheck.com/xdb/584a6c464304 , https://vulncheck.com/xdb/49f0149db4da||https://vulncheck.com/xdb/49f0149db4da , https://vulncheck.com/xdb/e26be9aa9402||https://vulncheck.com/xdb/e26be9aa9402 , https://vulncheck.com/xdb/887dc3b62aac||https://vulncheck.com/xdb/887dc3b62aac
CVE-2023-48365 Qlik Sense 01/13/2025 0.73360 9.6 TRUE FALSE FALSE https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2120510 ; https://nvd.nist.gov/vuln/detail/CVE-2023-48365
CVE-2024-12686 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) 01/13/2025 0.05770 6.6 FALSE FALSE FALSE https://www.beyondtrust.com/trust-center/security-advisories/bt24-11 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12686
CVE-2025-0282 Ivanti Connect Secure, Policy Secure, and ZTA Gateways 01/08/2025 0.93244 9.0 TRUE TRUE FALSE CISA Mitigation Instructions: https://www.cisa.gov/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0282 https://vulncheck.com/xdb/043030d6caa4||https://vulncheck.com/xdb/043030d6caa4 , https://vulncheck.com/xdb/858b463ecabe||https://vulncheck.com/xdb/858b463ecabe , https://vulncheck.com/xdb/85fcb27bdd09||https://vulncheck.com/xdb/85fcb27bdd09 , https://vulncheck.com/xdb/d343e6784986||https://vulncheck.com/xdb/d343e6784986
CVE-2020-2883 Oracle WebLogic Server 01/07/2025 0.93729 9.8 FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpuapr2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-2883 https://vulncheck.com/xdb/407219371c37||https://vulncheck.com/xdb/407219371c37 , https://vulncheck.com/xdb/7960bb5df13e||https://vulncheck.com/xdb/7960bb5df13e , https://vulncheck.com/xdb/d55ddb5fac32||https://vulncheck.com/xdb/d55ddb5fac32 , https://vulncheck.com/xdb/7927833b7021||https://vulncheck.com/xdb/7927833b7021 , https://vulncheck.com/xdb/da7b6fb2895f||https://vulncheck.com/xdb/da7b6fb2895f , https://vulncheck.com/xdb/f0337df1320b||https://vulncheck.com/xdb/f0337df1320b , https://vulncheck.com/xdb/9ab580b3f80b||https://vulncheck.com/xdb/9ab580b3f80b
CVE-2024-41713 Mitel MiCollab 01/07/2025 0.93914 9.1 https://viz.greynoise.io/tag/mitel-micollab-cve-2024-41713-authentication-bypass-attempt||https://viz.greynoise.io/tag/mitel-micollab-cve-2024-41713-authentication-bypass-attempt 2 TRUE TRUE TRUE https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-41713 https://vulncheck.com/xdb/90a108cc70dd||https://vulncheck.com/xdb/90a108cc70dd , https://vulncheck.com/xdb/c852f2485f3d||https://vulncheck.com/xdb/c852f2485f3d , https://vulncheck.com/xdb/cabd1689d8de||https://vulncheck.com/xdb/cabd1689d8de , https://vulncheck.com/xdb/355eb6521aa8||https://vulncheck.com/xdb/355eb6521aa8 , https://vulncheck.com/xdb/95179643ddce||https://vulncheck.com/xdb/95179643ddce
CVE-2024-55550 Mitel MiCollab 01/07/2025 0.15002 2.7 TRUE FALSE FALSE https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55550
CVE-2024-3393 Palo Alto Networks PAN-OS 12/30/2024 0.64730 8.7 7.5 FALSE TRUE FALSE https://security.paloaltonetworks.com/CVE-2024-3393 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3393 https://vulncheck.com/xdb/07151b94c337
CVE-2021-44207 Acclaim Systems USAHERDS 12/23/2024 0.11853 8.1 FALSE FALSE FALSE https://www.acclaimsystems.com/#contact ; https://www.tnatc.org/#contact ; https://nvd.nist.gov/vuln/detail/CVE-2021-44207
CVE-2024-12356 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) 12/19/2024 0.93775 9.8 FALSE TRUE FALSE https://www.beyondtrust.com/trust-center/security-advisories/bt24-10 ; https://nvd.nist.gov/vuln/detail/CVE-2024-12356
CVE-2021-40407 Reolink RLC-410W IP Camera 12/18/2024 0.47291 9.1 FALSE FALSE FALSE https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2021-40407
CVE-2018-14933 NUUO NVRmini Devices 12/18/2024 0.93678 9.8 FALSE TRUE FALSE https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter%EF%BC%BFNVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2018-14933
CVE-2019-11001 Reolink Multiple IP Cameras 12/18/2024 0.47127 7.2 FALSE FALSE FALSE https://reolink.com/product-eol/ ; https://reolink.com/download-center/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-11001
CVE-2022-23227 NUUO NVRmini2 Devices 12/18/2024 0.55998 9.8 FALSE FALSE FALSE https://nuuo.com/wp-content/uploads/2023/03/NUUO-EOL-letter_NVRmini-2-and-NVRsolo-series.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2022-23227
CVE-2024-55956 Cleo Multiple Products 12/17/2024 0.91828 9.8 https://viz.greynoise.io/tag/cleo-file-transfer-cve-2024-55956-arbitrary-file-write-attempt||https://viz.greynoise.io/tag/cleo-file-transfer-cve-2024-55956-arbitrary-file-write-attempt TRUE TRUE FALSE https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update-CVE-2024-55956 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55956
CVE-2024-20767 Adobe ColdFusion 12/16/2024 0.94114 7.4 https://viz.greynoise.io/tag/adobe-coldfusion-arbitrary-file-read-cve-2024-20767-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-arbitrary-file-read-cve-2024-20767-attempt 1 FALSE TRUE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-20767 https://vulncheck.com/xdb/1e72253d309a||https://vulncheck.com/xdb/1e72253d309a , https://vulncheck.com/xdb/3aa2e6eafec7||https://vulncheck.com/xdb/3aa2e6eafec7 , https://vulncheck.com/xdb/d03c6dd756ae||https://vulncheck.com/xdb/d03c6dd756ae , https://vulncheck.com/xdb/2ec2b9a2d54d||https://vulncheck.com/xdb/2ec2b9a2d54d
CVE-2024-35250 Microsoft Windows 12/16/2024 0.52421 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250 ; https://nvd.nist.gov/vuln/detail/CVE-2024-35250 https://vulncheck.com/xdb/0d2b550a1e93||https://vulncheck.com/xdb/0d2b550a1e93 , https://vulncheck.com/xdb/ad758b7b19fe||https://vulncheck.com/xdb/ad758b7b19fe , https://vulncheck.com/xdb/46bcac6e7f22||https://vulncheck.com/xdb/46bcac6e7f22 , https://vulncheck.com/xdb/e8420e7e6156||https://vulncheck.com/xdb/e8420e7e6156
CVE-2024-50623 Cleo Multiple Products 12/13/2024 0.93992 9.8 https://viz.greynoise.io/tag/cleo-cve-2024-50623-unrestricted-file-upload-or-download-attempt||https://viz.greynoise.io/tag/cleo-cve-2024-50623-unrestricted-file-upload-or-download-attempt 0 TRUE TRUE FALSE https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update ; https://nvd.nist.gov/vuln/detail/CVE-2024-50623 https://vulncheck.com/xdb/99fbb4b736ab||https://vulncheck.com/xdb/99fbb4b736ab , https://vulncheck.com/xdb/755b4f4137d1||https://vulncheck.com/xdb/755b4f4137d1 , https://vulncheck.com/xdb/f7e91dc53927||https://vulncheck.com/xdb/f7e91dc53927 , https://vulncheck.com/xdb/5b8b8aaf6a74||https://vulncheck.com/xdb/5b8b8aaf6a74
CVE-2024-49138 Microsoft Windows 12/10/2024 0.84420 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49138 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49138 https://vulncheck.com/xdb/7b388f4dba71||https://vulncheck.com/xdb/7b388f4dba71 , https://vulncheck.com/xdb/622cd13afd39||https://vulncheck.com/xdb/622cd13afd39
CVE-2024-51378 CyberPersons CyberPanel 12/04/2024 0.94089 10.0 https://viz.greynoise.io/tag/cyberpanel-getresetstatus-cve-2024-51378-command-injection-attempt||https://viz.greynoise.io/tag/cyberpanel-getresetstatus-cve-2024-51378-command-injection-attempt TRUE TRUE FALSE https://cyberpanel.net/KnowledgeBase/home/change-logs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-51378 https://vulncheck.com/xdb/f89a893b80f0||https://vulncheck.com/xdb/f89a893b80f0 , https://vulncheck.com/xdb/a3aa6ae8056c||https://vulncheck.com/xdb/a3aa6ae8056c
CVE-2024-11680 ProjectSend ProjectSend 12/03/2024 0.93609 9.8 https://viz.greynoise.io/tag/projectsend-cve-2024-11680-incorrect-authorization-webshell-upload-attempt||https://viz.greynoise.io/tag/projectsend-cve-2024-11680-incorrect-authorization-webshell-upload-attempt FALSE TRUE FALSE https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11680 https://vulncheck.com/xdb/a7d6dcb1ffac
CVE-2024-11667 Zyxel Multiple Firewalls 12/03/2024 0.50985 7.5 TRUE FALSE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-21-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-11667
CVE-2023-45727 North Grid Proself 12/03/2024 0.20604 7.5 FALSE FALSE FALSE https://www.proself.jp/information/153/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-45727
CVE-2023-28461 Array Networks AG/vxAG ArrayOS 11/25/2024 0.89761 9.8 https://viz.greynoise.io/tag/array-networks-ag-vxag-cve-2023-28461-remote-code-execution-attempt||https://viz.greynoise.io/tag/array-networks-ag-vxag-cve-2023-28461-remote-code-execution-attempt 0 TRUE FALSE FALSE https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2023-28461
CVE-2024-44309 Apple Multiple Products 11/21/2024 0.00237 6.1 FALSE FALSE FALSE https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44309
CVE-2024-21287 Oracle Agile Product Lifecycle Management (PLM) 11/21/2024 0.73963 7.5 FALSE FALSE FALSE https://www.oracle.com/security-alerts/alert-cve-2024-21287.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-21287
CVE-2024-44308 Apple Multiple Products 11/21/2024 0.00334 8.8 FALSE TRUE FALSE https://support.apple.com/en-us/121752, https://support.apple.com/en-us/121753, https://support.apple.com/en-us/121754, https://support.apple.com/en-us/121755, https://support.apple.com/en-us/121756 ; https://nvd.nist.gov/vuln/detail/CVE-2024-44308 https://vulncheck.com/xdb/aa3a6d7e0723
CVE-2024-38813 VMware vCenter Server 11/20/2024 0.14583 7.5 FALSE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38813
CVE-2024-38812 VMware vCenter Server 11/20/2024 0.58010 9.8 FALSE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38812
CVE-2024-1212 Progress Kemp LoadMaster 11/18/2024 0.94349 10.0 https://viz.greynoise.io/tag/progress-kemp-loadmaster-rce-cve-2024-1212-attempt||https://viz.greynoise.io/tag/progress-kemp-loadmaster-rce-cve-2024-1212-attempt 2 FALSE TRUE FALSE https://community.progress.com/s/article/Release-Notice-LMOS-7-2-59-2-7-2-54-8-7-2-48-10-CVE-2024-1212 ; https://nvd.nist.gov/vuln/detail/CVE-2024-1212 https://vulncheck.com/xdb/50743b49ce00||https://vulncheck.com/xdb/50743b49ce00 , https://vulncheck.com/xdb/69dd3ae035ff||https://vulncheck.com/xdb/69dd3ae035ff
CVE-2024-0012 Palo Alto Networks PAN-OS 11/18/2024 0.94327 9.3 9.8 https://viz.greynoise.io/tag/palo-alto-pan-os-auth-bypass-cve-2024-0012-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-auth-bypass-cve-2024-0012-attempt 4 TRUE TRUE FALSE https://security.paloaltonetworks.com/CVE-2024-0012 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0012 https://vulncheck.com/xdb/5a56db95a9d0||https://vulncheck.com/xdb/5a56db95a9d0 , https://vulncheck.com/xdb/8681e4b6c1e7||https://vulncheck.com/xdb/8681e4b6c1e7 , https://vulncheck.com/xdb/b64291402220||https://vulncheck.com/xdb/b64291402220 , https://vulncheck.com/xdb/3dd168f0b850||https://vulncheck.com/xdb/3dd168f0b850 , https://vulncheck.com/xdb/9407f5afd709||https://vulncheck.com/xdb/9407f5afd709 , https://vulncheck.com/xdb/f74a09e30d54||https://vulncheck.com/xdb/f74a09e30d54 , https://vulncheck.com/xdb/b3afbf33fe3c||https://vulncheck.com/xdb/b3afbf33fe3c , https://vulncheck.com/xdb/134e8d40e90c||https://vulncheck.com/xdb/134e8d40e90c , https://vulncheck.com/xdb/393b3785530d||https://vulncheck.com/xdb/393b3785530d , https://vulncheck.com/xdb/b44394b6ef69||https://vulncheck.com/xdb/b44394b6ef69 , https://vulncheck.com/xdb/eb11951249df||https://vulncheck.com/xdb/eb11951249df
CVE-2024-9474 Palo Alto Networks PAN-OS 11/18/2024 0.94283 6.9 7.2 https://viz.greynoise.io/tag/palo-alto-pan-os-command-injection-cve-2024-9474-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-command-injection-cve-2024-9474-attempt 0 FALSE TRUE FALSE https://security.paloaltonetworks.com/CVE-2024-9474 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9474 https://vulncheck.com/xdb/0edcc19bc4d9||https://vulncheck.com/xdb/0edcc19bc4d9 , https://vulncheck.com/xdb/aa9dee512df6||https://vulncheck.com/xdb/aa9dee512df6 , https://vulncheck.com/xdb/633ea1c42a8f||https://vulncheck.com/xdb/633ea1c42a8f , https://vulncheck.com/xdb/d83694f41e6f||https://vulncheck.com/xdb/d83694f41e6f , https://vulncheck.com/xdb/0a9ea1b441bd||https://vulncheck.com/xdb/0a9ea1b441bd , https://vulncheck.com/xdb/a6c35ab80c45||https://vulncheck.com/xdb/a6c35ab80c45 , https://vulncheck.com/xdb/151f0aa40b6d||https://vulncheck.com/xdb/151f0aa40b6d , https://vulncheck.com/xdb/6401fcd40f5e||https://vulncheck.com/xdb/6401fcd40f5e
CVE-2024-9463 Palo Alto Networks Expedition 11/14/2024 0.94245 9.9 7.5 https://viz.greynoise.io/tag/palo-alto-expedition-os-command-injection-cve-2024-9463-attempt||https://viz.greynoise.io/tag/palo-alto-expedition-os-command-injection-cve-2024-9463-attempt 2 FALSE TRUE FALSE https://security.paloaltonetworks.com/PAN-SA-2024-0010 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9463 https://vulncheck.com/xdb/d043299b2a99
CVE-2024-9465 Palo Alto Networks Expedition 11/14/2024 0.94244 9.2 9.1 https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-9465-unauth-sqli-attempt||https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-9465-unauth-sqli-attempt 1 FALSE TRUE FALSE https://security.paloaltonetworks.com/PAN-SA-2024-0010 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9465 https://vulncheck.com/xdb/bac87e2e0d0c||https://vulncheck.com/xdb/bac87e2e0d0c , https://vulncheck.com/xdb/f6fbf65dc654||https://vulncheck.com/xdb/f6fbf65dc654 , https://vulncheck.com/xdb/163bcfc3bb0a||https://vulncheck.com/xdb/163bcfc3bb0a
CVE-2014-2120 Cisco Adaptive Security Appliance (ASA) 11/12/2024 0.80116 6.1 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CVE-2014-2120 ; https://nvd.nist.gov/vuln/detail/CVE-2014-2120
CVE-2021-26086 Atlassian Jira Server and Data Center 11/12/2024 0.94247 5.3 https://viz.greynoise.io/tag/atlassian-jira-path-traversal-attempt||https://viz.greynoise.io/tag/atlassian-jira-path-traversal-attempt 0 FALSE TRUE FALSE https://jira.atlassian.com/browse/JRASERVER-72695 ; https://nvd.nist.gov/vuln/detail/CVE-2021-26086
CVE-2021-41277 Metabase Metabase 11/12/2024 0.94404 10.0 https://viz.greynoise.io/tag/metabase-lfi-attempt||https://viz.greynoise.io/tag/metabase-lfi-attempt 2 FALSE TRUE FALSE https://github.com/metabase/metabase/security/advisories/GHSA-w73v-6p7p-fpfr ; https://nvd.nist.gov/vuln/detail/CVE-2021-41277 https://vulncheck.com/xdb/4a3d504338fe||https://vulncheck.com/xdb/4a3d504338fe , https://vulncheck.com/xdb/ade2199af4d8||https://vulncheck.com/xdb/ade2199af4d8 , https://vulncheck.com/xdb/d82529f295a2||https://vulncheck.com/xdb/d82529f295a2
CVE-2024-43451 Microsoft Windows 11/12/2024 0.91072 6.5 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43451 https://vulncheck.com/xdb/4b1e8e9b00ed
CVE-2024-49039 Microsoft Windows 11/12/2024 0.43689 8.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039 ; https://nvd.nist.gov/vuln/detail/CVE-2024-49039 https://vulncheck.com/xdb/0dfb7d7bb580||https://vulncheck.com/xdb/0dfb7d7bb580 , https://vulncheck.com/xdb/b7425539e1cf||https://vulncheck.com/xdb/b7425539e1cf
CVE-2024-51567 CyberPersons CyberPanel 11/07/2024 0.94261 10.0 https://viz.greynoise.io/tag/cyberpanel-rce-attempt||https://viz.greynoise.io/tag/cyberpanel-rce-attempt 0 TRUE TRUE FALSE https://cyberpanel.net/blog/detials-and-fix-of-recent-security-issue-and-patch-of-cyberpanel ; https://nvd.nist.gov/vuln/detail/CVE-2024-51567 https://vulncheck.com/xdb/04399b4b752c||https://vulncheck.com/xdb/04399b4b752c , https://vulncheck.com/xdb/459efae0ba21||https://vulncheck.com/xdb/459efae0ba21 , https://vulncheck.com/xdb/c7fb9952eb0e||https://vulncheck.com/xdb/c7fb9952eb0e
CVE-2019-16278 Nostromo nhttpd 11/07/2024 0.94390 9.8 https://viz.greynoise.io/tag/nostromo-rce-attempt||https://viz.greynoise.io/tag/nostromo-rce-attempt 3 FALSE TRUE FALSE https://www.nazgul.ch/dev/nostromo_cl.txt ; https://nvd.nist.gov/vuln/detail/CVE-2019-16278 https://vulncheck.com/xdb/42989a8efb98||https://vulncheck.com/xdb/42989a8efb98 , https://vulncheck.com/xdb/27caa8f2e1ed||https://vulncheck.com/xdb/27caa8f2e1ed , https://vulncheck.com/xdb/19dcd19fffaf||https://vulncheck.com/xdb/19dcd19fffaf , https://vulncheck.com/xdb/c170756630e3||https://vulncheck.com/xdb/c170756630e3 , https://vulncheck.com/xdb/9c48b3d900f1||https://vulncheck.com/xdb/9c48b3d900f1 , https://vulncheck.com/xdb/6c38a06d6d2a||https://vulncheck.com/xdb/6c38a06d6d2a , https://vulncheck.com/xdb/7d72baf3d3a6||https://vulncheck.com/xdb/7d72baf3d3a6 , https://vulncheck.com/xdb/b68c72b934fa||https://vulncheck.com/xdb/b68c72b934fa , https://vulncheck.com/xdb/9c7a1af9a272||https://vulncheck.com/xdb/9c7a1af9a272 , https://vulncheck.com/xdb/2c96c551dfdb||https://vulncheck.com/xdb/2c96c551dfdb , https://vulncheck.com/xdb/8233a377e146||https://vulncheck.com/xdb/8233a377e146 , https://vulncheck.com/xdb/dd3c9e908dd7||https://vulncheck.com/xdb/dd3c9e908dd7 , https://vulncheck.com/xdb/5bbc5ed5a337||https://vulncheck.com/xdb/5bbc5ed5a337 , https://vulncheck.com/xdb/ceecea9075da||https://vulncheck.com/xdb/ceecea9075da
CVE-2024-5910 Palo Alto Networks Expedition 11/07/2024 0.90821 9.3 9.8 https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-5910-account-takeover-attempt||https://viz.greynoise.io/tag/palo-alto-networks-cve-2024-5910-account-takeover-attempt 0 FALSE TRUE FALSE https://security.paloaltonetworks.com/CVE-2024-5910 ; https://nvd.nist.gov/vuln/detail/CVE-2024-5910
CVE-2024-43093 Android Framework 11/07/2024 0.00016 7.8 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/2024-11-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43093
CVE-2024-8957 PTZOptics PT30X-SDI/NDI Cameras 11/04/2024 0.46040 7.2 https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-rce-attempt||https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-rce-attempt 0 FALSE FALSE TRUE https://ptzoptics.com/firmware-changelog/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-8957
CVE-2024-8956 PTZOptics PT30X-SDI/NDI Cameras 11/04/2024 0.86905 9.1 https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-auth-bypass-attempt||https://viz.greynoise.io/tag/valuehd-ndi-ptz-camera-auth-bypass-attempt FALSE FALSE FALSE https://ptzoptics.com/firmware-changelog/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-8956
CVE-2024-20481 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 10/24/2024 0.02137 5.8 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW ; https://nvd.nist.gov/vuln/detail/CVE-2024-20481
CVE-2024-37383 Roundcube Webmail 10/24/2024 0.72100 6.1 FALSE TRUE FALSE https://github.com/roundcube/roundcubemail/releases/tag/1.5.7, https://github.com/roundcube/roundcubemail/releases/tag/1.6.7 ; https://nvd.nist.gov/vuln/detail/CVE-2024-37383 https://vulncheck.com/xdb/1154ab034311||https://vulncheck.com/xdb/1154ab034311 , https://vulncheck.com/xdb/ed3b62fcf757||https://vulncheck.com/xdb/ed3b62fcf757
CVE-2024-47575 Fortinet FortiManager 10/23/2024 0.90308 9.8 https://viz.greynoise.io/tag/fortinet-fortimanager-cve-2024-47575-rce-attempt||https://viz.greynoise.io/tag/fortinet-fortimanager-cve-2024-47575-rce-attempt FALSE TRUE FALSE https://fortiguard.fortinet.com/psirt/FG-IR-24-423 ; https://nvd.nist.gov/vuln/detail/CVE-2024-47575 https://vulncheck.com/xdb/4d8956df056d||https://vulncheck.com/xdb/4d8956df056d , https://vulncheck.com/xdb/8204500c97e4||https://vulncheck.com/xdb/8204500c97e4 , https://vulncheck.com/xdb/bf46bb5d9d22||https://vulncheck.com/xdb/bf46bb5d9d22 , https://vulncheck.com/xdb/8df10500dd48||https://vulncheck.com/xdb/8df10500dd48
CVE-2024-38094 Microsoft SharePoint 10/22/2024 0.84422 7.2 TRUE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38094 ; https://nvd.nist.gov/vuln/detail/CVE-2024-38094
CVE-2024-9537 ScienceLogic SL1 10/21/2024 0.27343 9.3 9.8 FALSE FALSE FALSE https://support.sciencelogic.com/s/article/15527 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9537
CVE-2024-40711 Veeam Backup & Replication 10/17/2024 0.49658 9.8 https://viz.greynoise.io/tag/veeam-backup-and-replication-cve-2024-40711-unsafe-deserialization-rce-attempt||https://viz.greynoise.io/tag/veeam-backup-and-replication-cve-2024-40711-unsafe-deserialization-rce-attempt TRUE TRUE FALSE https://www.veeam.com/kb4649 ; https://nvd.nist.gov/vuln/detail/CVE-2024-40711 https://vulncheck.com/xdb/1adc56f6da25
CVE-2024-28987 SolarWinds Web Help Desk 10/15/2024 0.94221 9.1 https://viz.greynoise.io/tag/solarwinds-web-help-desk-cve-2024-28987-hard-coded-credentials-attempt||https://viz.greynoise.io/tag/solarwinds-web-help-desk-cve-2024-28987-hard-coded-credentials-attempt FALSE TRUE FALSE https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987 ; https://nvd.nist.gov/vuln/detail/CVE-2024-28987 https://vulncheck.com/xdb/1378be70d8dd||https://vulncheck.com/xdb/1378be70d8dd , https://vulncheck.com/xdb/d11c0c1a7a29||https://vulncheck.com/xdb/d11c0c1a7a29 , https://vulncheck.com/xdb/cb33e9cd9f7c||https://vulncheck.com/xdb/cb33e9cd9f7c
CVE-2024-9680 Mozilla Firefox 10/15/2024 0.09444 9.8 FALSE FALSE FALSE https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-9680
CVE-2024-30088 Microsoft Windows 10/15/2024 0.82802 7.0 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-30088 https://vulncheck.com/xdb/3fd3632fa1a2||https://vulncheck.com/xdb/3fd3632fa1a2 , https://vulncheck.com/xdb/84d8f14d4ea2||https://vulncheck.com/xdb/84d8f14d4ea2 , https://vulncheck.com/xdb/80c76b2faf7e||https://vulncheck.com/xdb/80c76b2faf7e , https://vulncheck.com/xdb/8ca084cd8bf8||https://vulncheck.com/xdb/8ca084cd8bf8 , https://vulncheck.com/xdb/30cfb6a2ab0d||https://vulncheck.com/xdb/30cfb6a2ab0d
CVE-2024-9379 Ivanti Cloud Services Appliance (CSA) 10/09/2024 0.84371 6.5 FALSE FALSE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9379
CVE-2024-9380 Ivanti Cloud Services Appliance (CSA) 10/09/2024 0.82973 7.2 FALSE FALSE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9380
CVE-2024-23113 Fortinet Multiple Products 10/09/2024 0.45024 9.8 FALSE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-24-029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23113 https://vulncheck.com/xdb/b3ae997acc06||https://vulncheck.com/xdb/b3ae997acc06 , https://vulncheck.com/xdb/0548206afc9c||https://vulncheck.com/xdb/0548206afc9c , https://vulncheck.com/xdb/aad788d038d3||https://vulncheck.com/xdb/aad788d038d3 , https://vulncheck.com/xdb/3039091c436b||https://vulncheck.com/xdb/3039091c436b
CVE-2024-43572 Microsoft Windows 10/08/2024 0.63415 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/advisory/CVE-2024-43572 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43572
CVE-2024-43047 Qualcomm Multiple Chipsets 10/08/2024 0.00309 7.8 FALSE FALSE FALSE https://git.codelinaro.org/clo/la/platform/vendor/qcom/opensource/dsp-kernel/-/commit/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43047
CVE-2024-43573 Microsoft Windows 10/08/2024 0.08507 6.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43573
CVE-2024-45519 Synacor Zimbra Collaboration Suite (ZCS) 10/03/2024 0.94150 10.0 https://viz.greynoise.io/tag/zimbra-collaboration-suite-cve-2024-45519-rce-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-cve-2024-45519-rce-attempt FALSE TRUE FALSE https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2024-45519 https://vulncheck.com/xdb/136d21a96745||https://vulncheck.com/xdb/136d21a96745 , https://vulncheck.com/xdb/2302bb7a26b2||https://vulncheck.com/xdb/2302bb7a26b2 , https://vulncheck.com/xdb/d42dbaba27e2||https://vulncheck.com/xdb/d42dbaba27e2 , https://vulncheck.com/xdb/a9e277d65f37||https://vulncheck.com/xdb/a9e277d65f37 , https://vulncheck.com/xdb/2476d32f40af||https://vulncheck.com/xdb/2476d32f40af
CVE-2024-29824 Ivanti Endpoint Manager (EPM) 10/02/2024 0.94341 9.6 https://viz.greynoise.io/tag/ivanti-epm-cve-2024-29824-sqli-attempt||https://viz.greynoise.io/tag/ivanti-epm-cve-2024-29824-sqli-attempt 2 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-May-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29824 https://vulncheck.com/xdb/8d6a9418e9bf||https://vulncheck.com/xdb/8d6a9418e9bf , https://vulncheck.com/xdb/4987580c0d13||https://vulncheck.com/xdb/4987580c0d13
CVE-2021-4043 Motion Spell GPAC 09/30/2024 0.00747 5.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db ; https://nvd.nist.gov/vuln/detail/CVE-2021-4043
CVE-2023-25280 D-Link DIR-820 Router 09/30/2024 0.93612 9.8 https://viz.greynoise.io/tag/d-link-dir-820-cve-2023-25280-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-820-cve-2023-25280-rce-attempt FALSE FALSE FALSE https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10358 ; https://nvd.nist.gov/vuln/detail/CVE-2023-25280
CVE-2019-0344 SAP Commerce Cloud 09/30/2024 0.34064 9.8 FALSE FALSE FALSE https://web.archive.org/web/20191214053020/https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 ; https://nvd.nist.gov/vuln/detail/CVE-2019-0344
CVE-2020-15415 DrayTek Multiple Vigor Routers 09/30/2024 0.93089 9.8 https://viz.greynoise.io/tag/draytek-vigor-routers-cve-2020-15415-rce-attempt||https://viz.greynoise.io/tag/draytek-vigor-routers-cve-2020-15415-rce-attempt 4 FALSE FALSE TRUE https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-remote-code-injection/execution-vulnerability-(cve-2020-14472) ; https://nvd.nist.gov/vuln/detail/CVE-2020-15415
CVE-2024-7593 Ivanti Virtual Traffic Manager 09/24/2024 0.94399 9.8 https://viz.greynoise.io/tag/ivanti-vtm-authentication-bypass-cve-2024-7593-attempt||https://viz.greynoise.io/tag/ivanti-vtm-authentication-bypass-cve-2024-7593-attempt 2 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593 ; https://nvd.nist.gov/vuln/detail/CVE-2024-7593 https://vulncheck.com/xdb/8ef95f91d4f9||https://vulncheck.com/xdb/8ef95f91d4f9 , https://vulncheck.com/xdb/9fce86dd34dc||https://vulncheck.com/xdb/9fce86dd34dc
CVE-2024-8963 Ivanti Cloud Services Appliance (CSA) 09/19/2024 0.94296 9.4 5 FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963 https://vulncheck.com/xdb/c1b270462e6a||https://vulncheck.com/xdb/c1b270462e6a , https://vulncheck.com/xdb/3186c7bc1c8b||https://vulncheck.com/xdb/3186c7bc1c8b
CVE-2020-0618 Microsoft SQL Server 09/18/2024 0.94252 8.8 https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-attempt||https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-attempt , https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-check||https://viz.greynoise.io/tag/microsoft-sql-server-reporting-services-rce-check TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618
CVE-2022-21445 Oracle ADF Faces 09/18/2024 0.91483 9.8 https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-scanner||https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-scanner , https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-attempt||https://viz.greynoise.io/tag/oracle-adf-cve-2022-21445-deserialization-rce-attempt FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445 https://vulncheck.com/xdb/df8eb20f5b8e
CVE-2020-14644 Oracle WebLogic Server 09/18/2024 0.90365 9.8 FALSE FALSE FALSE https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644
CVE-2024-27348 Apache HugeGraph-Server 09/18/2024 0.94073 9.8 https://viz.greynoise.io/tag/apache-hugegraph-cve-2024-27348-rce-attempt||https://viz.greynoise.io/tag/apache-hugegraph-cve-2024-27348-rce-attempt 1 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348 https://vulncheck.com/xdb/0817f891a615||https://vulncheck.com/xdb/0817f891a615 , https://vulncheck.com/xdb/486eb74db84b||https://vulncheck.com/xdb/486eb74db84b , https://vulncheck.com/xdb/1e027cb9ed60||https://vulncheck.com/xdb/1e027cb9ed60 , https://vulncheck.com/xdb/74d386417a3e||https://vulncheck.com/xdb/74d386417a3e
CVE-2013-0648 Adobe Flash Player 09/17/2024 0.36931 8.8 FALSE FALSE FALSE https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648
CVE-2014-0502 Adobe Flash Player 09/17/2024 0.86341 8.8 FALSE FALSE FALSE https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502
CVE-2013-0643 Adobe Flash Player 09/17/2024 0.36303 8.8 FALSE FALSE FALSE https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643
CVE-2014-0497 Adobe Flash Player 09/17/2024 0.93453 9.8 FALSE TRUE FALSE https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497
CVE-2024-6670 Progress WhatsUp Gold 09/16/2024 0.94467 9.8 https://viz.greynoise.io/tag/progress-whatsup-gold-cve-2024-6670-rce-attempt||https://viz.greynoise.io/tag/progress-whatsup-gold-cve-2024-6670-rce-attempt 2 TRUE TRUE FALSE https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-6670 https://vulncheck.com/xdb/f11b117a91b0
CVE-2024-43461 Microsoft Windows 09/16/2024 0.09714 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461
CVE-2024-8190 Ivanti Cloud Services Appliance 09/13/2024 0.91307 7.2 https://viz.greynoise.io/tag/ivanti-cloud-services-appliance-os-injection-cve-2024-8190-attempt||https://viz.greynoise.io/tag/ivanti-cloud-services-appliance-os-injection-cve-2024-8190-attempt FALSE TRUE FALSE https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190; https://nvd.nist.gov/vuln/detail/CVE-2024-8190 https://vulncheck.com/xdb/a262b91c09ce||https://vulncheck.com/xdb/a262b91c09ce , https://vulncheck.com/xdb/0e22f5deaf9d||https://vulncheck.com/xdb/0e22f5deaf9d
CVE-2024-38014 Microsoft Windows 09/10/2024 0.10523 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014; https://nvd.nist.gov/vuln/detail/CVE-2024-38014
CVE-2024-38217 Microsoft Windows 09/10/2024 0.14086 5.4 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217; https://nvd.nist.gov/vuln/detail/CVE-2024-38217
CVE-2024-38226 Microsoft Publisher 09/10/2024 0.03751 7.3 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226; https://nvd.nist.gov/vuln/detail/CVE-2024-38226
CVE-2024-43491 Microsoft Windows 09/10/2024 0.12392 9.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491; https://nvd.nist.gov/vuln/detail/CVE-2024-43491
CVE-2024-40766 SonicWall SonicOS 09/09/2024 0.18328 9.8 TRUE FALSE FALSE https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0015; https://nvd.nist.gov/vuln/detail/CVE-2024-40766
CVE-2016-3714 ImageMagick ImageMagick 09/09/2024 0.93877 8.4 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714 https://vulncheck.com/xdb/06fba2780616||https://vulncheck.com/xdb/06fba2780616 , https://vulncheck.com/xdb/a180c1b0bb7e||https://vulncheck.com/xdb/a180c1b0bb7e , https://vulncheck.com/xdb/bef3b078d296||https://vulncheck.com/xdb/bef3b078d296
CVE-2017-1000253 Linux Kernel 09/09/2024 0.55565 7.8 TRUE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86; https://nvd.nist.gov/vuln/detail/CVE-2017-1000253 https://vulncheck.com/xdb/a2d5c439141b||https://vulncheck.com/xdb/a2d5c439141b , https://vulncheck.com/xdb/545d9c502435||https://vulncheck.com/xdb/545d9c502435
CVE-2021-20124 DrayTek VigorConnect 09/03/2024 0.93733 7.5 https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20124-attempt||https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20124-attempt 1 FALSE FALSE FALSE https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20124
CVE-2024-7262 Kingsoft WPS Office 09/03/2024 0.25173 9.3 7.8 FALSE FALSE FALSE While CISA cannot confirm the effectiveness of patches at this time, it is recommended that mitigations be applied per vendor instructions if available. If these instructions cannot be located or if mitigations are unavailable, discontinue the use of the product.; https://nvd.nist.gov/vuln/detail/CVE-2024-7262
CVE-2021-20123 DrayTek VigorConnect 09/03/2024 0.93181 7.5 https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20123-attempt||https://viz.greynoise.io/tag/draytek-vigorconnect-path-traversal-cve-2021-20123-attempt 1 FALSE FALSE FALSE https://www.draytek.com/about/security-advisory/vigorconnect-software-security-vulnerability-(cve-2021-20123-cve-2021-20129); https://nvd.nist.gov/vuln/detail/CVE-2021-20123
CVE-2024-7965 Google Chromium V8 08/28/2024 0.12837 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7965 https://vulncheck.com/xdb/7fca7a836019||https://vulncheck.com/xdb/7fca7a836019 , https://vulncheck.com/xdb/bcc27e4b72fb||https://vulncheck.com/xdb/bcc27e4b72fb
CVE-2024-38856 Apache OFBiz 08/27/2024 0.94366 9.8 https://viz.greynoise.io/tag/apache-ofbiz-rce-cve-2024-38856-attempt||https://viz.greynoise.io/tag/apache-ofbiz-rce-cve-2024-38856-attempt FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w; https://nvd.nist.gov/vuln/detail/CVE-2024-38856 https://vulncheck.com/xdb/edb9d392f8e8||https://vulncheck.com/xdb/edb9d392f8e8 , https://vulncheck.com/xdb/2ca2a8c3b393||https://vulncheck.com/xdb/2ca2a8c3b393 , https://vulncheck.com/xdb/f6c5ff007112||https://vulncheck.com/xdb/f6c5ff007112 , https://vulncheck.com/xdb/d832bf48d567||https://vulncheck.com/xdb/d832bf48d567 , https://vulncheck.com/xdb/e14070e9ff4a||https://vulncheck.com/xdb/e14070e9ff4a , https://vulncheck.com/xdb/034aa8828710||https://vulncheck.com/xdb/034aa8828710 , https://vulncheck.com/xdb/1c1099b3c2cc||https://vulncheck.com/xdb/1c1099b3c2cc , https://vulncheck.com/xdb/a05e462ad7f8||https://vulncheck.com/xdb/a05e462ad7f8 , https://vulncheck.com/xdb/b695c336103d||https://vulncheck.com/xdb/b695c336103d , https://vulncheck.com/xdb/22ff4506fd33||https://vulncheck.com/xdb/22ff4506fd33 , https://vulncheck.com/xdb/cd8eee41112d||https://vulncheck.com/xdb/cd8eee41112d
CVE-2024-7971 Google Chromium V8 08/26/2024 0.00351 9.6 FALSE TRUE FALSE https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html; https://nvd.nist.gov/vuln/detail/CVE-2024-7971 https://vulncheck.com/xdb/a847c8a9da7a
CVE-2024-39717 Versa Director 08/23/2024 0.05514 6.6 FALSE FALSE FALSE https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2024-39717
CVE-2021-33044 Dahua IP Camera Firmware 08/21/2024 0.94269 9.8 https://viz.greynoise.io/tag/dahua-auth-bypass||https://viz.greynoise.io/tag/dahua-auth-bypass 2 FALSE TRUE TRUE https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33044 https://vulncheck.com/xdb/75bd7155e05f||https://vulncheck.com/xdb/75bd7155e05f , https://vulncheck.com/xdb/1d81a72358fa||https://vulncheck.com/xdb/1d81a72358fa
CVE-2021-33045 Dahua IP Camera Firmware 08/21/2024 0.93811 9.8 https://viz.greynoise.io/tag/dahua-auth-bypass||https://viz.greynoise.io/tag/dahua-auth-bypass FALSE FALSE FALSE https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582; https://nvd.nist.gov/vuln/detail/CVE-2021-33045
CVE-2021-31196 Microsoft Exchange Server 08/21/2024 0.03916 7.2 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-31196; https://nvd.nist.gov/vuln/detail/CVE-2021-31196
CVE-2022-0185 Linux Kernel 08/21/2024 0.00749 8.4 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=722d94847de2; https://nvd.nist.gov/vuln/detail/CVE-2022-0185 https://vulncheck.com/xdb/6f9afef80b6d||https://vulncheck.com/xdb/6f9afef80b6d , https://vulncheck.com/xdb/38c4c63f9d6f||https://vulncheck.com/xdb/38c4c63f9d6f , https://vulncheck.com/xdb/b96fe0fc5a17||https://vulncheck.com/xdb/b96fe0fc5a17 , https://vulncheck.com/xdb/617305981f80||https://vulncheck.com/xdb/617305981f80 , https://vulncheck.com/xdb/c66aa08676a5||https://vulncheck.com/xdb/c66aa08676a5 , https://vulncheck.com/xdb/ee5208622092||https://vulncheck.com/xdb/ee5208622092
CVE-2024-23897 Jenkins Jenkins Command Line Interface (CLI) 08/19/2024 0.94466 9.8 https://viz.greynoise.io/tag/jenkins-cli-arbitrary-file-read-cve-2024-23897-attempt||https://viz.greynoise.io/tag/jenkins-cli-arbitrary-file-read-cve-2024-23897-attempt 1 TRUE TRUE FALSE https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314; https://nvd.nist.gov/vuln/detail/CVE-2024-23897 https://vulncheck.com/xdb/58ee3e361a9c||https://vulncheck.com/xdb/58ee3e361a9c , https://vulncheck.com/xdb/4ebb59b08827||https://vulncheck.com/xdb/4ebb59b08827 , https://vulncheck.com/xdb/13fbb1e454d4||https://vulncheck.com/xdb/13fbb1e454d4 , https://vulncheck.com/xdb/0013389cb2b5||https://vulncheck.com/xdb/0013389cb2b5 , https://vulncheck.com/xdb/2a862a5f18bf||https://vulncheck.com/xdb/2a862a5f18bf , https://vulncheck.com/xdb/f548a7c24191||https://vulncheck.com/xdb/f548a7c24191 , https://vulncheck.com/xdb/45c1b452f366||https://vulncheck.com/xdb/45c1b452f366 , https://vulncheck.com/xdb/020fda9d3348||https://vulncheck.com/xdb/020fda9d3348 , https://vulncheck.com/xdb/8a21c598c826||https://vulncheck.com/xdb/8a21c598c826 , https://vulncheck.com/xdb/56f0947af384||https://vulncheck.com/xdb/56f0947af384 , https://vulncheck.com/xdb/066b2623ad07||https://vulncheck.com/xdb/066b2623ad07 , https://vulncheck.com/xdb/97119087d54d||https://vulncheck.com/xdb/97119087d54d , https://vulncheck.com/xdb/9fd38a912fe1||https://vulncheck.com/xdb/9fd38a912fe1 , https://vulncheck.com/xdb/b79e6878d0b3||https://vulncheck.com/xdb/b79e6878d0b3 , https://vulncheck.com/xdb/f5619d4199d8||https://vulncheck.com/xdb/f5619d4199d8 , https://vulncheck.com/xdb/20c72b87534c||https://vulncheck.com/xdb/20c72b87534c , https://vulncheck.com/xdb/16ccb84aebed||https://vulncheck.com/xdb/16ccb84aebed , https://vulncheck.com/xdb/e82dc77437a5||https://vulncheck.com/xdb/e82dc77437a5 , https://vulncheck.com/xdb/56f3efc97d5a||https://vulncheck.com/xdb/56f3efc97d5a , https://vulncheck.com/xdb/8fb56cde4d69||https://vulncheck.com/xdb/8fb56cde4d69 , https://vulncheck.com/xdb/015a1eb7b8c5||https://vulncheck.com/xdb/015a1eb7b8c5 , https://vulncheck.com/xdb/c79b60996775||https://vulncheck.com/xdb/c79b60996775 , https://vulncheck.com/xdb/ea61ab6382c6||https://vulncheck.com/xdb/ea61ab6382c6 , https://vulncheck.com/xdb/59f5833a8dd0||https://vulncheck.com/xdb/59f5833a8dd0 , https://vulncheck.com/xdb/f240e8d471e6||https://vulncheck.com/xdb/f240e8d471e6 , https://vulncheck.com/xdb/93fd98979e35||https://vulncheck.com/xdb/93fd98979e35 , https://vulncheck.com/xdb/bafdcb3d292c||https://vulncheck.com/xdb/bafdcb3d292c , https://vulncheck.com/xdb/98fe8aa360ae||https://vulncheck.com/xdb/98fe8aa360ae , https://vulncheck.com/xdb/6028cfd20f54||https://vulncheck.com/xdb/6028cfd20f54 , https://vulncheck.com/xdb/e7f68889c96b||https://vulncheck.com/xdb/e7f68889c96b , https://vulncheck.com/xdb/29a3cbe431c7||https://vulncheck.com/xdb/29a3cbe431c7 , https://vulncheck.com/xdb/2e81d41ecf10||https://vulncheck.com/xdb/2e81d41ecf10 , https://vulncheck.com/xdb/0450095821bb||https://vulncheck.com/xdb/0450095821bb , https://vulncheck.com/xdb/5f45754388ab||https://vulncheck.com/xdb/5f45754388ab , https://vulncheck.com/xdb/f520f4462657||https://vulncheck.com/xdb/f520f4462657
CVE-2024-28986 SolarWinds Web Help Desk 08/15/2024 0.32620 9.8 FALSE FALSE FALSE https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28986; https://nvd.nist.gov/vuln/detail/CVE-2024-28986
CVE-2024-38107 Microsoft Windows 08/13/2024 0.03564 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38107; https://nvd.nist.gov/vuln/detail/CVE-2024-38107
CVE-2024-38178 Microsoft Windows 08/13/2024 0.17040 7.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178; https://nvd.nist.gov/vuln/detail/CVE-2024-38178
CVE-2024-38213 Microsoft Windows 08/13/2024 0.71705 6.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38213; https://nvd.nist.gov/vuln/detail/CVE-2024-38213
CVE-2024-38193 Microsoft Windows 08/13/2024 0.73164 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193 https://vulncheck.com/xdb/fe97c3479e7f||https://vulncheck.com/xdb/fe97c3479e7f , https://vulncheck.com/xdb/083768bfaf83||https://vulncheck.com/xdb/083768bfaf83
CVE-2024-38106 Microsoft Windows 08/13/2024 0.00403 7.0 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106; https://nvd.nist.gov/vuln/detail/CVE-2024-38106
CVE-2024-38189 Microsoft Project 08/13/2024 0.38016 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189; https://nvd.nist.gov/vuln/detail/CVE-2024-38189
CVE-2024-36971 Android Kernel 08/07/2024 0.00088 7.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971
CVE-2024-32113 Apache OFBiz 08/07/2024 0.93490 9.8 https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-32113-path-traversal-attempt||https://viz.greynoise.io/tag/apache-ofbiz-cve-2024-32113-path-traversal-attempt 0 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd; https://nvd.nist.gov/vuln/detail/CVE-2024-32113 https://vulncheck.com/xdb/334230980654||https://vulncheck.com/xdb/334230980654 , https://vulncheck.com/xdb/3a5fd521c416||https://vulncheck.com/xdb/3a5fd521c416 , https://vulncheck.com/xdb/928095ddd898||https://vulncheck.com/xdb/928095ddd898
CVE-2018-0824 Microsoft Windows 08/05/2024 0.85450 8.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824 https://vulncheck.com/xdb/a5ebdd77a6af
CVE-2024-37085 VMware ESXi 07/30/2024 0.53731 6.8 TRUE FALSE FALSE https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085
CVE-2023-45249 Acronis Cyber Infrastructure (ACI) 07/29/2024 0.59652 9.8 FALSE TRUE FALSE https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249
CVE-2024-4879 ServiceNow Utah, Vancouver, and Washington DC Now Platform 07/29/2024 0.94336 9.3 9.8 https://viz.greynoise.io/tag/servicenow-template-injection-cve-2024-4879-attempt||https://viz.greynoise.io/tag/servicenow-template-injection-cve-2024-4879-attempt FALSE TRUE FALSE https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879 https://vulncheck.com/xdb/76f4c048d613||https://vulncheck.com/xdb/76f4c048d613 , https://vulncheck.com/xdb/242ab81b8f99||https://vulncheck.com/xdb/242ab81b8f99 , https://vulncheck.com/xdb/a79b35b9ebfa||https://vulncheck.com/xdb/a79b35b9ebfa , https://vulncheck.com/xdb/fe3d3d16f09c||https://vulncheck.com/xdb/fe3d3d16f09c , https://vulncheck.com/xdb/468d11a46eb6||https://vulncheck.com/xdb/468d11a46eb6 , https://vulncheck.com/xdb/694933652e15||https://vulncheck.com/xdb/694933652e15 , https://vulncheck.com/xdb/b11c6c3afaf3||https://vulncheck.com/xdb/b11c6c3afaf3 , https://vulncheck.com/xdb/16b3983d129b||https://vulncheck.com/xdb/16b3983d129b , https://vulncheck.com/xdb/bfd7c0b964ed||https://vulncheck.com/xdb/bfd7c0b964ed
CVE-2024-5217 ServiceNow Utah, Vancouver, and Washington DC Now Platform 07/29/2024 0.94196 9.2 9.8 https://viz.greynoise.io/tag/servicenow-input-validation-exploit-cve-2024-5217-attempt||https://viz.greynoise.io/tag/servicenow-input-validation-exploit-cve-2024-5217-attempt 0 FALSE TRUE FALSE https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217 https://vulncheck.com/xdb/31835aad0114
CVE-2012-4792 Microsoft Internet Explorer 07/23/2024 0.89213 8.8 FALSE TRUE FALSE https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792
CVE-2024-39891 Twilio Authy 07/23/2024 0.18149 5.3 FALSE FALSE FALSE https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS; https://nvd.nist.gov/vuln/detail/CVE-2024-39891
CVE-2024-34102 Adobe Commerce and Magento Open Source 07/17/2024 0.94373 9.8 https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-attempt||https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-attempt , https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-check||https://viz.greynoise.io/tag/apache-commerce-and-magento-cve-2024-34102-xxe-check , https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-attempt||https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-attempt , https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-check||https://viz.greynoise.io/tag/adobe-commerce-and-magento-cve-2024-34102-xxe-check 0 FALSE TRUE FALSE https://helpx.adobe.com/security/products/magento/apsb24-40.html; https://nvd.nist.gov/vuln/detail/CVE-2024-34102 https://vulncheck.com/xdb/2eb4d44dc79b||https://vulncheck.com/xdb/2eb4d44dc79b , https://vulncheck.com/xdb/b9a5654f364d||https://vulncheck.com/xdb/b9a5654f364d , https://vulncheck.com/xdb/771b0f9ad8b9||https://vulncheck.com/xdb/771b0f9ad8b9 , https://vulncheck.com/xdb/56d612cb301b||https://vulncheck.com/xdb/56d612cb301b , https://vulncheck.com/xdb/31319adbe12a||https://vulncheck.com/xdb/31319adbe12a , https://vulncheck.com/xdb/e16ac34e34d7||https://vulncheck.com/xdb/e16ac34e34d7 , https://vulncheck.com/xdb/ff651d9ccadf||https://vulncheck.com/xdb/ff651d9ccadf , https://vulncheck.com/xdb/18320f3f459c||https://vulncheck.com/xdb/18320f3f459c , https://vulncheck.com/xdb/e10072b9959a||https://vulncheck.com/xdb/e10072b9959a , https://vulncheck.com/xdb/b740eaf30da0||https://vulncheck.com/xdb/b740eaf30da0 , https://vulncheck.com/xdb/62c07de93469||https://vulncheck.com/xdb/62c07de93469 , https://vulncheck.com/xdb/f7ec53083d00||https://vulncheck.com/xdb/f7ec53083d00 , https://vulncheck.com/xdb/68297a933a3c||https://vulncheck.com/xdb/68297a933a3c
CVE-2024-28995 SolarWinds Serv-U 07/17/2024 0.94367 8.6 https://viz.greynoise.io/tag/solarwinds-serv-u-cve-2024-28995-path-traversal-attempt||https://viz.greynoise.io/tag/solarwinds-serv-u-cve-2024-28995-path-traversal-attempt 8 FALSE TRUE FALSE https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995; https://nvd.nist.gov/vuln/detail/CVE-2024-28995 https://vulncheck.com/xdb/fbe1b8d46402||https://vulncheck.com/xdb/fbe1b8d46402 , https://vulncheck.com/xdb/7cf3d7653ea8||https://vulncheck.com/xdb/7cf3d7653ea8 , https://vulncheck.com/xdb/674e1185ddc2||https://vulncheck.com/xdb/674e1185ddc2 , https://vulncheck.com/xdb/04919da4277e||https://vulncheck.com/xdb/04919da4277e , https://vulncheck.com/xdb/a331ef4fdde9||https://vulncheck.com/xdb/a331ef4fdde9 , https://vulncheck.com/xdb/99c2ff5b21dd||https://vulncheck.com/xdb/99c2ff5b21dd , https://vulncheck.com/xdb/ed3ef6870d11||https://vulncheck.com/xdb/ed3ef6870d11 , https://vulncheck.com/xdb/e7b7e88149e0||https://vulncheck.com/xdb/e7b7e88149e0 , https://vulncheck.com/xdb/c54c86fb6c5e||https://vulncheck.com/xdb/c54c86fb6c5e , https://vulncheck.com/xdb/476fdc663c01||https://vulncheck.com/xdb/476fdc663c01
CVE-2022-22948 VMware vCenter Server 07/17/2024 0.11504 6.5 FALSE TRUE FALSE https://www.vmware.com/security/advisories/VMSA-2022-0009.html; https://nvd.nist.gov/vuln/detail/CVE-2022-22948
CVE-2024-36401 OSGeo GeoServer 07/15/2024 0.94418 9.8 https://viz.greynoise.io/tag/geoserver-geotools-cve-2024-36401-rce-attempt||https://viz.greynoise.io/tag/geoserver-geotools-cve-2024-36401-rce-attempt 5 FALSE TRUE FALSE This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ; https://nvd.nist.gov/vuln/detail/CVE-2024-36401 https://vulncheck.com/xdb/83b62ab68571||https://vulncheck.com/xdb/83b62ab68571 , https://vulncheck.com/xdb/82eba5264bfb||https://vulncheck.com/xdb/82eba5264bfb , https://vulncheck.com/xdb/8a38414bb4b7||https://vulncheck.com/xdb/8a38414bb4b7 , https://vulncheck.com/xdb/432db9e70d9e||https://vulncheck.com/xdb/432db9e70d9e , https://vulncheck.com/xdb/02f273d018e8||https://vulncheck.com/xdb/02f273d018e8 , https://vulncheck.com/xdb/584a39f9a9cb||https://vulncheck.com/xdb/584a39f9a9cb , https://vulncheck.com/xdb/6cab2db287eb||https://vulncheck.com/xdb/6cab2db287eb , https://vulncheck.com/xdb/07cf7a5d5e1b||https://vulncheck.com/xdb/07cf7a5d5e1b , https://vulncheck.com/xdb/3d8baa68c24c||https://vulncheck.com/xdb/3d8baa68c24c , https://vulncheck.com/xdb/e5537b0b1e67||https://vulncheck.com/xdb/e5537b0b1e67 , https://vulncheck.com/xdb/fe7544c5185c||https://vulncheck.com/xdb/fe7544c5185c , https://vulncheck.com/xdb/6cff7d86193f||https://vulncheck.com/xdb/6cff7d86193f , https://vulncheck.com/xdb/0a69e625f39a||https://vulncheck.com/xdb/0a69e625f39a , https://vulncheck.com/xdb/f4801e6b28d5||https://vulncheck.com/xdb/f4801e6b28d5 , https://vulncheck.com/xdb/b1faacbe8f25||https://vulncheck.com/xdb/b1faacbe8f25 , https://vulncheck.com/xdb/e908c49bab48||https://vulncheck.com/xdb/e908c49bab48 , https://vulncheck.com/xdb/a4b1ddfc8280||https://vulncheck.com/xdb/a4b1ddfc8280 , https://vulncheck.com/xdb/46abf92ec267||https://vulncheck.com/xdb/46abf92ec267 , https://vulncheck.com/xdb/1dbce5a4766b||https://vulncheck.com/xdb/1dbce5a4766b
CVE-2024-23692 Rejetto HTTP File Server 07/09/2024 0.94285 9.8 https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-attempt||https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-attempt , https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-check||https://viz.greynoise.io/tag/rejetto-http-file-server-cve-2024-23692-ssti-check 2 FALSE TRUE FALSE The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692 https://vulncheck.com/xdb/c6a68c1f041c||https://vulncheck.com/xdb/c6a68c1f041c , https://vulncheck.com/xdb/2a1f7d7aff04||https://vulncheck.com/xdb/2a1f7d7aff04 , https://vulncheck.com/xdb/0a411a2452d2||https://vulncheck.com/xdb/0a411a2452d2 , https://vulncheck.com/xdb/c299ffad376a||https://vulncheck.com/xdb/c299ffad376a , https://vulncheck.com/xdb/92d41c55acaa||https://vulncheck.com/xdb/92d41c55acaa , https://vulncheck.com/xdb/2ec70b75b126||https://vulncheck.com/xdb/2ec70b75b126 , https://vulncheck.com/xdb/46740685e776||https://vulncheck.com/xdb/46740685e776 , https://vulncheck.com/xdb/4ac87aa915cb||https://vulncheck.com/xdb/4ac87aa915cb , https://vulncheck.com/xdb/9cd77e6b6f2e||https://vulncheck.com/xdb/9cd77e6b6f2e , https://vulncheck.com/xdb/c1ccd57299ea||https://vulncheck.com/xdb/c1ccd57299ea , https://vulncheck.com/xdb/6274be6d1fb5||https://vulncheck.com/xdb/6274be6d1fb5 , https://vulncheck.com/xdb/d5b6ecca1a09||https://vulncheck.com/xdb/d5b6ecca1a09
CVE-2024-38080 Microsoft Windows 07/09/2024 0.14770 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080 https://vulncheck.com/xdb/69e7cda43d47
CVE-2024-38112 Microsoft Windows 07/09/2024 0.90957 7.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112
CVE-2024-20399 Cisco NX-OS 07/02/2024 0.00142 6.0 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399
CVE-2022-24816 OSGeo JAI-EXT 06/26/2024 0.94163 10.0 https://viz.greynoise.io/tag/geoserver-rce-attempt||https://viz.greynoise.io/tag/geoserver-rce-attempt 5 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816 https://vulncheck.com/xdb/8c423c9c5367
CVE-2022-2586 Linux Kernel 06/26/2024 0.01471 5.3 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586 https://vulncheck.com/xdb/174eaee64a01||https://vulncheck.com/xdb/174eaee64a01 , https://vulncheck.com/xdb/6feeb109d166||https://vulncheck.com/xdb/6feeb109d166 , https://vulncheck.com/xdb/371b22b792df||https://vulncheck.com/xdb/371b22b792df
CVE-2020-13965 Roundcube Webmail 06/26/2024 0.85831 6.1 FALSE FALSE FALSE https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965
CVE-2024-26169 Microsoft Windows 06/13/2024 0.30848 7.8 TRUE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169; https://nvd.nist.gov/vuln/detail/CVE-2024-26169
CVE-2024-32896 Android Pixel 06/13/2024 0.00046 7.8 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/pixel/2024-06-01; https://nvd.nist.gov/vuln/detail/CVE-2024-32896
CVE-2024-4358 Progress Telerik Report Server 06/13/2024 0.94254 9.8 https://viz.greynoise.io/tag/telerik-report-server-cve-2024-4358-auth-bypass-attempt||https://viz.greynoise.io/tag/telerik-report-server-cve-2024-4358-auth-bypass-attempt 2 FALSE TRUE FALSE https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358 https://vulncheck.com/xdb/d93bd725c202||https://vulncheck.com/xdb/d93bd725c202 , https://vulncheck.com/xdb/08a930e2d98e||https://vulncheck.com/xdb/08a930e2d98e , https://vulncheck.com/xdb/5ffe12856f76||https://vulncheck.com/xdb/5ffe12856f76 , https://vulncheck.com/xdb/eaffc0a0430d||https://vulncheck.com/xdb/eaffc0a0430d , https://vulncheck.com/xdb/8cf1f3a0513a||https://vulncheck.com/xdb/8cf1f3a0513a , https://vulncheck.com/xdb/6c74175dbba7||https://vulncheck.com/xdb/6c74175dbba7
CVE-2024-4610 Arm Mali GPU Kernel Driver 06/12/2024 0.00086 7.8 FALSE FALSE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2024-4610
CVE-2024-4577 PHP Group PHP 06/12/2024 0.94412 9.8 https://viz.greynoise.io/tag/php-cve-2024-4577-rce-attempt||https://viz.greynoise.io/tag/php-cve-2024-4577-rce-attempt 5 TRUE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://www.php.net/ChangeLog-8.php#; https://nvd.nist.gov/vuln/detail/CVE-2024-4577 https://vulncheck.com/xdb/d3b12b49d03c||https://vulncheck.com/xdb/d3b12b49d03c , https://vulncheck.com/xdb/7a69cea7f16d||https://vulncheck.com/xdb/7a69cea7f16d , https://vulncheck.com/xdb/b2fa764f2781||https://vulncheck.com/xdb/b2fa764f2781 , https://vulncheck.com/xdb/975f3d4508fd||https://vulncheck.com/xdb/975f3d4508fd , https://vulncheck.com/xdb/c3ffd6462c70||https://vulncheck.com/xdb/c3ffd6462c70 , https://vulncheck.com/xdb/aed5b2a31554||https://vulncheck.com/xdb/aed5b2a31554 , https://vulncheck.com/xdb/218b19f4d22e||https://vulncheck.com/xdb/218b19f4d22e , https://vulncheck.com/xdb/c8c379f83d10||https://vulncheck.com/xdb/c8c379f83d10 , https://vulncheck.com/xdb/64f14f4beecb||https://vulncheck.com/xdb/64f14f4beecb , https://vulncheck.com/xdb/cb830f9d202f||https://vulncheck.com/xdb/cb830f9d202f , https://vulncheck.com/xdb/aa3899b675a4||https://vulncheck.com/xdb/aa3899b675a4 , https://vulncheck.com/xdb/3e8fa83c20c9||https://vulncheck.com/xdb/3e8fa83c20c9 , https://vulncheck.com/xdb/20d85040c310||https://vulncheck.com/xdb/20d85040c310 , https://vulncheck.com/xdb/825b99bdb560||https://vulncheck.com/xdb/825b99bdb560 , https://vulncheck.com/xdb/081170ce66e7||https://vulncheck.com/xdb/081170ce66e7 , https://vulncheck.com/xdb/56c6c80d0bc4||https://vulncheck.com/xdb/56c6c80d0bc4 , https://vulncheck.com/xdb/c4c00e052574||https://vulncheck.com/xdb/c4c00e052574 , https://vulncheck.com/xdb/552c4106ae73||https://vulncheck.com/xdb/552c4106ae73 , https://vulncheck.com/xdb/c8e637167f42||https://vulncheck.com/xdb/c8e637167f42 , https://vulncheck.com/xdb/e294281b4747||https://vulncheck.com/xdb/e294281b4747 , https://vulncheck.com/xdb/64046c52ba42||https://vulncheck.com/xdb/64046c52ba42 , https://vulncheck.com/xdb/7dd0ca311187||https://vulncheck.com/xdb/7dd0ca311187 , https://vulncheck.com/xdb/0b2ec7cacbad||https://vulncheck.com/xdb/0b2ec7cacbad , https://vulncheck.com/xdb/1531cf762de4||https://vulncheck.com/xdb/1531cf762de4 , https://vulncheck.com/xdb/5d63cc33def4||https://vulncheck.com/xdb/5d63cc33def4 , https://vulncheck.com/xdb/024996c990cc||https://vulncheck.com/xdb/024996c990cc , https://vulncheck.com/xdb/cd32f509d4ab||https://vulncheck.com/xdb/cd32f509d4ab , https://vulncheck.com/xdb/4f6effc389cd||https://vulncheck.com/xdb/4f6effc389cd , https://vulncheck.com/xdb/912529ac004f||https://vulncheck.com/xdb/912529ac004f , https://vulncheck.com/xdb/d982c4edc474||https://vulncheck.com/xdb/d982c4edc474 , https://vulncheck.com/xdb/ff0f9bccbf68||https://vulncheck.com/xdb/ff0f9bccbf68 , https://vulncheck.com/xdb/1287f9a713c6||https://vulncheck.com/xdb/1287f9a713c6 , https://vulncheck.com/xdb/0c4b91081cb3||https://vulncheck.com/xdb/0c4b91081cb3 , https://vulncheck.com/xdb/d06e30d57aaf||https://vulncheck.com/xdb/d06e30d57aaf , https://vulncheck.com/xdb/112f55c12274||https://vulncheck.com/xdb/112f55c12274 , https://vulncheck.com/xdb/b2eb4bae1e05||https://vulncheck.com/xdb/b2eb4bae1e05 , https://vulncheck.com/xdb/55023f1ef157||https://vulncheck.com/xdb/55023f1ef157 , https://vulncheck.com/xdb/b914f202bec2||https://vulncheck.com/xdb/b914f202bec2 , https://vulncheck.com/xdb/94a35549d41e||https://vulncheck.com/xdb/94a35549d41e , https://vulncheck.com/xdb/5d24a3878ae0||https://vulncheck.com/xdb/5d24a3878ae0 , https://vulncheck.com/xdb/acfef3dab7ab||https://vulncheck.com/xdb/acfef3dab7ab , https://vulncheck.com/xdb/bd76b0f41ae3||https://vulncheck.com/xdb/bd76b0f41ae3 , https://vulncheck.com/xdb/cc11323372a3||https://vulncheck.com/xdb/cc11323372a3 , https://vulncheck.com/xdb/30f842b7c8c9||https://vulncheck.com/xdb/30f842b7c8c9 , https://vulncheck.com/xdb/bd5de034d60f||https://vulncheck.com/xdb/bd5de034d60f , https://vulncheck.com/xdb/24731ac505a6||https://vulncheck.com/xdb/24731ac505a6 , https://vulncheck.com/xdb/ed23c8ab0f6a||https://vulncheck.com/xdb/ed23c8ab0f6a , https://vulncheck.com/xdb/7ee6ed2bc73f||https://vulncheck.com/xdb/7ee6ed2bc73f , https://vulncheck.com/xdb/5a6770491004||https://vulncheck.com/xdb/5a6770491004 , https://vulncheck.com/xdb/48d0c04eff37||https://vulncheck.com/xdb/48d0c04eff37 , https://vulncheck.com/xdb/fb1b068d71fb||https://vulncheck.com/xdb/fb1b068d71fb , https://vulncheck.com/xdb/d89b163c7ba9||https://vulncheck.com/xdb/d89b163c7ba9 , https://vulncheck.com/xdb/615662ae6add||https://vulncheck.com/xdb/615662ae6add
CVE-2017-3506 Oracle WebLogic Server 06/03/2024 0.94409 7.4 https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-3506-os-injection-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-3506-os-injection-attempt FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506 https://vulncheck.com/xdb/7f8c560d1204
CVE-2024-1086 Linux Kernel 05/30/2024 0.85083 7.8 TRUE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660; https://nvd.nist.gov/vuln/detail/CVE-2024-1086 https://vulncheck.com/xdb/811b53a4b2e6||https://vulncheck.com/xdb/811b53a4b2e6 , https://vulncheck.com/xdb/0235a1b65409||https://vulncheck.com/xdb/0235a1b65409 , https://vulncheck.com/xdb/45b843d101d4||https://vulncheck.com/xdb/45b843d101d4
CVE-2024-24919 Check Point Quantum Security Gateways 05/30/2024 0.94327 8.6 https://viz.greynoise.io/tag/check-point-quantum-gateway-cve-2024-24919-information-dislosure-attempt||https://viz.greynoise.io/tag/check-point-quantum-gateway-cve-2024-24919-information-dislosure-attempt 5 TRUE TRUE FALSE https://support.checkpoint.com/results/sk/sk182336 ; https://nvd.nist.gov/vuln/detail/CVE-2024-24919 https://vulncheck.com/xdb/e82839fb2a3e||https://vulncheck.com/xdb/e82839fb2a3e , https://vulncheck.com/xdb/f36c4553046b||https://vulncheck.com/xdb/f36c4553046b , https://vulncheck.com/xdb/ab8c1e3e3646||https://vulncheck.com/xdb/ab8c1e3e3646 , https://vulncheck.com/xdb/1913565768f5||https://vulncheck.com/xdb/1913565768f5 , https://vulncheck.com/xdb/6243e133d9ea||https://vulncheck.com/xdb/6243e133d9ea , https://vulncheck.com/xdb/de9876a305c5||https://vulncheck.com/xdb/de9876a305c5 , https://vulncheck.com/xdb/0c9c869a08d3||https://vulncheck.com/xdb/0c9c869a08d3 , https://vulncheck.com/xdb/6b522b401a39||https://vulncheck.com/xdb/6b522b401a39 , https://vulncheck.com/xdb/9e2e6fb95473||https://vulncheck.com/xdb/9e2e6fb95473 , https://vulncheck.com/xdb/30fab5d1e270||https://vulncheck.com/xdb/30fab5d1e270 , https://vulncheck.com/xdb/6c1e9ba4333a||https://vulncheck.com/xdb/6c1e9ba4333a , https://vulncheck.com/xdb/d71f8b001a77||https://vulncheck.com/xdb/d71f8b001a77 , https://vulncheck.com/xdb/68cc499283d4||https://vulncheck.com/xdb/68cc499283d4 , https://vulncheck.com/xdb/73a9276dba9f||https://vulncheck.com/xdb/73a9276dba9f , https://vulncheck.com/xdb/f6944d96f1ec||https://vulncheck.com/xdb/f6944d96f1ec , https://vulncheck.com/xdb/092dd3ba67bd||https://vulncheck.com/xdb/092dd3ba67bd , https://vulncheck.com/xdb/b4d18c6bf06e||https://vulncheck.com/xdb/b4d18c6bf06e , https://vulncheck.com/xdb/91991bb01e09||https://vulncheck.com/xdb/91991bb01e09 , https://vulncheck.com/xdb/a3a8703af707||https://vulncheck.com/xdb/a3a8703af707 , https://vulncheck.com/xdb/41aac64174f4||https://vulncheck.com/xdb/41aac64174f4 , https://vulncheck.com/xdb/a1c0ae86d246||https://vulncheck.com/xdb/a1c0ae86d246 , https://vulncheck.com/xdb/f22cf8e4cd18||https://vulncheck.com/xdb/f22cf8e4cd18 , https://vulncheck.com/xdb/0a8cb6d49711||https://vulncheck.com/xdb/0a8cb6d49711 , https://vulncheck.com/xdb/de808000c9d3||https://vulncheck.com/xdb/de808000c9d3 , https://vulncheck.com/xdb/9d791cc169bf||https://vulncheck.com/xdb/9d791cc169bf , https://vulncheck.com/xdb/6334b1c021a5||https://vulncheck.com/xdb/6334b1c021a5 , https://vulncheck.com/xdb/51cb208786d3||https://vulncheck.com/xdb/51cb208786d3 , https://vulncheck.com/xdb/a709114311f6||https://vulncheck.com/xdb/a709114311f6 , https://vulncheck.com/xdb/b21251c38b61||https://vulncheck.com/xdb/b21251c38b61 , https://vulncheck.com/xdb/73f0d5b75fbd||https://vulncheck.com/xdb/73f0d5b75fbd , https://vulncheck.com/xdb/4cae1121ac6d||https://vulncheck.com/xdb/4cae1121ac6d , https://vulncheck.com/xdb/47b5fb744bf8||https://vulncheck.com/xdb/47b5fb744bf8 , https://vulncheck.com/xdb/9a3fb12624b4||https://vulncheck.com/xdb/9a3fb12624b4 , https://vulncheck.com/xdb/445c6eae61dd||https://vulncheck.com/xdb/445c6eae61dd , https://vulncheck.com/xdb/4a6e5f342e96||https://vulncheck.com/xdb/4a6e5f342e96 , https://vulncheck.com/xdb/6f9dd13e5f7e||https://vulncheck.com/xdb/6f9dd13e5f7e , https://vulncheck.com/xdb/35b00d2a87cc||https://vulncheck.com/xdb/35b00d2a87cc , https://vulncheck.com/xdb/f776bcf16de3||https://vulncheck.com/xdb/f776bcf16de3 , https://vulncheck.com/xdb/cb400c008cb4||https://vulncheck.com/xdb/cb400c008cb4 , https://vulncheck.com/xdb/307191685e1f||https://vulncheck.com/xdb/307191685e1f , https://vulncheck.com/xdb/c4b3fdf4a5a0||https://vulncheck.com/xdb/c4b3fdf4a5a0 , https://vulncheck.com/xdb/6d752fbb937c||https://vulncheck.com/xdb/6d752fbb937c , https://vulncheck.com/xdb/2df82d697c50||https://vulncheck.com/xdb/2df82d697c50 , https://vulncheck.com/xdb/8ee8515985ca||https://vulncheck.com/xdb/8ee8515985ca , https://vulncheck.com/xdb/50e7b76bdc9f||https://vulncheck.com/xdb/50e7b76bdc9f , https://vulncheck.com/xdb/c74ebcca3b51||https://vulncheck.com/xdb/c74ebcca3b51 , https://vulncheck.com/xdb/8efe86b85385||https://vulncheck.com/xdb/8efe86b85385 , https://vulncheck.com/xdb/70994ec0c5d3||https://vulncheck.com/xdb/70994ec0c5d3 , https://vulncheck.com/xdb/4b560c5574a3||https://vulncheck.com/xdb/4b560c5574a3 , https://vulncheck.com/xdb/f4c58c27ce8d||https://vulncheck.com/xdb/f4c58c27ce8d , https://vulncheck.com/xdb/ac33617aef51||https://vulncheck.com/xdb/ac33617aef51 , https://vulncheck.com/xdb/1b7c709c6360||https://vulncheck.com/xdb/1b7c709c6360 , https://vulncheck.com/xdb/28effee549e0||https://vulncheck.com/xdb/28effee549e0 , https://vulncheck.com/xdb/3e1daa797bf9||https://vulncheck.com/xdb/3e1daa797bf9
CVE-2024-4978 Justice AV Solutions Viewer 05/29/2024 0.24245 8.7 8.4 FALSE FALSE FALSE Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads; https://nvd.nist.gov/vuln/detail/CVE-2024-4978
CVE-2024-5274 Google Chromium V8 05/28/2024 0.03360 9.6 FALSE TRUE FALSE https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-5274 https://vulncheck.com/xdb/e42c2ff2de33
CVE-2020-17519 Apache Flink 05/23/2024 0.94413 7.5 https://viz.greynoise.io/tag/apache-flink-path-traversal-attempt||https://viz.greynoise.io/tag/apache-flink-path-traversal-attempt 2 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://lists.apache.org/thread/typ0h03zyfrzjqlnb7plh64df1g2383d; https://nvd.nist.gov/vuln/detail/CVE-2020-17519 https://vulncheck.com/xdb/1b1d6d820b0c||https://vulncheck.com/xdb/1b1d6d820b0c , https://vulncheck.com/xdb/02f7b73ab684||https://vulncheck.com/xdb/02f7b73ab684 , https://vulncheck.com/xdb/1620553c643a||https://vulncheck.com/xdb/1620553c643a , https://vulncheck.com/xdb/5060de9f4f15||https://vulncheck.com/xdb/5060de9f4f15 , https://vulncheck.com/xdb/259c72303ba8||https://vulncheck.com/xdb/259c72303ba8 , https://vulncheck.com/xdb/a0b10abc1d63||https://vulncheck.com/xdb/a0b10abc1d63 , https://vulncheck.com/xdb/7c9fe2b962fd||https://vulncheck.com/xdb/7c9fe2b962fd , https://vulncheck.com/xdb/7fe03bf0f0a6||https://vulncheck.com/xdb/7fe03bf0f0a6 , https://vulncheck.com/xdb/c096ce6f775b||https://vulncheck.com/xdb/c096ce6f775b , https://vulncheck.com/xdb/50a45f679975||https://vulncheck.com/xdb/50a45f679975 , https://vulncheck.com/xdb/9be1f64fbcd2||https://vulncheck.com/xdb/9be1f64fbcd2
CVE-2024-4947 Google Chromium V8 05/20/2024 0.00354 9.6 FALSE FALSE FALSE https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4947
CVE-2023-43208 NextGen Healthcare Mirth Connect 05/20/2024 0.94413 9.8 https://viz.greynoise.io/tag/nextgen-mirth-connect-cve-2023-43208-rce-attempt||https://viz.greynoise.io/tag/nextgen-mirth-connect-cve-2023-43208-rce-attempt 3 TRUE TRUE TRUE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New ; https://nvd.nist.gov/vuln/detail/CVE-2023-43208 https://vulncheck.com/xdb/467a9c5dfc03||https://vulncheck.com/xdb/467a9c5dfc03 , https://vulncheck.com/xdb/5d0f4efbe9bb||https://vulncheck.com/xdb/5d0f4efbe9bb , https://vulncheck.com/xdb/ee5e1ec1b051||https://vulncheck.com/xdb/ee5e1ec1b051
CVE-2021-40655 D-Link DIR-605 Router 05/16/2024 0.93554 7.5 https://viz.greynoise.io/tag/d-link-dir-605-information-disclosure-attempt||https://viz.greynoise.io/tag/d-link-dir-605-information-disclosure-attempt FALSE FALSE FALSE https://legacy.us.dlink.com/pages/product.aspx?id=2b09e95d90ff4cb38830ecc04c89cee5; https://nvd.nist.gov/vuln/detail/CVE-2021-40655
CVE-2024-4761 Google Chromium V8 05/16/2024 0.03505 8.8 FALSE FALSE FALSE https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html; https://nvd.nist.gov/vuln/detail/CVE-2024-4761
CVE-2014-100005 D-Link DIR-600 Router 05/16/2024 0.39245 8.8 FALSE TRUE FALSE https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005
CVE-2024-30051 Microsoft DWM Core Library 05/14/2024 0.48997 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051; https://nvd.nist.gov/vuln/detail/CVE-2024-30051 https://vulncheck.com/xdb/c536913486a8
CVE-2024-30040 Microsoft Windows 05/14/2024 0.27660 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040; https://nvd.nist.gov/vuln/detail/CVE-2024-30040
CVE-2024-4671 Google Chromium 05/13/2024 0.00275 9.6 FALSE FALSE FALSE https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2024-4671
CVE-2023-7028 GitLab GitLab CE/EE 05/01/2024 0.94004 10.0 https://viz.greynoise.io/tag/gitlab-account-takeover-attempt||https://viz.greynoise.io/tag/gitlab-account-takeover-attempt FALSE TRUE FALSE https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-7028 https://vulncheck.com/xdb/e0d36e3116c6||https://vulncheck.com/xdb/e0d36e3116c6 , https://vulncheck.com/xdb/da63a9b40012||https://vulncheck.com/xdb/da63a9b40012 , https://vulncheck.com/xdb/877497541569||https://vulncheck.com/xdb/877497541569 , https://vulncheck.com/xdb/87e14763757c||https://vulncheck.com/xdb/87e14763757c , https://vulncheck.com/xdb/0f7be935ff85||https://vulncheck.com/xdb/0f7be935ff85 , https://vulncheck.com/xdb/516e0f5addf3||https://vulncheck.com/xdb/516e0f5addf3 , https://vulncheck.com/xdb/674d0aabf7ce||https://vulncheck.com/xdb/674d0aabf7ce , https://vulncheck.com/xdb/29c90b604ec4||https://vulncheck.com/xdb/29c90b604ec4 , https://vulncheck.com/xdb/3a9685d9145c||https://vulncheck.com/xdb/3a9685d9145c , https://vulncheck.com/xdb/d0511db0dc7a||https://vulncheck.com/xdb/d0511db0dc7a , https://vulncheck.com/xdb/3703b3de223c||https://vulncheck.com/xdb/3703b3de223c , https://vulncheck.com/xdb/acdabc43c05f||https://vulncheck.com/xdb/acdabc43c05f , https://vulncheck.com/xdb/d5208cb503c5||https://vulncheck.com/xdb/d5208cb503c5
CVE-2024-29988 Microsoft SmartScreen Prompt 04/30/2024 0.64766 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988; https://nvd.nist.gov/vuln/detail/CVE-2024-29988
CVE-2024-20353 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 04/24/2024 0.11235 8.6 TRUE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2; https://nvd.nist.gov/vuln/detail/CVE-2024-20353
CVE-2024-4040 CrushFTP CrushFTP 04/24/2024 0.94430 9.8 https://viz.greynoise.io/tag/crushftp-vfs-sandbox-arbitrary-file-read-via-ssti-cve-2024-4040-attempt||https://viz.greynoise.io/tag/crushftp-vfs-sandbox-arbitrary-file-read-via-ssti-cve-2024-4040-attempt 0 TRUE TRUE FALSE https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34; https://nvd.nist.gov/vuln/detail/CVE-2024-4040 https://vulncheck.com/xdb/d683df1ebca9||https://vulncheck.com/xdb/d683df1ebca9 , https://vulncheck.com/xdb/eeeb1a30c8c2||https://vulncheck.com/xdb/eeeb1a30c8c2 , https://vulncheck.com/xdb/2655831cd2ed||https://vulncheck.com/xdb/2655831cd2ed , https://vulncheck.com/xdb/b40b6bf3d5a6||https://vulncheck.com/xdb/b40b6bf3d5a6 , https://vulncheck.com/xdb/458c6db39e2e||https://vulncheck.com/xdb/458c6db39e2e , https://vulncheck.com/xdb/1a53f981a558||https://vulncheck.com/xdb/1a53f981a558 , https://vulncheck.com/xdb/6e43a515753d||https://vulncheck.com/xdb/6e43a515753d , https://vulncheck.com/xdb/896af97e3f84||https://vulncheck.com/xdb/896af97e3f84 , https://vulncheck.com/xdb/c046e180c9e7||https://vulncheck.com/xdb/c046e180c9e7 , https://vulncheck.com/xdb/49d5d24a6094||https://vulncheck.com/xdb/49d5d24a6094 , https://vulncheck.com/xdb/40ea0e9b601d||https://vulncheck.com/xdb/40ea0e9b601d , https://vulncheck.com/xdb/e71d60507f5d||https://vulncheck.com/xdb/e71d60507f5d , https://vulncheck.com/xdb/247af1523302||https://vulncheck.com/xdb/247af1523302 , https://vulncheck.com/xdb/c76b89de33ef||https://vulncheck.com/xdb/c76b89de33ef
CVE-2024-20359 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 04/24/2024 0.00108 6.0 TRUE TRUE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h; https://nvd.nist.gov/vuln/detail/CVE-2024-20359
CVE-2022-38028 Microsoft Windows 04/23/2024 0.02883 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38028; https://nvd.nist.gov/vuln/detail/CVE-2022-38028
CVE-2024-3400 Palo Alto Networks PAN-OS 04/12/2024 0.94323 10.0 https://viz.greynoise.io/tag/palo-alto-pan-os-cve-2024-3400-rce-attempt||https://viz.greynoise.io/tag/palo-alto-pan-os-cve-2024-3400-rce-attempt 0 TRUE TRUE FALSE https://security.paloaltonetworks.com/CVE-2024-3400 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3400 https://vulncheck.com/xdb/23c21d7a298f||https://vulncheck.com/xdb/23c21d7a298f , https://vulncheck.com/xdb/111ca00bbc19||https://vulncheck.com/xdb/111ca00bbc19 , https://vulncheck.com/xdb/ab7770d7db97||https://vulncheck.com/xdb/ab7770d7db97 , https://vulncheck.com/xdb/470b7dd7f349||https://vulncheck.com/xdb/470b7dd7f349 , https://vulncheck.com/xdb/771fff643c41||https://vulncheck.com/xdb/771fff643c41 , https://vulncheck.com/xdb/225a2064265d||https://vulncheck.com/xdb/225a2064265d , https://vulncheck.com/xdb/e8365a6f1e95||https://vulncheck.com/xdb/e8365a6f1e95 , https://vulncheck.com/xdb/b50f530b723f||https://vulncheck.com/xdb/b50f530b723f , https://vulncheck.com/xdb/d20ea188fb61||https://vulncheck.com/xdb/d20ea188fb61 , https://vulncheck.com/xdb/479d7527000f||https://vulncheck.com/xdb/479d7527000f , https://vulncheck.com/xdb/3d0eb812cb1f||https://vulncheck.com/xdb/3d0eb812cb1f , https://vulncheck.com/xdb/367874624944||https://vulncheck.com/xdb/367874624944 , https://vulncheck.com/xdb/2da1379943ca||https://vulncheck.com/xdb/2da1379943ca , https://vulncheck.com/xdb/5031bc9d21b6||https://vulncheck.com/xdb/5031bc9d21b6 , https://vulncheck.com/xdb/c8807722d985||https://vulncheck.com/xdb/c8807722d985 , https://vulncheck.com/xdb/2b38a2dd894c||https://vulncheck.com/xdb/2b38a2dd894c , https://vulncheck.com/xdb/111e25b96a3d||https://vulncheck.com/xdb/111e25b96a3d , https://vulncheck.com/xdb/72d187d1fad6||https://vulncheck.com/xdb/72d187d1fad6
CVE-2024-3273 D-Link Multiple NAS Devices 04/11/2024 0.94405 7.3 https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt||https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt 0 FALSE TRUE FALSE https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3273 https://vulncheck.com/xdb/30450b0eb331||https://vulncheck.com/xdb/30450b0eb331 , https://vulncheck.com/xdb/d693db35730c||https://vulncheck.com/xdb/d693db35730c , https://vulncheck.com/xdb/57d4fad19689||https://vulncheck.com/xdb/57d4fad19689 , https://vulncheck.com/xdb/1664daa62f60||https://vulncheck.com/xdb/1664daa62f60 , https://vulncheck.com/xdb/09dd98af8d08||https://vulncheck.com/xdb/09dd98af8d08 , https://vulncheck.com/xdb/54167707d84f||https://vulncheck.com/xdb/54167707d84f
CVE-2024-3272 D-Link Multiple NAS Devices 04/11/2024 0.94192 9.8 https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt||https://viz.greynoise.io/tag/d-link-nas-cve-2024-3273-rce-attempt FALSE TRUE FALSE https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383; https://nvd.nist.gov/vuln/detail/CVE-2024-3272
CVE-2024-29745 Android Pixel 04/04/2024 0.00062 5.5 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/pixel/2024-04-01 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29745
CVE-2024-29748 Android Pixel 04/04/2024 0.00213 7.8 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/pixel/2024-04-01; https://nvd.nist.gov/vuln/detail/CVE-2024-29748
CVE-2023-24955 Microsoft SharePoint Server 03/26/2024 0.92105 7.2 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955; https://nvd.nist.gov/vuln/detail/CVE-2023-24955 https://vulncheck.com/xdb/2ed6898e22a5
CVE-2023-48788 Fortinet FortiClient EMS 03/25/2024 0.94206 9.8 https://viz.greynoise.io/tag/fortinet-forticlientems-cve-2023-48788-sql-injection-attempt||https://viz.greynoise.io/tag/fortinet-forticlientems-cve-2023-48788-sql-injection-attempt TRUE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788 https://vulncheck.com/xdb/25da8eff794a
CVE-2019-7256 Nice Linear eMerge E3-Series 03/25/2024 0.94406 9.8 https://viz.greynoise.io/tag/linear-emerge-rce-attempt||https://viz.greynoise.io/tag/linear-emerge-rce-attempt 3 FALSE TRUE TRUE https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256
CVE-2021-44529 Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) 03/25/2024 0.94461 9.8 https://viz.greynoise.io/tag/ivanti-endpoint-manager-rce-attempt||https://viz.greynoise.io/tag/ivanti-endpoint-manager-rce-attempt TRUE TRUE FALSE https://forums.ivanti.com/s/article/SA-2021-12-02?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-44529 https://vulncheck.com/xdb/ea1caea141cd||https://vulncheck.com/xdb/ea1caea141cd , https://vulncheck.com/xdb/e987b78c740c||https://vulncheck.com/xdb/e987b78c740c
CVE-2024-27198 JetBrains TeamCity 03/07/2024 0.94574 9.8 https://viz.greynoise.io/tag/teamcity-jetbrain-cve-2024-27198-auth-bypass-attempt||https://viz.greynoise.io/tag/teamcity-jetbrain-cve-2024-27198-auth-bypass-attempt 3 TRUE TRUE FALSE https://www.jetbrains.com/help/teamcity/teamcity-2023-11-4-release-notes.html; https://nvd.nist.gov/vuln/detail/CVE-2024-27198 https://vulncheck.com/xdb/91171d800798||https://vulncheck.com/xdb/91171d800798 , https://vulncheck.com/xdb/1e759db5ae8a||https://vulncheck.com/xdb/1e759db5ae8a , https://vulncheck.com/xdb/744a0a915460||https://vulncheck.com/xdb/744a0a915460 , https://vulncheck.com/xdb/e69e68a2fbe1||https://vulncheck.com/xdb/e69e68a2fbe1 , https://vulncheck.com/xdb/3b8d28478979||https://vulncheck.com/xdb/3b8d28478979 , https://vulncheck.com/xdb/7b68c23841e0||https://vulncheck.com/xdb/7b68c23841e0 , https://vulncheck.com/xdb/95e2b317e207||https://vulncheck.com/xdb/95e2b317e207 , https://vulncheck.com/xdb/d69cac04e38e||https://vulncheck.com/xdb/d69cac04e38e , https://vulncheck.com/xdb/0ec24e1c31a8||https://vulncheck.com/xdb/0ec24e1c31a8 , https://vulncheck.com/xdb/f23a170dec11||https://vulncheck.com/xdb/f23a170dec11 , https://vulncheck.com/xdb/fc7ed36dfb86||https://vulncheck.com/xdb/fc7ed36dfb86 , https://vulncheck.com/xdb/3690cad185a4||https://vulncheck.com/xdb/3690cad185a4
CVE-2024-23296 Apple Multiple Products 03/06/2024 0.00085 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23296
CVE-2024-23225 Apple Multiple Products 03/06/2024 0.00037 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214083, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214085, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214087, https://support.apple.com/en-us/HT214088 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23225
CVE-2023-21237 Android Pixel 03/05/2024 0.02496 5.5 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/pixel/2023-06-01; https://nvd.nist.gov/vuln/detail/CVE-2023-21237
CVE-2021-36380 Sunhillo SureLine 03/05/2024 0.94272 9.8 https://viz.greynoise.io/tag/sunhillo-sureline-rce-attempt||https://viz.greynoise.io/tag/sunhillo-sureline-rce-attempt 2 FALSE FALSE FALSE https://www.sunhillo.com/fb011/; https://nvd.nist.gov/vuln/detail/CVE-2021-36380
CVE-2024-21338 Microsoft Windows 03/04/2024 0.80512 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338; https://nvd.nist.gov/vuln/detail/CVE-2024-21338 https://vulncheck.com/xdb/bc7aefbec152||https://vulncheck.com/xdb/bc7aefbec152 , https://vulncheck.com/xdb/fb89266892c0||https://vulncheck.com/xdb/fb89266892c0 , https://vulncheck.com/xdb/0319939c028f||https://vulncheck.com/xdb/0319939c028f , https://vulncheck.com/xdb/0c0b9d5ca67d||https://vulncheck.com/xdb/0c0b9d5ca67d , https://vulncheck.com/xdb/b1beae9b4cef||https://vulncheck.com/xdb/b1beae9b4cef , https://vulncheck.com/xdb/d4686f78dfae||https://vulncheck.com/xdb/d4686f78dfae
CVE-2023-29360 Microsoft Streaming Service 02/29/2024 0.15004 8.4 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360 ;https://nvd.nist.gov/vuln/detail/CVE-2023-29360 https://vulncheck.com/xdb/f4d98c781e76||https://vulncheck.com/xdb/f4d98c781e76 , https://vulncheck.com/xdb/4ff3cf601881||https://vulncheck.com/xdb/4ff3cf601881
CVE-2024-1709 ConnectWise ScreenConnect 02/22/2024 0.94364 10.0 https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-check||https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-check , https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-rce-attempt||https://viz.greynoise.io/tag/connectwise-screenconnect-auth-bypass-rce-attempt 1 TRUE TRUE FALSE https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8; https://nvd.nist.gov/vuln/detail/CVE-2024-1709 https://vulncheck.com/xdb/8f3e61327af3||https://vulncheck.com/xdb/8f3e61327af3 , https://vulncheck.com/xdb/2ac2c299e696||https://vulncheck.com/xdb/2ac2c299e696 , https://vulncheck.com/xdb/9e69f54b1bd0||https://vulncheck.com/xdb/9e69f54b1bd0 , https://vulncheck.com/xdb/8c4a64b38e63||https://vulncheck.com/xdb/8c4a64b38e63 , https://vulncheck.com/xdb/091c2acde216||https://vulncheck.com/xdb/091c2acde216 , https://vulncheck.com/xdb/bdf9efcfdbbe||https://vulncheck.com/xdb/bdf9efcfdbbe
CVE-2024-21410 Microsoft Exchange Server 02/15/2024 0.01679 9.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410; https://nvd.nist.gov/vuln/detail/CVE-2024-21410
CVE-2020-3259 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 02/15/2024 0.54329 7.5 https://viz.greynoise.io/tag/cisco-asa-cve-2020-3259-information-disclosure-attempt||https://viz.greynoise.io/tag/cisco-asa-cve-2020-3259-information-disclosure-attempt TRUE FALSE FALSE https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB; https://nvd.nist.gov/vuln/detail/CVE-2020-3259
CVE-2024-21351 Microsoft Windows 02/13/2024 0.06174 7.6 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21351; https://nvd.nist.gov/vuln/detail/CVE-2024-21351
CVE-2024-21412 Microsoft Windows 02/13/2024 0.93777 8.1 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-21412; https://nvd.nist.gov/vuln/detail/CVE-2024-21412 https://vulncheck.com/xdb/758dee144289
CVE-2023-43770 Roundcube Webmail 02/12/2024 0.75170 6.1 FALSE TRUE FALSE https://roundcube.net/news/2023/09/15/security-update-1.6.3-released ; https://nvd.nist.gov/vuln/detail/CVE-2023-43770 https://vulncheck.com/xdb/49221e884214||https://vulncheck.com/xdb/49221e884214 , https://vulncheck.com/xdb/2e15ee69f350||https://vulncheck.com/xdb/2e15ee69f350
CVE-2024-21762 Fortinet FortiOS 02/09/2024 0.91602 9.8 https://viz.greynoise.io/tag/fortinet-fortios-fortiproxy-rce-cve-2024-21762-attempt||https://viz.greynoise.io/tag/fortinet-fortios-fortiproxy-rce-cve-2024-21762-attempt 0 TRUE TRUE FALSE https://fortiguard.fortinet.com/psirt/FG-IR-24-015 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21762 https://vulncheck.com/xdb/08ff8437a686||https://vulncheck.com/xdb/08ff8437a686 , https://vulncheck.com/xdb/62e1097a2db0||https://vulncheck.com/xdb/62e1097a2db0 , https://vulncheck.com/xdb/9c47a528c340||https://vulncheck.com/xdb/9c47a528c340 , https://vulncheck.com/xdb/1b6a203d05a8||https://vulncheck.com/xdb/1b6a203d05a8 , https://vulncheck.com/xdb/52aa01d2b528||https://vulncheck.com/xdb/52aa01d2b528 , https://vulncheck.com/xdb/ec72e0945311||https://vulncheck.com/xdb/ec72e0945311 , https://vulncheck.com/xdb/edb57d28f065||https://vulncheck.com/xdb/edb57d28f065 , https://vulncheck.com/xdb/cba7fa07e293||https://vulncheck.com/xdb/cba7fa07e293
CVE-2023-4762 Google Chromium V8 02/06/2024 0.11497 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-4762 https://vulncheck.com/xdb/0e6fa0e1e54a
CVE-2024-21893 Ivanti Connect Secure, Policy Secure, and Neurons 01/31/2024 0.94320 8.2 https://viz.greynoise.io/tag/ivanti-connect-secure-ssrf-cve-2024-21893-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-ssrf-cve-2024-21893-attempt 1 TRUE TRUE FALSE https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2024-21893 https://vulncheck.com/xdb/54ee9161753c||https://vulncheck.com/xdb/54ee9161753c , https://vulncheck.com/xdb/6b04ca9b3dac||https://vulncheck.com/xdb/6b04ca9b3dac
CVE-2022-48618 Apple Multiple Products 01/31/2024 0.00180 7.0 FALSE FALSE FALSE https://support.apple.com/en-us/HT213530, https://support.apple.com/en-us/HT213532, https://support.apple.com/en-us/HT213535, https://support.apple.com/en-us/HT213536; https://nvd.nist.gov/vuln/detail/CVE-2022-48618
CVE-2023-22527 Atlassian Confluence Data Center and Server 01/24/2024 0.94363 10.0 https://viz.greynoise.io/tag/atlassian-confluence-template-injection-rce-attempt-cve-2023-22527||https://viz.greynoise.io/tag/atlassian-confluence-template-injection-rce-attempt-cve-2023-22527 22 TRUE TRUE FALSE https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22527 https://vulncheck.com/xdb/b86f8af644dc||https://vulncheck.com/xdb/b86f8af644dc , https://vulncheck.com/xdb/66eb62ffb562||https://vulncheck.com/xdb/66eb62ffb562 , https://vulncheck.com/xdb/2054e543b959||https://vulncheck.com/xdb/2054e543b959 , https://vulncheck.com/xdb/95ac0d7b87c9||https://vulncheck.com/xdb/95ac0d7b87c9 , https://vulncheck.com/xdb/2868521052d3||https://vulncheck.com/xdb/2868521052d3 , https://vulncheck.com/xdb/4875746a557f||https://vulncheck.com/xdb/4875746a557f , https://vulncheck.com/xdb/eddca0c3b6bf||https://vulncheck.com/xdb/eddca0c3b6bf , https://vulncheck.com/xdb/d6ff5abefc7e||https://vulncheck.com/xdb/d6ff5abefc7e , https://vulncheck.com/xdb/4530fd2e7aec||https://vulncheck.com/xdb/4530fd2e7aec , https://vulncheck.com/xdb/30047c15e01d||https://vulncheck.com/xdb/30047c15e01d , https://vulncheck.com/xdb/121a6655f702||https://vulncheck.com/xdb/121a6655f702 , https://vulncheck.com/xdb/6165cec850cd||https://vulncheck.com/xdb/6165cec850cd , https://vulncheck.com/xdb/528b0751eadd||https://vulncheck.com/xdb/528b0751eadd , https://vulncheck.com/xdb/a3677d9bae7f||https://vulncheck.com/xdb/a3677d9bae7f , https://vulncheck.com/xdb/f3c6ccae29ce||https://vulncheck.com/xdb/f3c6ccae29ce , https://vulncheck.com/xdb/0d89d6d2a198||https://vulncheck.com/xdb/0d89d6d2a198 , https://vulncheck.com/xdb/b6e41e9efa89||https://vulncheck.com/xdb/b6e41e9efa89 , https://vulncheck.com/xdb/7f5b35a2c887||https://vulncheck.com/xdb/7f5b35a2c887 , https://vulncheck.com/xdb/30d9851d825e||https://vulncheck.com/xdb/30d9851d825e , https://vulncheck.com/xdb/80a004854d64||https://vulncheck.com/xdb/80a004854d64 , https://vulncheck.com/xdb/e16ed61a4005||https://vulncheck.com/xdb/e16ed61a4005
CVE-2024-23222 Apple Multiple Products 01/23/2024 0.00197 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT214055, https://support.apple.com/en-us/HT214056, https://support.apple.com/en-us/HT214057, https://support.apple.com/en-us/HT214058, https://support.apple.com/en-us/HT214059, https://support.apple.com/en-us/HT214061, https://support.apple.com/en-us/HT214063 ; https://nvd.nist.gov/vuln/detail/CVE-2024-23222
CVE-2023-34048 VMware vCenter Server 01/22/2024 0.91917 9.8 FALSE FALSE FALSE https://www.vmware.com/security/advisories/VMSA-2023-0023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-34048
CVE-2023-35082 Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core 01/18/2024 0.94468 10.0 https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt||https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt 4 TRUE TRUE FALSE https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older; https://nvd.nist.gov/vuln/detail/CVE-2023-35082 https://vulncheck.com/xdb/396a3c81afe8
CVE-2024-0519 Google Chromium V8 01/17/2024 0.00211 8.8 FALSE FALSE FALSE https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2024-0519
CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway 01/17/2024 0.14677 8.2 https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt FALSE FALSE FALSE https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6549
CVE-2023-6548 Citrix NetScaler ADC and NetScaler Gateway 01/17/2024 0.23433 5.5 https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-6549-information-disclosure-attempt FALSE FALSE FALSE https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549; https://nvd.nist.gov/vuln/detail/CVE-2023-6548
CVE-2018-15133 Laravel Laravel Framework 01/16/2024 0.79990 8.1 FALSE TRUE FALSE https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30; https://nvd.nist.gov/vuln/detail/CVE-2018-15133 https://vulncheck.com/xdb/45e7d1957c7f||https://vulncheck.com/xdb/45e7d1957c7f , https://vulncheck.com/xdb/3004cb8714e9||https://vulncheck.com/xdb/3004cb8714e9 , https://vulncheck.com/xdb/0a29cfc05e95||https://vulncheck.com/xdb/0a29cfc05e95 , https://vulncheck.com/xdb/8027eabdd92d||https://vulncheck.com/xdb/8027eabdd92d , https://vulncheck.com/xdb/b31ca993356f||https://vulncheck.com/xdb/b31ca993356f , https://vulncheck.com/xdb/be7a45b53d16||https://vulncheck.com/xdb/be7a45b53d16 , https://vulncheck.com/xdb/b1064b8f348a||https://vulncheck.com/xdb/b1064b8f348a , https://vulncheck.com/xdb/bb622dfa8b57||https://vulncheck.com/xdb/bb622dfa8b57 , https://vulncheck.com/xdb/2c6de6585be5||https://vulncheck.com/xdb/2c6de6585be5 , https://vulncheck.com/xdb/7fa45a25cb32||https://vulncheck.com/xdb/7fa45a25cb32
CVE-2023-46805 Ivanti Connect Secure and Policy Secure 01/10/2024 0.94398 8.2 https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt 2 TRUE TRUE FALSE Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-46805 https://vulncheck.com/xdb/94604f97e3be||https://vulncheck.com/xdb/94604f97e3be , https://vulncheck.com/xdb/861831be04bb||https://vulncheck.com/xdb/861831be04bb , https://vulncheck.com/xdb/7d5d8ce1a955||https://vulncheck.com/xdb/7d5d8ce1a955 , https://vulncheck.com/xdb/676e0bcf48b8||https://vulncheck.com/xdb/676e0bcf48b8 , https://vulncheck.com/xdb/c6e9fbe8f33b||https://vulncheck.com/xdb/c6e9fbe8f33b , https://vulncheck.com/xdb/8aaf3b1980d0||https://vulncheck.com/xdb/8aaf3b1980d0 , https://vulncheck.com/xdb/d3238b74c459||https://vulncheck.com/xdb/d3238b74c459 , https://vulncheck.com/xdb/a797febede5b||https://vulncheck.com/xdb/a797febede5b
CVE-2024-21887 Ivanti Connect Secure and Policy Secure 01/10/2024 0.94416 9.1 https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt||https://viz.greynoise.io/tag/ivanti-connect-secure-rce-attempt 9 TRUE TRUE FALSE Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2024-21887 https://vulncheck.com/xdb/ec7c4cca84d9||https://vulncheck.com/xdb/ec7c4cca84d9 , https://vulncheck.com/xdb/a227bd0afc26||https://vulncheck.com/xdb/a227bd0afc26 , https://vulncheck.com/xdb/a72604a4ced0||https://vulncheck.com/xdb/a72604a4ced0 , https://vulncheck.com/xdb/ecf3cf71be36||https://vulncheck.com/xdb/ecf3cf71be36 , https://vulncheck.com/xdb/983f05b4d88d||https://vulncheck.com/xdb/983f05b4d88d , https://vulncheck.com/xdb/e6f386d5d54f||https://vulncheck.com/xdb/e6f386d5d54f
CVE-2023-29357 Microsoft SharePoint Server 01/10/2024 0.94356 9.8 https://viz.greynoise.io/tag/sharepoint-cve-2023-29357-check||https://viz.greynoise.io/tag/sharepoint-cve-2023-29357-check 2 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357; https://nvd.nist.gov/vuln/detail/CVE-2023-29357 https://vulncheck.com/xdb/5a18945a6a42||https://vulncheck.com/xdb/5a18945a6a42 , https://vulncheck.com/xdb/c611323c5060||https://vulncheck.com/xdb/c611323c5060 , https://vulncheck.com/xdb/fd8cdbf188d1||https://vulncheck.com/xdb/fd8cdbf188d1
CVE-2023-27524 Apache Superset 01/08/2024 0.80255 8.9 https://viz.greynoise.io/tag/apache-superset-authentication-bypass-attempt||https://viz.greynoise.io/tag/apache-superset-authentication-bypass-attempt FALSE TRUE FALSE https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk; https://nvd.nist.gov/vuln/detail/CVE-2023-27524 https://vulncheck.com/xdb/3f3b3474bcd8||https://vulncheck.com/xdb/3f3b3474bcd8 , https://vulncheck.com/xdb/a2f39ee2e959||https://vulncheck.com/xdb/a2f39ee2e959 , https://vulncheck.com/xdb/49026b01a9e8||https://vulncheck.com/xdb/49026b01a9e8 , https://vulncheck.com/xdb/a4304932f8c7||https://vulncheck.com/xdb/a4304932f8c7 , https://vulncheck.com/xdb/d23c099d5d89||https://vulncheck.com/xdb/d23c099d5d89 , https://vulncheck.com/xdb/7b3694a59dcc||https://vulncheck.com/xdb/7b3694a59dcc , https://vulncheck.com/xdb/d258b47e2ea9||https://vulncheck.com/xdb/d258b47e2ea9 , https://vulncheck.com/xdb/96ea12e77e80||https://vulncheck.com/xdb/96ea12e77e80 , https://vulncheck.com/xdb/3a6a4fb601a4||https://vulncheck.com/xdb/3a6a4fb601a4 , https://vulncheck.com/xdb/925cc8f34b1d||https://vulncheck.com/xdb/925cc8f34b1d , https://vulncheck.com/xdb/4abf848aca22||https://vulncheck.com/xdb/4abf848aca22
CVE-2023-38203 Adobe ColdFusion 01/08/2024 0.94264 9.8 https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38203-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38203-rce-attempt TRUE FALSE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38203
CVE-2023-41990 Apple Multiple Products 01/08/2024 0.04103 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213599, https://support.apple.com/en-us/HT213601, https://support.apple.com/en-us/HT213605, https://support.apple.com/en-us/HT213606, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213844, https://support.apple.com/en-us/HT213845 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41990
CVE-2023-23752 Joomla! Joomla! 01/08/2024 0.94532 5.3 https://viz.greynoise.io/tag/joomla-credential-disclosure-cve-2023-23752-attempt||https://viz.greynoise.io/tag/joomla-credential-disclosure-cve-2023-23752-attempt 13 FALSE TRUE FALSE https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html; https://nvd.nist.gov/vuln/detail/CVE-2023-23752 https://vulncheck.com/xdb/761b2b5d20c0||https://vulncheck.com/xdb/761b2b5d20c0 , https://vulncheck.com/xdb/992ddc9eaf34||https://vulncheck.com/xdb/992ddc9eaf34 , https://vulncheck.com/xdb/73bb74556ea0||https://vulncheck.com/xdb/73bb74556ea0 , https://vulncheck.com/xdb/bb793678a4c1||https://vulncheck.com/xdb/bb793678a4c1 , https://vulncheck.com/xdb/e6753746f8b7||https://vulncheck.com/xdb/e6753746f8b7 , https://vulncheck.com/xdb/4fcef0954175||https://vulncheck.com/xdb/4fcef0954175 , https://vulncheck.com/xdb/7522628c4302||https://vulncheck.com/xdb/7522628c4302 , https://vulncheck.com/xdb/96a2ba3662e2||https://vulncheck.com/xdb/96a2ba3662e2 , https://vulncheck.com/xdb/eb2e3ecc6d40||https://vulncheck.com/xdb/eb2e3ecc6d40 , https://vulncheck.com/xdb/9fd61fea3bcd||https://vulncheck.com/xdb/9fd61fea3bcd , https://vulncheck.com/xdb/a0e1c1067de0||https://vulncheck.com/xdb/a0e1c1067de0 , https://vulncheck.com/xdb/cb289c9b68c0||https://vulncheck.com/xdb/cb289c9b68c0 , https://vulncheck.com/xdb/7abe8dabe0ec||https://vulncheck.com/xdb/7abe8dabe0ec , https://vulncheck.com/xdb/14f43e8a9127||https://vulncheck.com/xdb/14f43e8a9127 , https://vulncheck.com/xdb/8a58bbcc46df||https://vulncheck.com/xdb/8a58bbcc46df , https://vulncheck.com/xdb/7d4f2880c446||https://vulncheck.com/xdb/7d4f2880c446 , https://vulncheck.com/xdb/e4c6e9cbdaef||https://vulncheck.com/xdb/e4c6e9cbdaef , https://vulncheck.com/xdb/0688e24d7079||https://vulncheck.com/xdb/0688e24d7079 , https://vulncheck.com/xdb/bc3b64de1018||https://vulncheck.com/xdb/bc3b64de1018 , https://vulncheck.com/xdb/8cf7bc735c45||https://vulncheck.com/xdb/8cf7bc735c45 , https://vulncheck.com/xdb/05ec071c3006||https://vulncheck.com/xdb/05ec071c3006 , https://vulncheck.com/xdb/0dad9517c791||https://vulncheck.com/xdb/0dad9517c791 , https://vulncheck.com/xdb/b5de15491c97||https://vulncheck.com/xdb/b5de15491c97 , https://vulncheck.com/xdb/d351d4959b91||https://vulncheck.com/xdb/d351d4959b91 , https://vulncheck.com/xdb/043a525ec0e4||https://vulncheck.com/xdb/043a525ec0e4 , https://vulncheck.com/xdb/ae3ff3c0e355||https://vulncheck.com/xdb/ae3ff3c0e355 , https://vulncheck.com/xdb/b46b379891c7||https://vulncheck.com/xdb/b46b379891c7 , https://vulncheck.com/xdb/a5535be52699||https://vulncheck.com/xdb/a5535be52699 , https://vulncheck.com/xdb/4567f3a2525d||https://vulncheck.com/xdb/4567f3a2525d , https://vulncheck.com/xdb/c33ca6ed39f6||https://vulncheck.com/xdb/c33ca6ed39f6 , https://vulncheck.com/xdb/a5e6c33317ae||https://vulncheck.com/xdb/a5e6c33317ae , https://vulncheck.com/xdb/fef258e57e22||https://vulncheck.com/xdb/fef258e57e22 , https://vulncheck.com/xdb/2210c76b12f5||https://vulncheck.com/xdb/2210c76b12f5 , https://vulncheck.com/xdb/e8a1bd301814||https://vulncheck.com/xdb/e8a1bd301814 , https://vulncheck.com/xdb/ae30c8d7f152||https://vulncheck.com/xdb/ae30c8d7f152 , https://vulncheck.com/xdb/5ccc05d276eb||https://vulncheck.com/xdb/5ccc05d276eb , https://vulncheck.com/xdb/13105a603082||https://vulncheck.com/xdb/13105a603082 , https://vulncheck.com/xdb/318208166f71||https://vulncheck.com/xdb/318208166f71 , https://vulncheck.com/xdb/45955df3e0df||https://vulncheck.com/xdb/45955df3e0df , https://vulncheck.com/xdb/554b62cc1b8c||https://vulncheck.com/xdb/554b62cc1b8c , https://vulncheck.com/xdb/a21e9dba9052||https://vulncheck.com/xdb/a21e9dba9052 , https://vulncheck.com/xdb/7b3bb7626ede||https://vulncheck.com/xdb/7b3bb7626ede , https://vulncheck.com/xdb/0c0007f3a9a4||https://vulncheck.com/xdb/0c0007f3a9a4 , https://vulncheck.com/xdb/d6ec7cba19ca||https://vulncheck.com/xdb/d6ec7cba19ca , https://vulncheck.com/xdb/df4325f0bd6d||https://vulncheck.com/xdb/df4325f0bd6d , https://vulncheck.com/xdb/ce466865c2f6||https://vulncheck.com/xdb/ce466865c2f6
CVE-2016-20017 D-Link DSL-2750B Devices 01/08/2024 0.85525 9.8 https://viz.greynoise.io/tag/d-link-dsl-2750b-rce-attempt||https://viz.greynoise.io/tag/d-link-dsl-2750b-rce-attempt FALSE FALSE FALSE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088; https://nvd.nist.gov/vuln/detail/CVE-2016-20017
CVE-2023-29300 Adobe ColdFusion 01/08/2024 0.92907 9.8 https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29300-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29300-rce-attempt 2 TRUE TRUE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29300
CVE-2023-7024 Google Chromium WebRTC 01/02/2024 0.01632 8.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html; https://nvd.nist.gov/vuln/detail/CVE-2023-7024
CVE-2023-7101 Spreadsheet::ParseExcel Spreadsheet::ParseExcel 01/02/2024 0.89983 7.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and fix for their downstream issue CVE-2023-7102 at https://www.barracuda.com/company/legal/esg-vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2023-7101
CVE-2023-47565 QNAP VioStor NVR 12/21/2023 0.74660 8.0 FALSE FALSE FALSE https://www.qnap.com/en/security-advisory/qsa-23-48 ; https://nvd.nist.gov/vuln/detail/CVE-2023-47565
CVE-2023-49897 FXC AE1021, AE1021PE 12/21/2023 0.31328 8.8 FALSE FALSE FALSE https://www.fxc.jp/news/20231206 ; https://nvd.nist.gov/vuln/detail/CVE-2023-49897
CVE-2023-6448 Unitronics Vision PLC and HMI 12/11/2023 0.10289 9.8 FALSE FALSE FALSE Note that while it is possible to change the default password, implementors are encouraged to remove affected controllers from public networks and update the affected firmware: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf; https://nvd.nist.gov/vuln/detail/CVE-2023-6448
CVE-2023-41265 Qlik Sense 12/07/2023 0.91791 9.6 https://viz.greynoise.io/tag/qlik-sense-http-tunneling-attempt||https://viz.greynoise.io/tag/qlik-sense-http-tunneling-attempt 2 TRUE TRUE FALSE https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801; https://nvd.nist.gov/vuln/detail/CVE-2023-41265 https://vulncheck.com/xdb/bc387b725d20
CVE-2023-41266 Qlik Sense 12/07/2023 0.94246 8.2 https://viz.greynoise.io/tag/qlik-sense-auth-bypass-attempt||https://viz.greynoise.io/tag/qlik-sense-auth-bypass-attempt TRUE TRUE FALSE https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41266 https://vulncheck.com/xdb/ced858f75509
CVE-2022-22071 Qualcomm Multiple Chipsets 12/05/2023 0.00636 8.4 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.4/-/commit/586840fde350d7b8563df9889c8ce397e2c20dda; https://nvd.nist.gov/vuln/detail/CVE-2022-22071
CVE-2023-33063 Qualcomm Multiple Chipsets 12/05/2023 0.00234 7.8 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-5.15/-/commit/2643808ddbedfaabbb334741873fb2857f78188a, https://git.codelinaro.org/clo/la/kernel/msm-4.14/-/commit/d43222efda5a01c9804d74a541e3c1be9b7fe110; https://nvd.nist.gov/vuln/detail/CVE-2023-33063
CVE-2023-33107 Qualcomm Multiple Chipsets 12/05/2023 0.00096 8.4 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/d66b799c804083ea5226cfffac6d6c4e7ad4968b; https://nvd.nist.gov/vuln/detail/CVE-2023-33107
CVE-2023-33106 Qualcomm Multiple Chipsets 12/05/2023 0.00062 8.4 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://git.codelinaro.org/clo/la/kernel/msm-4.19/-/commit/1e46e81dbeb69aafd5842ce779f07e617680fd58; https://nvd.nist.gov/vuln/detail/CVE-2023-33106
CVE-2023-42917 Apple Multiple Products 12/04/2023 0.00040 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42917
CVE-2023-42916 Apple Multiple Products 12/04/2023 0.00046 6.5 FALSE FALSE FALSE https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-42916
CVE-2023-6345 Google Chromium Skia 11/30/2023 0.00670 9.6 FALSE FALSE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-6345
CVE-2023-49103 ownCloud ownCloud graphapi 11/30/2023 0.94366 10.0 https://viz.greynoise.io/tag/owncloud-graph-api-information-disclosure||https://viz.greynoise.io/tag/owncloud-graph-api-information-disclosure 13 FALSE TRUE FALSE https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-49103 https://vulncheck.com/xdb/832500fb0a96||https://vulncheck.com/xdb/832500fb0a96 , https://vulncheck.com/xdb/86bc597345c5||https://vulncheck.com/xdb/86bc597345c5
CVE-2023-4911 GNU GNU C Library 11/21/2023 0.70561 7.8 TRUE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1056e5b4c3f2d90ed2b4a55f96add28da2f4c8fa, https://access.redhat.com/security/cve/cve-2023-4911, https://www.debian.org/security/2023/dsa-5514 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4911 https://vulncheck.com/xdb/e9cc8a9653c6||https://vulncheck.com/xdb/e9cc8a9653c6 , https://vulncheck.com/xdb/7154c8a75572||https://vulncheck.com/xdb/7154c8a75572 , https://vulncheck.com/xdb/794f2256b177||https://vulncheck.com/xdb/794f2256b177 , https://vulncheck.com/xdb/7386501edb9e||https://vulncheck.com/xdb/7386501edb9e , https://vulncheck.com/xdb/847bf09204ca||https://vulncheck.com/xdb/847bf09204ca , https://vulncheck.com/xdb/270ec9b3f4c1||https://vulncheck.com/xdb/270ec9b3f4c1 , https://vulncheck.com/xdb/60ac54a2a53a||https://vulncheck.com/xdb/60ac54a2a53a , https://vulncheck.com/xdb/24a3ae6b3ae0||https://vulncheck.com/xdb/24a3ae6b3ae0 , https://vulncheck.com/xdb/e8ba401a5397||https://vulncheck.com/xdb/e8ba401a5397 , https://vulncheck.com/xdb/4a0f3cecfcf5||https://vulncheck.com/xdb/4a0f3cecfcf5 , https://vulncheck.com/xdb/208283cc4e70||https://vulncheck.com/xdb/208283cc4e70 , https://vulncheck.com/xdb/b43d5e2b6b33||https://vulncheck.com/xdb/b43d5e2b6b33 , https://vulncheck.com/xdb/c66f71d05ca3||https://vulncheck.com/xdb/c66f71d05ca3 , https://vulncheck.com/xdb/6dd56d3450b7||https://vulncheck.com/xdb/6dd56d3450b7 , https://vulncheck.com/xdb/0bfd16ee5c6e||https://vulncheck.com/xdb/0bfd16ee5c6e , https://vulncheck.com/xdb/1bf2c7948d0a||https://vulncheck.com/xdb/1bf2c7948d0a , https://vulncheck.com/xdb/6ddd35f752a2||https://vulncheck.com/xdb/6ddd35f752a2 , https://vulncheck.com/xdb/847b8ad5421f||https://vulncheck.com/xdb/847b8ad5421f , https://vulncheck.com/xdb/d7f283c48b1a||https://vulncheck.com/xdb/d7f283c48b1a , https://vulncheck.com/xdb/c1e2b0d1e872||https://vulncheck.com/xdb/c1e2b0d1e872 , https://vulncheck.com/xdb/d9dc0002293f||https://vulncheck.com/xdb/d9dc0002293f
CVE-2023-1671 Sophos Web Appliance 11/16/2023 0.94290 9.8 https://viz.greynoise.io/tag/sophos-web-appliance-rce-attempt||https://viz.greynoise.io/tag/sophos-web-appliance-rce-attempt 2 FALSE TRUE FALSE https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce; https://nvd.nist.gov/vuln/detail/CVE-2023-1671 https://vulncheck.com/xdb/9e7a7266eb72||https://vulncheck.com/xdb/9e7a7266eb72 , https://vulncheck.com/xdb/5075178f5d0a||https://vulncheck.com/xdb/5075178f5d0a , https://vulncheck.com/xdb/6c909a4dbb22||https://vulncheck.com/xdb/6c909a4dbb22 , https://vulncheck.com/xdb/f42bfbb2ab42||https://vulncheck.com/xdb/f42bfbb2ab42
CVE-2023-36584 Microsoft Windows 11/16/2023 0.20094 5.4 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36584 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36584
CVE-2020-2551 Oracle Fusion Middleware 11/16/2023 0.94393 9.8 FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpujan2020.html; https://nvd.nist.gov/vuln/detail/CVE-2020-2551 https://vulncheck.com/xdb/593ea0948a71||https://vulncheck.com/xdb/593ea0948a71 , https://vulncheck.com/xdb/331c7b695711||https://vulncheck.com/xdb/331c7b695711 , https://vulncheck.com/xdb/0f71a5e7f06e||https://vulncheck.com/xdb/0f71a5e7f06e , https://vulncheck.com/xdb/3041ae129674||https://vulncheck.com/xdb/3041ae129674 , https://vulncheck.com/xdb/8dc42355d38d||https://vulncheck.com/xdb/8dc42355d38d , https://vulncheck.com/xdb/993743176260||https://vulncheck.com/xdb/993743176260 , https://vulncheck.com/xdb/ebf92f4c5d9b||https://vulncheck.com/xdb/ebf92f4c5d9b , https://vulncheck.com/xdb/f6dd1753be29||https://vulncheck.com/xdb/f6dd1753be29
CVE-2023-36033 Microsoft Windows 11/14/2023 0.00249 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36033 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36033
CVE-2023-36036 Microsoft Windows 11/14/2023 0.00968 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36036 ; https://nvd.nist.gov/vuln/detail/CVE-2023-36036
CVE-2023-36025 Microsoft Windows 11/14/2023 0.90662 8.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36025; https://nvd.nist.gov/vuln/detail/CVE-2023-36025 https://vulncheck.com/xdb/dc28e49a6acf
CVE-2023-47246 SysAid SysAid Server 11/13/2023 0.94380 9.8 https://viz.greynoise.io/tag/sysaid-path-traversal-attempt||https://viz.greynoise.io/tag/sysaid-path-traversal-attempt 2 TRUE TRUE FALSE https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification; https://nvd.nist.gov/vuln/detail/CVE-2023-47246 https://vulncheck.com/xdb/e8ff64a53910||https://vulncheck.com/xdb/e8ff64a53910 , https://vulncheck.com/xdb/d306acc109ee||https://vulncheck.com/xdb/d306acc109ee , https://vulncheck.com/xdb/35d58d1d70ee||https://vulncheck.com/xdb/35d58d1d70ee
CVE-2023-36846 Juniper Junos OS 11/13/2023 0.94278 5.3 https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt||https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt FALSE TRUE FALSE https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36846 https://vulncheck.com/xdb/83a248c63cdc||https://vulncheck.com/xdb/83a248c63cdc , https://vulncheck.com/xdb/869a78bb22b0||https://vulncheck.com/xdb/869a78bb22b0 , https://vulncheck.com/xdb/2b08c3ae7d02||https://vulncheck.com/xdb/2b08c3ae7d02 , https://vulncheck.com/xdb/4826ed6161ea||https://vulncheck.com/xdb/4826ed6161ea
CVE-2023-36845 Juniper Junos OS 11/13/2023 0.94355 9.8 https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt||https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt 0 FALSE TRUE FALSE https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36845 https://vulncheck.com/xdb/7f3ac2cfdf5a||https://vulncheck.com/xdb/7f3ac2cfdf5a , https://vulncheck.com/xdb/4fae7ca850e5||https://vulncheck.com/xdb/4fae7ca850e5 , https://vulncheck.com/xdb/40881a555da5||https://vulncheck.com/xdb/40881a555da5 , https://vulncheck.com/xdb/a2f2dd7e0a50||https://vulncheck.com/xdb/a2f2dd7e0a50 , https://vulncheck.com/xdb/f1599fa5e102||https://vulncheck.com/xdb/f1599fa5e102 , https://vulncheck.com/xdb/23f413cb1c62||https://vulncheck.com/xdb/23f413cb1c62 , https://vulncheck.com/xdb/bea8d1e01668||https://vulncheck.com/xdb/bea8d1e01668 , https://vulncheck.com/xdb/f2e8c180103f||https://vulncheck.com/xdb/f2e8c180103f , https://vulncheck.com/xdb/539fa0525155||https://vulncheck.com/xdb/539fa0525155 , https://vulncheck.com/xdb/549b4b2e791e||https://vulncheck.com/xdb/549b4b2e791e , https://vulncheck.com/xdb/f715efbe5fe8||https://vulncheck.com/xdb/f715efbe5fe8 , https://vulncheck.com/xdb/eb307a27c46c||https://vulncheck.com/xdb/eb307a27c46c , https://vulncheck.com/xdb/861198e6f367||https://vulncheck.com/xdb/861198e6f367 , https://vulncheck.com/xdb/f6208bcc8206||https://vulncheck.com/xdb/f6208bcc8206 , https://vulncheck.com/xdb/db1e7b347773||https://vulncheck.com/xdb/db1e7b347773 , https://vulncheck.com/xdb/fcb027407d46||https://vulncheck.com/xdb/fcb027407d46 , https://vulncheck.com/xdb/c5b62df0eae0||https://vulncheck.com/xdb/c5b62df0eae0
CVE-2023-36847 Juniper Junos OS 11/13/2023 0.94278 5.3 https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt||https://viz.greynoise.io/tag/juniper-junos-os-arbitrary-file-upload-attempt TRUE TRUE FALSE https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-36847 https://vulncheck.com/xdb/2bdcb74510c6||https://vulncheck.com/xdb/2bdcb74510c6 , https://vulncheck.com/xdb/93522de431d0||https://vulncheck.com/xdb/93522de431d0
CVE-2023-36851 Juniper Junos OS 11/13/2023 0.11397 5.3 FALSE FALSE FALSE https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36851
CVE-2023-36844 Juniper Junos OS 11/13/2023 0.94297 5.3 https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt||https://viz.greynoise.io/tag/juniper-junos-os-environment-variable-injection-attempt 1 TRUE TRUE FALSE https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-36844 https://vulncheck.com/xdb/4b17b4566e33||https://vulncheck.com/xdb/4b17b4566e33 , https://vulncheck.com/xdb/5ed5b7ad2c78||https://vulncheck.com/xdb/5ed5b7ad2c78 , https://vulncheck.com/xdb/0bb1b8378b4d||https://vulncheck.com/xdb/0bb1b8378b4d
CVE-2023-29552 IETF Service Location Protocol (SLP) 11/08/2023 0.93709 7.5 TRUE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on the patching status. For more information please see https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp and https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks.; https://nvd.nist.gov/vuln/detail/CVE-2023-29552 https://vulncheck.com/xdb/ab8547d12ef8
CVE-2023-22518 Atlassian Confluence Data Center and Server 11/07/2023 0.94375 10.0 https://viz.greynoise.io/tag/atlassian-confluence-server-authentication-bypass-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-authentication-bypass-attempt 3 TRUE TRUE FALSE https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518 https://vulncheck.com/xdb/7b2944722fc9||https://vulncheck.com/xdb/7b2944722fc9 , https://vulncheck.com/xdb/173b8501bb56||https://vulncheck.com/xdb/173b8501bb56 , https://vulncheck.com/xdb/9d50ab6135b4||https://vulncheck.com/xdb/9d50ab6135b4 , https://vulncheck.com/xdb/af7ef38c0b58||https://vulncheck.com/xdb/af7ef38c0b58 , https://vulncheck.com/xdb/b112c9f575e9||https://vulncheck.com/xdb/b112c9f575e9 , https://vulncheck.com/xdb/9577c6fee8f6||https://vulncheck.com/xdb/9577c6fee8f6
CVE-2023-46604 Apache ActiveMQ 11/02/2023 0.94436 10.0 https://viz.greynoise.io/tag/apache-activemq-rce-attempt||https://viz.greynoise.io/tag/apache-activemq-rce-attempt TRUE TRUE FALSE https://activemq.apache.org/security-advisories.data/CVE-2023-46604-announcement.txt; https://nvd.nist.gov/vuln/detail/CVE-2023-46604 https://vulncheck.com/xdb/c1ad06a8233f||https://vulncheck.com/xdb/c1ad06a8233f , https://vulncheck.com/xdb/26ec274f11a6||https://vulncheck.com/xdb/26ec274f11a6 , https://vulncheck.com/xdb/bd01e441da28||https://vulncheck.com/xdb/bd01e441da28 , https://vulncheck.com/xdb/adc63f08a561||https://vulncheck.com/xdb/adc63f08a561 , https://vulncheck.com/xdb/1e134f0874f8||https://vulncheck.com/xdb/1e134f0874f8 , https://vulncheck.com/xdb/bf84564c744c||https://vulncheck.com/xdb/bf84564c744c , https://vulncheck.com/xdb/e3eff001f1db||https://vulncheck.com/xdb/e3eff001f1db , https://vulncheck.com/xdb/f688c01da056||https://vulncheck.com/xdb/f688c01da056 , https://vulncheck.com/xdb/111d5aa9554f||https://vulncheck.com/xdb/111d5aa9554f , https://vulncheck.com/xdb/7adf2c60412f||https://vulncheck.com/xdb/7adf2c60412f , https://vulncheck.com/xdb/453453dd752f||https://vulncheck.com/xdb/453453dd752f , https://vulncheck.com/xdb/cc4ca3b4d289||https://vulncheck.com/xdb/cc4ca3b4d289 , https://vulncheck.com/xdb/7d454efa423f||https://vulncheck.com/xdb/7d454efa423f , https://vulncheck.com/xdb/9af52ad961ce||https://vulncheck.com/xdb/9af52ad961ce , https://vulncheck.com/xdb/f5d0e2739b8c||https://vulncheck.com/xdb/f5d0e2739b8c , https://vulncheck.com/xdb/90299d8578e8||https://vulncheck.com/xdb/90299d8578e8 , https://vulncheck.com/xdb/8ce9f74afedc||https://vulncheck.com/xdb/8ce9f74afedc , https://vulncheck.com/xdb/9c19a15a7306||https://vulncheck.com/xdb/9c19a15a7306 , https://vulncheck.com/xdb/c01880ea274b||https://vulncheck.com/xdb/c01880ea274b , https://vulncheck.com/xdb/2a263bac5fa9||https://vulncheck.com/xdb/2a263bac5fa9 , https://vulncheck.com/xdb/d6b987f7cb4c||https://vulncheck.com/xdb/d6b987f7cb4c , https://vulncheck.com/xdb/5f38a93c3fe0||https://vulncheck.com/xdb/5f38a93c3fe0
CVE-2023-46748 F5 BIG-IP Configuration Utility 10/31/2023 0.04042 8.8 FALSE FALSE FALSE https://my.f5.com/manage/s/article/K000137365 ; https://nvd.nist.gov/vuln/detail/CVE-2023-46748
CVE-2023-46747 F5 BIG-IP Configuration Utility 10/31/2023 0.94441 9.8 https://viz.greynoise.io/tag/f5-big-ip-cve-2023-46747-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-cve-2023-46747-rce-attempt 2 TRUE TRUE FALSE https://my.f5.com/manage/s/article/K000137353; https://nvd.nist.gov/vuln/detail/CVE-2023-46747 https://vulncheck.com/xdb/9d0696424c70||https://vulncheck.com/xdb/9d0696424c70 , https://vulncheck.com/xdb/88ce0f9aef32||https://vulncheck.com/xdb/88ce0f9aef32 , https://vulncheck.com/xdb/b52643f70db2||https://vulncheck.com/xdb/b52643f70db2 , https://vulncheck.com/xdb/b56c51787c69||https://vulncheck.com/xdb/b56c51787c69 , https://vulncheck.com/xdb/c694e014985b||https://vulncheck.com/xdb/c694e014985b , https://vulncheck.com/xdb/834010b85f13||https://vulncheck.com/xdb/834010b85f13
CVE-2023-5631 Roundcube Webmail 10/26/2023 0.90987 6.1 FALSE FALSE FALSE https://roundcube.net/news/2023/10/16/security-update-1.6.4-released, https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15 ; https://nvd.nist.gov/vuln/detail/CVE-2023-5631
CVE-2023-20273 Cisco Cisco IOS XE Web UI 10/23/2023 0.92717 7.2 https://viz.greynoise.io/tag/cisco-ios-xe-rce-cve-2023-20273-attempt||https://viz.greynoise.io/tag/cisco-ios-xe-rce-cve-2023-20273-attempt FALSE TRUE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z; https://nvd.nist.gov/vuln/detail/CVE-2023-20273 https://vulncheck.com/xdb/397a0b3fc5a1
CVE-2021-1435 Cisco Cisco IOS XE Web UI 10/19/2023 0.00384 6.6 FALSE FALSE FALSE https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/
CVE-2023-4966 Citrix NetScaler ADC and NetScaler Gateway 10/18/2023 0.94378 9.4 https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-attempt , https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-check||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-4966-information-disclosure-check 5 TRUE TRUE FALSE https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/, https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967 ; https://nvd.nist.gov/vuln/detail/CVE-2023-4966 https://vulncheck.com/xdb/d0f56bd97312||https://vulncheck.com/xdb/d0f56bd97312 , https://vulncheck.com/xdb/eda602714add||https://vulncheck.com/xdb/eda602714add , https://vulncheck.com/xdb/1730dedb1e6c||https://vulncheck.com/xdb/1730dedb1e6c , https://vulncheck.com/xdb/6d5dd2374b9a||https://vulncheck.com/xdb/6d5dd2374b9a , https://vulncheck.com/xdb/8eb103a2c3b0||https://vulncheck.com/xdb/8eb103a2c3b0 , https://vulncheck.com/xdb/71f6515411fa||https://vulncheck.com/xdb/71f6515411fa , https://vulncheck.com/xdb/583a12f31374||https://vulncheck.com/xdb/583a12f31374 , https://vulncheck.com/xdb/10b2c72de037||https://vulncheck.com/xdb/10b2c72de037 , https://vulncheck.com/xdb/fad40eedba5f||https://vulncheck.com/xdb/fad40eedba5f , https://vulncheck.com/xdb/f0d1f1f65636||https://vulncheck.com/xdb/f0d1f1f65636 , https://vulncheck.com/xdb/4329c3c26f5c||https://vulncheck.com/xdb/4329c3c26f5c , https://vulncheck.com/xdb/fd87f38c3710||https://vulncheck.com/xdb/fd87f38c3710
CVE-2023-20198 Cisco IOS XE Web UI 10/16/2023 0.94162 10.0 https://viz.greynoise.io/tag/cisco-ios-xe-cve-2023-20198-scanner||https://viz.greynoise.io/tag/cisco-ios-xe-cve-2023-20198-scanner , https://viz.greynoise.io/tag/cisco-ios-xe-privilege-escalation-attempt||https://viz.greynoise.io/tag/cisco-ios-xe-privilege-escalation-attempt 236 TRUE TRUE FALSE https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-dublin-17121/221128-software-fix-availability-for-cisco-ios.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20198 https://vulncheck.com/xdb/776fa8a7922c||https://vulncheck.com/xdb/776fa8a7922c , https://vulncheck.com/xdb/5ddefc8f6c3a||https://vulncheck.com/xdb/5ddefc8f6c3a , https://vulncheck.com/xdb/dd7c031f8763||https://vulncheck.com/xdb/dd7c031f8763 , https://vulncheck.com/xdb/6628d3a046f1||https://vulncheck.com/xdb/6628d3a046f1 , https://vulncheck.com/xdb/ff6ce06a2c5a||https://vulncheck.com/xdb/ff6ce06a2c5a , https://vulncheck.com/xdb/7cec6c4757e7||https://vulncheck.com/xdb/7cec6c4757e7 , https://vulncheck.com/xdb/d7c1f4c82bb7||https://vulncheck.com/xdb/d7c1f4c82bb7 , https://vulncheck.com/xdb/1281b61abcb0||https://vulncheck.com/xdb/1281b61abcb0
CVE-2023-41763 Microsoft Skype for Business 10/10/2023 0.19791 5.3 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-41763; https://nvd.nist.gov/vuln/detail/CVE-2023-41763
CVE-2023-44487 IETF HTTP/2 10/10/2023 0.94437 7.5 FALSE TRUE FALSE This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487; https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/; https://nvd.nist.gov/vuln/detail/CVE-2023-44487 https://vulncheck.com/xdb/a64a9ab88fd5||https://vulncheck.com/xdb/a64a9ab88fd5 , https://vulncheck.com/xdb/34690740d2d3||https://vulncheck.com/xdb/34690740d2d3 , https://vulncheck.com/xdb/6dd9a135b0d8||https://vulncheck.com/xdb/6dd9a135b0d8 , https://vulncheck.com/xdb/f0fe97192105||https://vulncheck.com/xdb/f0fe97192105 , https://vulncheck.com/xdb/b3d01bf4f362||https://vulncheck.com/xdb/b3d01bf4f362 , https://vulncheck.com/xdb/c3bd71694fc8||https://vulncheck.com/xdb/c3bd71694fc8 , https://vulncheck.com/xdb/de08f4feae4c||https://vulncheck.com/xdb/de08f4feae4c , https://vulncheck.com/xdb/dcaf0e10df00||https://vulncheck.com/xdb/dcaf0e10df00 , https://vulncheck.com/xdb/2a1d7187487e||https://vulncheck.com/xdb/2a1d7187487e , https://vulncheck.com/xdb/78fb05ded384||https://vulncheck.com/xdb/78fb05ded384 , https://vulncheck.com/xdb/54af2e2a4404||https://vulncheck.com/xdb/54af2e2a4404 , https://vulncheck.com/xdb/f5782b81dab1||https://vulncheck.com/xdb/f5782b81dab1 , https://vulncheck.com/xdb/0f9d4f2a05f8||https://vulncheck.com/xdb/0f9d4f2a05f8 , https://vulncheck.com/xdb/1a4725458b4a||https://vulncheck.com/xdb/1a4725458b4a , https://vulncheck.com/xdb/95898a14699a||https://vulncheck.com/xdb/95898a14699a
CVE-2023-36563 Microsoft WordPad 10/10/2023 0.00745 6.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36563; https://nvd.nist.gov/vuln/detail/CVE-2023-36563
CVE-2023-20109 Cisco IOS and IOS XE 10/10/2023 0.00879 6.6 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx; https://nvd.nist.gov/vuln/detail/CVE-2023-20109
CVE-2023-21608 Adobe Acrobat and Reader 10/10/2023 0.88960 7.8 FALSE TRUE FALSE https://helpx.adobe.com/security/products/acrobat/apsb23-01.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21608 https://vulncheck.com/xdb/0717f1503e66||https://vulncheck.com/xdb/0717f1503e66 , https://vulncheck.com/xdb/29d414efa30d||https://vulncheck.com/xdb/29d414efa30d
CVE-2023-42824 Apple iOS and iPadOS 10/05/2023 0.00515 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213961; https://nvd.nist.gov/vuln/detail/CVE-2023-42824
CVE-2023-22515 Atlassian Confluence Data Center and Server 10/05/2023 0.94365 10.0 https://viz.greynoise.io/tag/atlassian-confluence-server-privilege-escalation-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-privilege-escalation-attempt 18 TRUE TRUE FALSE https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515 https://vulncheck.com/xdb/d1a7360ad4aa||https://vulncheck.com/xdb/d1a7360ad4aa , https://vulncheck.com/xdb/1476d745bdd8||https://vulncheck.com/xdb/1476d745bdd8 , https://vulncheck.com/xdb/331998b69600||https://vulncheck.com/xdb/331998b69600 , https://vulncheck.com/xdb/60c1f99992ac||https://vulncheck.com/xdb/60c1f99992ac , https://vulncheck.com/xdb/fa96709f1aff||https://vulncheck.com/xdb/fa96709f1aff , https://vulncheck.com/xdb/b179feb841ca||https://vulncheck.com/xdb/b179feb841ca , https://vulncheck.com/xdb/d52ac20466b2||https://vulncheck.com/xdb/d52ac20466b2 , https://vulncheck.com/xdb/63759da36933||https://vulncheck.com/xdb/63759da36933 , https://vulncheck.com/xdb/101896665425||https://vulncheck.com/xdb/101896665425 , https://vulncheck.com/xdb/c3834d7050f1||https://vulncheck.com/xdb/c3834d7050f1 , https://vulncheck.com/xdb/4482a214bee0||https://vulncheck.com/xdb/4482a214bee0 , https://vulncheck.com/xdb/9c39f6bf800c||https://vulncheck.com/xdb/9c39f6bf800c , https://vulncheck.com/xdb/bd7912683190||https://vulncheck.com/xdb/bd7912683190 , https://vulncheck.com/xdb/dd10c7ed859e||https://vulncheck.com/xdb/dd10c7ed859e , https://vulncheck.com/xdb/62d32405c6da||https://vulncheck.com/xdb/62d32405c6da , https://vulncheck.com/xdb/2c6f91286eac||https://vulncheck.com/xdb/2c6f91286eac , https://vulncheck.com/xdb/ce588e7e7050||https://vulncheck.com/xdb/ce588e7e7050 , https://vulncheck.com/xdb/a9f8f396455c||https://vulncheck.com/xdb/a9f8f396455c , https://vulncheck.com/xdb/d75adb32bcb4||https://vulncheck.com/xdb/d75adb32bcb4 , https://vulncheck.com/xdb/cd9c98c483ee||https://vulncheck.com/xdb/cd9c98c483ee
CVE-2023-40044 Progress WS_FTP Server 10/05/2023 0.94427 10.0 https://viz.greynoise.io/tag/progress-ws-ftp-server-scanner||https://viz.greynoise.io/tag/progress-ws-ftp-server-scanner , https://viz.greynoise.io/tag/progress-ws-ftp-server-cve-2023-40044-rce-attempt||https://viz.greynoise.io/tag/progress-ws-ftp-server-cve-2023-40044-rce-attempt 0 TRUE TRUE FALSE https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023; https://nvd.nist.gov/vuln/detail/CVE-2023-40044
CVE-2023-28229 Microsoft Windows CNG Key Isolation Service 10/04/2023 0.07065 7.0 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229; https://nvd.nist.gov/vuln/detail/CVE-2023-28229 https://vulncheck.com/xdb/2a3dcdd65fe2||https://vulncheck.com/xdb/2a3dcdd65fe2 , https://vulncheck.com/xdb/389ef9618afd||https://vulncheck.com/xdb/389ef9618afd
CVE-2023-42793 JetBrains TeamCity 10/04/2023 0.94584 9.8 https://viz.greynoise.io/tag/jetbrains-teamcity-authentication-bypass-attempt||https://viz.greynoise.io/tag/jetbrains-teamcity-authentication-bypass-attempt 4 TRUE TRUE FALSE https://blog.jetbrains.com/teamcity/2023/09/critical-security-issue-affecting-teamcity-on-premises-update-to-2023-05-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-42793 https://vulncheck.com/xdb/ee24de727fe4||https://vulncheck.com/xdb/ee24de727fe4 , https://vulncheck.com/xdb/8adc4eabd25a||https://vulncheck.com/xdb/8adc4eabd25a , https://vulncheck.com/xdb/c3ff544301c1||https://vulncheck.com/xdb/c3ff544301c1 , https://vulncheck.com/xdb/0bad07d29b7f||https://vulncheck.com/xdb/0bad07d29b7f , https://vulncheck.com/xdb/934bc956f553||https://vulncheck.com/xdb/934bc956f553 , https://vulncheck.com/xdb/10fd4d91a094||https://vulncheck.com/xdb/10fd4d91a094 , https://vulncheck.com/xdb/9b0f25203e7a||https://vulncheck.com/xdb/9b0f25203e7a , https://vulncheck.com/xdb/4a3db2dbc4c2||https://vulncheck.com/xdb/4a3db2dbc4c2 , https://vulncheck.com/xdb/5e4deb6fe264||https://vulncheck.com/xdb/5e4deb6fe264 , https://vulncheck.com/xdb/bc5a2b0e1d27||https://vulncheck.com/xdb/bc5a2b0e1d27 , https://vulncheck.com/xdb/cd1c718f6e87||https://vulncheck.com/xdb/cd1c718f6e87 , https://vulncheck.com/xdb/5559dd30ebb6||https://vulncheck.com/xdb/5559dd30ebb6
CVE-2023-4211 Arm Mali GPU Kernel Driver 10/03/2023 0.00052 5.5 FALSE FALSE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-4211
CVE-2023-5217 Google Chromium libvpx 10/02/2023 0.02030 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2023-5217 https://vulncheck.com/xdb/2bac536dad72
CVE-2018-14667 Red Hat JBoss RichFaces Framework 09/28/2023 0.88444 9.8 https://viz.greynoise.io/tag/richfaces-rce-scanning||https://viz.greynoise.io/tag/richfaces-rce-scanning FALSE TRUE FALSE https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667; https://nvd.nist.gov/vuln/detail/CVE-2018-14667 https://vulncheck.com/xdb/484aa7ad502f||https://vulncheck.com/xdb/484aa7ad502f , https://vulncheck.com/xdb/19e2dcdd6dd0||https://vulncheck.com/xdb/19e2dcdd6dd0
CVE-2023-41993 Apple Multiple Products 09/25/2023 0.08952 8.8 FALSE TRUE FALSE https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213930; https://nvd.nist.gov/vuln/detail/CVE-2023-41993 https://vulncheck.com/xdb/8065f39b344f||https://vulncheck.com/xdb/8065f39b344f , https://vulncheck.com/xdb/7b279092940a||https://vulncheck.com/xdb/7b279092940a , https://vulncheck.com/xdb/a1262876e3e8||https://vulncheck.com/xdb/a1262876e3e8 , https://vulncheck.com/xdb/87f86676e025||https://vulncheck.com/xdb/87f86676e025
CVE-2023-41992 Apple Multiple Products 09/25/2023 0.00388 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931, https://support.apple.com/en-us/HT213932; https://nvd.nist.gov/vuln/detail/CVE-2023-41992
CVE-2023-41991 Apple Multiple Products 09/25/2023 0.06198 5.5 FALSE TRUE FALSE https://support.apple.com/en-us/HT213926, https://support.apple.com/en-us/HT213927, https://support.apple.com/en-us/HT213928, https://support.apple.com/en-us/HT213929, https://support.apple.com/en-us/HT213931 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41991 https://vulncheck.com/xdb/895e960cb008
CVE-2023-41179 Trend Micro Apex One and Worry-Free Business Security 09/21/2023 0.01510 7.2 FALSE FALSE FALSE https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-41179
CVE-2023-28434 MinIO MinIO 09/19/2023 0.33706 8.8 FALSE TRUE FALSE https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c; https://nvd.nist.gov/vuln/detail/CVE-2023-28434 https://vulncheck.com/xdb/ba8d8634a7d1||https://vulncheck.com/xdb/ba8d8634a7d1 , https://vulncheck.com/xdb/ed33127b0327||https://vulncheck.com/xdb/ed33127b0327
CVE-2022-31461 Owl Labs Meeting Owl 09/18/2023 0.00097 7.4 FALSE FALSE FALSE This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update
CVE-2022-31459 Owl Labs Meeting Owl 09/18/2023 0.00090 7.4 FALSE FALSE FALSE This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update
CVE-2014-8361 Realtek SDK 09/18/2023 0.94038 9.8 https://viz.greynoise.io/tag/realtek-miniigd-upnp-worm-attempt||https://viz.greynoise.io/tag/realtek-miniigd-upnp-worm-attempt 224 FALSE TRUE TRUE https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361
CVE-2022-22265 Samsung Mobile Devices 09/18/2023 0.00211 5.0 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1; https://nvd.nist.gov/vuln/detail/CVE-2022-22265
CVE-2021-3129 Laravel Ignition 09/18/2023 0.94287 9.8 https://viz.greynoise.io/tag/ignition-debug-rce-vuln-check||https://viz.greynoise.io/tag/ignition-debug-rce-vuln-check , https://viz.greynoise.io/tag/ignition-debug-rce-attempt||https://viz.greynoise.io/tag/ignition-debug-rce-attempt 7 TRUE TRUE FALSE https://github.com/facade/ignition/releases/tag/2.5.2; https://nvd.nist.gov/vuln/detail/CVE-2021-3129 https://vulncheck.com/xdb/ca8748e2b909||https://vulncheck.com/xdb/ca8748e2b909 , https://vulncheck.com/xdb/78b35be1dc24||https://vulncheck.com/xdb/78b35be1dc24 , https://vulncheck.com/xdb/3a52a9c9227f||https://vulncheck.com/xdb/3a52a9c9227f , https://vulncheck.com/xdb/76a6df778206||https://vulncheck.com/xdb/76a6df778206 , https://vulncheck.com/xdb/8773f8dc585a||https://vulncheck.com/xdb/8773f8dc585a , https://vulncheck.com/xdb/504b16c118c4||https://vulncheck.com/xdb/504b16c118c4 , https://vulncheck.com/xdb/f500f5c13d9c||https://vulncheck.com/xdb/f500f5c13d9c , https://vulncheck.com/xdb/633a39ff42e5||https://vulncheck.com/xdb/633a39ff42e5 , https://vulncheck.com/xdb/0f3a032cb75b||https://vulncheck.com/xdb/0f3a032cb75b , https://vulncheck.com/xdb/a310e9e90d01||https://vulncheck.com/xdb/a310e9e90d01 , https://vulncheck.com/xdb/47a1b3108a7c||https://vulncheck.com/xdb/47a1b3108a7c , https://vulncheck.com/xdb/d69431f93556||https://vulncheck.com/xdb/d69431f93556 , https://vulncheck.com/xdb/9a17d0a89e57||https://vulncheck.com/xdb/9a17d0a89e57 , https://vulncheck.com/xdb/3f630a9ea757||https://vulncheck.com/xdb/3f630a9ea757 , https://vulncheck.com/xdb/5f4cc8cb7fe8||https://vulncheck.com/xdb/5f4cc8cb7fe8 , https://vulncheck.com/xdb/d6fabfe71d88||https://vulncheck.com/xdb/d6fabfe71d88 , https://vulncheck.com/xdb/8168517a0701||https://vulncheck.com/xdb/8168517a0701 , https://vulncheck.com/xdb/d4c406d658a9||https://vulncheck.com/xdb/d4c406d658a9 , https://vulncheck.com/xdb/b58398140e57||https://vulncheck.com/xdb/b58398140e57 , https://vulncheck.com/xdb/686106caeaab||https://vulncheck.com/xdb/686106caeaab , https://vulncheck.com/xdb/570147c7cbc0||https://vulncheck.com/xdb/570147c7cbc0 , https://vulncheck.com/xdb/87edd3bbabdf||https://vulncheck.com/xdb/87edd3bbabdf , https://vulncheck.com/xdb/9612bcbc8150||https://vulncheck.com/xdb/9612bcbc8150 , https://vulncheck.com/xdb/fcb02bd261db||https://vulncheck.com/xdb/fcb02bd261db , https://vulncheck.com/xdb/067f7c923e08||https://vulncheck.com/xdb/067f7c923e08 , https://vulncheck.com/xdb/ef7d2df1ab88||https://vulncheck.com/xdb/ef7d2df1ab88 , https://vulncheck.com/xdb/35724c55fdc0||https://vulncheck.com/xdb/35724c55fdc0 , https://vulncheck.com/xdb/e9d83dcde53d||https://vulncheck.com/xdb/e9d83dcde53d
CVE-2022-31463 Owl Labs Meeting Owl 09/18/2023 0.00147 8.2 FALSE FALSE FALSE This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update
CVE-2017-6884 Zyxel EMG2926 Routers 09/18/2023 0.90748 8.8 https://viz.greynoise.io/tag/zyxel-cve-2017-6884-rce-attempt||https://viz.greynoise.io/tag/zyxel-cve-2017-6884-rce-attempt TRUE TRUE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https://www.zyxelguard.com/Zyxel-EOL.asp; https://nvd.nist.gov/vuln/detail/CVE-2017-6884
CVE-2022-31462 Owl Labs Meeting Owl 09/18/2023 0.00104 9.3 FALSE FALSE FALSE This CVE is currently under review status. The Due Date for remediation has been extended a week to conduct this review. https://resources.owllabs.com/blog/owl-labs-update
CVE-2023-26369 Adobe Acrobat and Reader 09/14/2023 0.00430 7.8 FALSE FALSE FALSE https://helpx.adobe.com/security/products/acrobat/apsb23-34.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26369
CVE-2023-4863 Google Chromium WebP 09/13/2023 0.93991 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html?m=1; https://nvd.nist.gov/vuln/detail/CVE-2023-4863 https://vulncheck.com/xdb/e14284c48cde||https://vulncheck.com/xdb/e14284c48cde , https://vulncheck.com/xdb/6ae5ac416de8||https://vulncheck.com/xdb/6ae5ac416de8
CVE-2023-20269 Cisco Adaptive Security Appliance and Firepower Threat Defense 09/13/2023 0.00282 5.0 TRUE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC; https://nvd.nist.gov/vuln/detail/CVE-2023-20269
CVE-2023-35674 Android Framework 09/13/2023 0.00056 7.8 FALSE FALSE FALSE https://source.android.com/docs/security/bulletin/2023-09-01; https://nvd.nist.gov/vuln/detail/CVE-2023-35674
CVE-2023-36802 Microsoft Streaming Service Proxy 09/12/2023 0.72574 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802; https://nvd.nist.gov/vuln/detail/CVE-2023-36802 https://vulncheck.com/xdb/79a67f937c90||https://vulncheck.com/xdb/79a67f937c90 , https://vulncheck.com/xdb/1d0208a3fc70||https://vulncheck.com/xdb/1d0208a3fc70 , https://vulncheck.com/xdb/14df2dd4eaa7||https://vulncheck.com/xdb/14df2dd4eaa7 , https://vulncheck.com/xdb/2dc4169fabc7||https://vulncheck.com/xdb/2dc4169fabc7
CVE-2023-36761 Microsoft Word 09/12/2023 0.03710 6.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761; https://nvd.nist.gov/vuln/detail/CVE-2023-36761
CVE-2023-41064 Apple iOS, iPadOS, and macOS 09/11/2023 0.92560 7.8 FALSE TRUE FALSE https://support.apple.com/en-us/HT213905, https://support.apple.com/en-us/HT213906; https://nvd.nist.gov/vuln/detail/CVE-2023-41064 https://vulncheck.com/xdb/7800a7854005||https://vulncheck.com/xdb/7800a7854005 , https://vulncheck.com/xdb/031f9a980a40||https://vulncheck.com/xdb/031f9a980a40
CVE-2023-41061 Apple iOS, iPadOS, and watchOS 09/11/2023 0.04104 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213905, https://support.apple.com/kb/HT213907; https://nvd.nist.gov/vuln/detail/CVE-2023-41061
CVE-2023-33246 Apache RocketMQ 09/06/2023 0.94388 9.8 https://viz.greynoise.io/tag/apache-rocketmq-rce-attempt||https://viz.greynoise.io/tag/apache-rocketmq-rce-attempt 2 FALSE TRUE FALSE https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp; https://nvd.nist.gov/vuln/detail/CVE-2023-33246 https://vulncheck.com/xdb/3068e2f9ef10||https://vulncheck.com/xdb/3068e2f9ef10 , https://vulncheck.com/xdb/d4697400457f||https://vulncheck.com/xdb/d4697400457f , https://vulncheck.com/xdb/6a010bfe0097||https://vulncheck.com/xdb/6a010bfe0097 , https://vulncheck.com/xdb/de034939c964||https://vulncheck.com/xdb/de034939c964 , https://vulncheck.com/xdb/b486dcf3f31d||https://vulncheck.com/xdb/b486dcf3f31d , https://vulncheck.com/xdb/cf4f1e593dfc||https://vulncheck.com/xdb/cf4f1e593dfc
CVE-2023-38831 RARLAB WinRAR 08/24/2023 0.93630 7.8 TRUE TRUE FALSE http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa; https://nvd.nist.gov/vuln/detail/CVE-2023-38831 https://vulncheck.com/xdb/6208ddae83ea||https://vulncheck.com/xdb/6208ddae83ea , https://vulncheck.com/xdb/961810ec007a||https://vulncheck.com/xdb/961810ec007a , https://vulncheck.com/xdb/d704a3a58e0d||https://vulncheck.com/xdb/d704a3a58e0d , https://vulncheck.com/xdb/ca38deed9702||https://vulncheck.com/xdb/ca38deed9702 , https://vulncheck.com/xdb/b966bed92174||https://vulncheck.com/xdb/b966bed92174 , https://vulncheck.com/xdb/7dcca41be653||https://vulncheck.com/xdb/7dcca41be653 , https://vulncheck.com/xdb/a75f196603f7||https://vulncheck.com/xdb/a75f196603f7 , https://vulncheck.com/xdb/19a60291e736||https://vulncheck.com/xdb/19a60291e736 , https://vulncheck.com/xdb/d05f5cb3bfb3||https://vulncheck.com/xdb/d05f5cb3bfb3 , https://vulncheck.com/xdb/2ca9a374acca||https://vulncheck.com/xdb/2ca9a374acca , https://vulncheck.com/xdb/79f7f6337617||https://vulncheck.com/xdb/79f7f6337617 , https://vulncheck.com/xdb/09fa7b37a7b1||https://vulncheck.com/xdb/09fa7b37a7b1 , https://vulncheck.com/xdb/e63676267c2b||https://vulncheck.com/xdb/e63676267c2b , https://vulncheck.com/xdb/e71319d3a28f||https://vulncheck.com/xdb/e71319d3a28f , https://vulncheck.com/xdb/d33335e6c044||https://vulncheck.com/xdb/d33335e6c044 , https://vulncheck.com/xdb/068a817a11af||https://vulncheck.com/xdb/068a817a11af , https://vulncheck.com/xdb/475dd98e97c6||https://vulncheck.com/xdb/475dd98e97c6 , https://vulncheck.com/xdb/96f0b49ccafb||https://vulncheck.com/xdb/96f0b49ccafb , https://vulncheck.com/xdb/11b438e8125e||https://vulncheck.com/xdb/11b438e8125e , https://vulncheck.com/xdb/0c5387964f92||https://vulncheck.com/xdb/0c5387964f92 , https://vulncheck.com/xdb/4902c64dcdcc||https://vulncheck.com/xdb/4902c64dcdcc , https://vulncheck.com/xdb/49b8da5dd1b3||https://vulncheck.com/xdb/49b8da5dd1b3 , https://vulncheck.com/xdb/43e31d83b0d2||https://vulncheck.com/xdb/43e31d83b0d2 , https://vulncheck.com/xdb/477e160f5f9e||https://vulncheck.com/xdb/477e160f5f9e , https://vulncheck.com/xdb/35f40b8462a2||https://vulncheck.com/xdb/35f40b8462a2 , https://vulncheck.com/xdb/6ddb49c0b30f||https://vulncheck.com/xdb/6ddb49c0b30f , https://vulncheck.com/xdb/ed6dc92dcb52||https://vulncheck.com/xdb/ed6dc92dcb52 , https://vulncheck.com/xdb/8e66511c03f9||https://vulncheck.com/xdb/8e66511c03f9 , https://vulncheck.com/xdb/78c5d047fc26||https://vulncheck.com/xdb/78c5d047fc26 , https://vulncheck.com/xdb/12c5984d5f98||https://vulncheck.com/xdb/12c5984d5f98 , https://vulncheck.com/xdb/13a6362b2a83||https://vulncheck.com/xdb/13a6362b2a83 , https://vulncheck.com/xdb/f3b016e52591||https://vulncheck.com/xdb/f3b016e52591 , https://vulncheck.com/xdb/d4284b00ae4f||https://vulncheck.com/xdb/d4284b00ae4f , https://vulncheck.com/xdb/0d73a5eda2f5||https://vulncheck.com/xdb/0d73a5eda2f5 , https://vulncheck.com/xdb/3e5e3d32361a||https://vulncheck.com/xdb/3e5e3d32361a
CVE-2023-32315 Ignite Realtime Openfire 08/24/2023 0.94439 8.6 https://viz.greynoise.io/tag/openfire-path-traversal-attempt||https://viz.greynoise.io/tag/openfire-path-traversal-attempt 0 TRUE TRUE FALSE https://www.igniterealtime.org/downloads/#openfire; https://nvd.nist.gov/vuln/detail/CVE-2023-32315 https://vulncheck.com/xdb/b5629fbcb899||https://vulncheck.com/xdb/b5629fbcb899 , https://vulncheck.com/xdb/ce355fc71318||https://vulncheck.com/xdb/ce355fc71318 , https://vulncheck.com/xdb/ff8717c9e924||https://vulncheck.com/xdb/ff8717c9e924 , https://vulncheck.com/xdb/cb2e44728680||https://vulncheck.com/xdb/cb2e44728680 , https://vulncheck.com/xdb/f482f234a7ad||https://vulncheck.com/xdb/f482f234a7ad , https://vulncheck.com/xdb/8bc67e139e7f||https://vulncheck.com/xdb/8bc67e139e7f , https://vulncheck.com/xdb/780f73b8ce90||https://vulncheck.com/xdb/780f73b8ce90 , https://vulncheck.com/xdb/a5e7325d7024||https://vulncheck.com/xdb/a5e7325d7024 , https://vulncheck.com/xdb/ec0dcf4feee2||https://vulncheck.com/xdb/ec0dcf4feee2 , https://vulncheck.com/xdb/9b3c465efeb8||https://vulncheck.com/xdb/9b3c465efeb8
CVE-2023-38035 Ivanti Sentry 08/22/2023 0.94435 9.8 https://viz.greynoise.io/tag/ivanti-mobileiron-sentry-auth-bypass-attempt||https://viz.greynoise.io/tag/ivanti-mobileiron-sentry-auth-bypass-attempt 0 TRUE TRUE FALSE https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2023-38035 https://vulncheck.com/xdb/fe81f7d04639||https://vulncheck.com/xdb/fe81f7d04639 , https://vulncheck.com/xdb/c3f8192d108d||https://vulncheck.com/xdb/c3f8192d108d , https://vulncheck.com/xdb/36d6ae60bcbf||https://vulncheck.com/xdb/36d6ae60bcbf
CVE-2023-27532 Veeam Backup & Replication 08/22/2023 0.76645 7.5 https://viz.greynoise.io/tag/veeam-backup-and-replication-credentials-retrieval-attempt||https://viz.greynoise.io/tag/veeam-backup-and-replication-credentials-retrieval-attempt TRUE TRUE FALSE https://www.veeam.com/kb4424; https://nvd.nist.gov/vuln/detail/CVE-2023-27532 https://vulncheck.com/xdb/a0eedd90601f||https://vulncheck.com/xdb/a0eedd90601f , https://vulncheck.com/xdb/be7830da6e38||https://vulncheck.com/xdb/be7830da6e38 , https://vulncheck.com/xdb/70b9158e5d47||https://vulncheck.com/xdb/70b9158e5d47
CVE-2023-26359 Adobe ColdFusion 08/21/2023 0.87826 9.8 https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt FALSE FALSE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26359
CVE-2023-24489 Citrix Content Collaboration 08/16/2023 0.94389 9.8 https://viz.greynoise.io/tag/citrix-sharefile-rce-attempt||https://viz.greynoise.io/tag/citrix-sharefile-rce-attempt 0 TRUE TRUE FALSE https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489; https://nvd.nist.gov/vuln/detail/CVE-2023-24489 https://vulncheck.com/xdb/8475d791cb21||https://vulncheck.com/xdb/8475d791cb21 , https://vulncheck.com/xdb/4339d2e00b3e||https://vulncheck.com/xdb/4339d2e00b3e , https://vulncheck.com/xdb/7ccdbf38419f||https://vulncheck.com/xdb/7ccdbf38419f
CVE-2023-38180 Microsoft .NET Core and Visual Studio 08/09/2023 0.00133 7.5 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-38180; https://nvd.nist.gov/vuln/detail/CVE-2023-38180
CVE-2017-18368 Zyxel P660HN-T1A Routers 08/07/2023 0.93738 9.8 https://viz.greynoise.io/tag/zyxel-router-worm-attempt||https://viz.greynoise.io/tag/zyxel-router-worm-attempt 12 FALSE TRUE TRUE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-a-new-variant-of-gafgyt-malware; https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-p660hn-t1a-dsl-cpe; https://nvd.nist.gov/vuln/detail/CVE-2017-18368 https://vulncheck.com/xdb/c2436c7a0a65
CVE-2023-35081 Ivanti Endpoint Manager Mobile (EPMM) 07/31/2023 0.93208 7.2 3 FALSE FALSE FALSE https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35081
CVE-2023-37580 Synacor Zimbra Collaboration Suite (ZCS) 07/27/2023 0.93864 6.1 FALSE FALSE FALSE https://wiki.zimbra.com/wiki/Security_Center ; https://nvd.nist.gov/vuln/detail/CVE-2023-37580
CVE-2023-38606 Apple Multiple Products 07/26/2023 0.00170 5.5 FALSE FALSE FALSE https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213843,https://support.apple.com/en-us/HT213844,https://support.apple.com/en-us/HT213845,https://support.apple.com/en-us/HT213846,https://support.apple.com/en-us/HT213848 ; https://nvd.nist.gov/vuln/detail/CVE-2023-38606
CVE-2023-35078 Ivanti Endpoint Manager Mobile (EPMM) 07/25/2023 0.94485 10.0 https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt||https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt 5 TRUE TRUE FALSE https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2023-35078 https://vulncheck.com/xdb/a192b5ef44a0||https://vulncheck.com/xdb/a192b5ef44a0 , https://vulncheck.com/xdb/12c05897b78d||https://vulncheck.com/xdb/12c05897b78d , https://vulncheck.com/xdb/3b672a96ad67||https://vulncheck.com/xdb/3b672a96ad67 , https://vulncheck.com/xdb/e1a88c6220da||https://vulncheck.com/xdb/e1a88c6220da , https://vulncheck.com/xdb/f6d6db77b679||https://vulncheck.com/xdb/f6d6db77b679
CVE-2023-38205 Adobe ColdFusion 07/20/2023 0.94298 7.5 https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38205-security-feature-bypass-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-38205-security-feature-bypass-attempt 1 FALSE FALSE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html ; https://nvd.nist.gov/vuln/detail/CVE-2023-38205
CVE-2023-29298 Adobe ColdFusion 07/20/2023 0.94310 7.5 https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29298-access-control-bypass-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-cve-2023-29298-access-control-bypass-attempt 1 FALSE FALSE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html; https://nvd.nist.gov/vuln/detail/CVE-2023-29298
CVE-2023-3519 Citrix NetScaler ADC and NetScaler Gateway 07/19/2023 0.92260 9.8 https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-3519-rce-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-cve-2023-3519-rce-attempt 0 TRUE TRUE FALSE https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467; https://nvd.nist.gov/vuln/detail/CVE-2023-3519 https://vulncheck.com/xdb/2c8a25fd6e83||https://vulncheck.com/xdb/2c8a25fd6e83 , https://vulncheck.com/xdb/8bdcf32f9f84||https://vulncheck.com/xdb/8bdcf32f9f84 , https://vulncheck.com/xdb/1ff61bc7f252||https://vulncheck.com/xdb/1ff61bc7f252 , https://vulncheck.com/xdb/1f43ba642b00||https://vulncheck.com/xdb/1f43ba642b00 , https://vulncheck.com/xdb/1dceea81abe0||https://vulncheck.com/xdb/1dceea81abe0 , https://vulncheck.com/xdb/a40d42ae400a||https://vulncheck.com/xdb/a40d42ae400a , https://vulncheck.com/xdb/d8dc36e352eb||https://vulncheck.com/xdb/d8dc36e352eb , https://vulncheck.com/xdb/9e9c040fa62e||https://vulncheck.com/xdb/9e9c040fa62e
CVE-2023-36884 Microsoft Windows 07/17/2023 0.93099 7.5 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884; https://nvd.nist.gov/vuln/detail/CVE-2023-36884 https://vulncheck.com/xdb/ca6e5038ebdc
CVE-2022-29303 SolarView Compact 07/13/2023 0.94368 9.8 https://viz.greynoise.io/tag/solarview-compact-6-rce-attempt||https://viz.greynoise.io/tag/solarview-compact-6-rce-attempt 3 FALSE TRUE TRUE https://jvn.jp/en/vu/JVNVU92327282/; https://nvd.nist.gov/vuln/detail/CVE-2022-29303
CVE-2023-37450 Apple Multiple Products 07/13/2023 0.00014 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213826, https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213843, https://support.apple.com/en-us/HT213846, https://support.apple.com/en-us/HT213848; https://nvd.nist.gov/vuln/detail/CVE-2023-37450
CVE-2023-32046 Microsoft Windows 07/11/2023 0.81240 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32046; https://nvd.nist.gov/vuln/detail/CVE-2023-32046
CVE-2022-31199 Netwrix Auditor 07/11/2023 0.06288 9.8 https://viz.greynoise.io/tag/netwrix-auditor-user-activity-video-recording-rce-cve-2022-31199-attempt||https://viz.greynoise.io/tag/netwrix-auditor-user-activity-video-recording-rce-cve-2022-31199-attempt TRUE FALSE FALSE Patch application requires login to customer portal: https://security.netwrix.com/Account/SignIn?ReturnUrl=%2FAdvisories%2FADV-2022-003; https://nvd.nist.gov/vuln/detail/CVE-2022-31199
CVE-2023-35311 Microsoft Outlook 07/11/2023 0.01272 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-35311; https://nvd.nist.gov/vuln/detail/CVE-2023-35311
CVE-2023-36874 Microsoft Windows 07/11/2023 0.52563 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-36874; https://nvd.nist.gov/vuln/detail/CVE-2023-36874 https://vulncheck.com/xdb/280c2ac034a6||https://vulncheck.com/xdb/280c2ac034a6 , https://vulncheck.com/xdb/6218c1637bc9||https://vulncheck.com/xdb/6218c1637bc9 , https://vulncheck.com/xdb/87527a477737||https://vulncheck.com/xdb/87527a477737 , https://vulncheck.com/xdb/e688302f0377||https://vulncheck.com/xdb/e688302f0377
CVE-2023-32049 Microsoft Windows 07/11/2023 0.11774 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32049; https://nvd.nist.gov/vuln/detail/CVE-2023-32049
CVE-2021-29256 Arm Mali Graphics Processing Unit (GPU) 07/07/2023 0.00965 8.8 FALSE FALSE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2021-29256
CVE-2021-25394 Samsung Mobile Devices 06/29/2023 0.00927 6.4 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5; https://nvd.nist.gov/vuln/detail/CVE-2021-25394
CVE-2021-25487 Samsung Mobile Devices 06/29/2023 0.00926 7.3 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10; https://nvd.nist.gov/vuln/detail/CVE-2021-25487
CVE-2019-20500 D-Link DWL-2600AP Access Point 06/29/2023 0.93662 7.8 https://viz.greynoise.io/tag/d-link-dwl-2600ap-rce-attempt||https://viz.greynoise.io/tag/d-link-dwl-2600ap-rce-attempt FALSE TRUE FALSE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10113; https://nvd.nist.gov/vuln/detail/CVE-2019-20500
CVE-2021-25372 Samsung Mobile Devices 06/29/2023 0.01872 6.1 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=3; https://nvd.nist.gov/vuln/detail/CVE-2021-25372
CVE-2021-25489 Samsung Mobile Devices 06/29/2023 0.00289 3.3 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10; https://nvd.nist.gov/vuln/detail/CVE-2021-25489
CVE-2021-25371 Samsung Mobile Devices 06/29/2023 0.02521 6.1 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=3; https://nvd.nist.gov/vuln/detail/CVE-2021-25371
CVE-2019-17621 D-Link DIR-859 Router 06/29/2023 0.93194 9.8 https://viz.greynoise.io/tag/d-link-dir-859-gena-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-859-gena-rce-attempt 0 FALSE TRUE TRUE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147; https://nvd.nist.gov/vuln/detail/CVE-2019-17621 https://vulncheck.com/xdb/84b463cab7cd
CVE-2021-25395 Samsung Mobile Devices 06/29/2023 0.00203 6.4 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=5; https://nvd.nist.gov/vuln/detail/CVE-2021-25395
CVE-2023-32435 Apple Multiple Products 06/23/2023 0.00888 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213670, https://support.apple.com/en-us/HT213671, https://support.apple.com/en-us/HT213676, https://support.apple.com/en-us/HT213811; https://nvd.nist.gov/vuln/detail/CVE-2023-32435
CVE-2023-32439 Apple Multiple Products 06/23/2023 0.00386 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213813, https://support.apple.com/en-us/HT213811, https://support.apple.com/en-us/HT213814, https://support.apple.com/en-us/HT213816; https://nvd.nist.gov/vuln/detail/CVE-2023-32439
CVE-2023-32434 Apple Multiple Products 06/23/2023 0.84022 7.8 FALSE TRUE FALSE https://support.apple.com/en-us/HT213808, https://support.apple.com/en-us/HT213812, https://support.apple.com/en-us/HT213809, https://support.apple.com/en-us/HT213810, https://support.apple.com/en-us/HT213813, https://support.apple.com/en-us/HT213811, https://support.apple.com/en-us/HT213814; https://nvd.nist.gov/vuln/detail/CVE-2023-32434 https://vulncheck.com/xdb/57fa976907c4
CVE-2023-20867 VMware Tools 06/23/2023 0.00514 3.9 TRUE FALSE FALSE https://www.vmware.com/security/advisories/VMSA-2023-0013.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20867
CVE-2023-27992 Zyxel Multiple Network-Attached Storage (NAS) Devices 06/23/2023 0.88459 9.8 https://viz.greynoise.io/tag/zyxel-nas-rce-cve-2023-27992-attempt||https://viz.greynoise.io/tag/zyxel-nas-rce-cve-2023-27992-attempt 0 FALSE FALSE TRUE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-pre-authentication-command-injection-vulnerability-in-nas-products; https://nvd.nist.gov/vuln/detail/CVE-2023-27992
CVE-2016-9079 Mozilla Firefox, Firefox ESR, and Thunderbird 06/22/2023 0.84964 7.5 FALSE TRUE FALSE https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/#CVE-2016-9079; https://nvd.nist.gov/vuln/detail/CVE-2016-9079 https://vulncheck.com/xdb/9171867a941e||https://vulncheck.com/xdb/9171867a941e , https://vulncheck.com/xdb/ea2825280c25||https://vulncheck.com/xdb/ea2825280c25 , https://vulncheck.com/xdb/f7a2358079b0||https://vulncheck.com/xdb/f7a2358079b0
CVE-2023-20887 VMware Aria Operations for Networks 06/22/2023 0.94389 9.8 https://viz.greynoise.io/tag/vmware-aria-operations-for-networks-rce-attempt||https://viz.greynoise.io/tag/vmware-aria-operations-for-networks-rce-attempt 2 FALSE TRUE FALSE https://www.vmware.com/security/advisories/VMSA-2023-0012.html; https://nvd.nist.gov/vuln/detail/CVE-2023-20887 https://vulncheck.com/xdb/ed2571767837||https://vulncheck.com/xdb/ed2571767837 , https://vulncheck.com/xdb/8d653e739f78||https://vulncheck.com/xdb/8d653e739f78 , https://vulncheck.com/xdb/c3a61a4c0873||https://vulncheck.com/xdb/c3a61a4c0873
CVE-2016-0165 Microsoft Win32k 06/22/2023 0.11623 7.8 FALSE TRUE FALSE https://learn.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039; https://nvd.nist.gov/vuln/detail/CVE-2016-0165
CVE-2021-44026 Roundcube Roundcube Webmail 06/22/2023 0.71497 9.8 FALSE TRUE FALSE https://roundcube.net/news/2021/11/12/security-updates-1.4.12-and-1.3.17-released; https://nvd.nist.gov/vuln/detail/CVE-2021-44026 https://vulncheck.com/xdb/c472c99d6420||https://vulncheck.com/xdb/c472c99d6420 , https://vulncheck.com/xdb/810f8d092dd5||https://vulncheck.com/xdb/810f8d092dd5
CVE-2020-35730 Roundcube Roundcube Webmail 06/22/2023 0.73952 6.1 FALSE TRUE FALSE https://roundcube.net/news/2020/12/27/security-updates-1.4.10-1.3.16-and-1.2.13; https://nvd.nist.gov/vuln/detail/CVE-2020-35730 https://vulncheck.com/xdb/bc7c78af2f10
CVE-2020-12641 Roundcube Roundcube Webmail 06/22/2023 0.93688 9.8 https://viz.greynoise.io/tag/roundcube-webmail-rce-attempt||https://viz.greynoise.io/tag/roundcube-webmail-rce-attempt FALSE FALSE FALSE https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10; https://nvd.nist.gov/vuln/detail/CVE-2020-12641
CVE-2023-27997 Fortinet FortiOS and FortiProxy SSL-VPN 06/13/2023 0.90471 9.8 https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-cve-2023-27997-attempt||https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-cve-2023-27997-attempt TRUE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-23-097; https://nvd.nist.gov/vuln/detail/CVE-2023-27997 https://vulncheck.com/xdb/c21297b5f565||https://vulncheck.com/xdb/c21297b5f565 , https://vulncheck.com/xdb/ad5db6a3b215||https://vulncheck.com/xdb/ad5db6a3b215 , https://vulncheck.com/xdb/2d8501b18677||https://vulncheck.com/xdb/2d8501b18677 , https://vulncheck.com/xdb/58ad1cabba09||https://vulncheck.com/xdb/58ad1cabba09 , https://vulncheck.com/xdb/261997d3bd2f||https://vulncheck.com/xdb/261997d3bd2f , https://vulncheck.com/xdb/7257b7541300||https://vulncheck.com/xdb/7257b7541300 , https://vulncheck.com/xdb/c42e440bbfba||https://vulncheck.com/xdb/c42e440bbfba , https://vulncheck.com/xdb/a4ee616f0f8d||https://vulncheck.com/xdb/a4ee616f0f8d
CVE-2023-3079 Google Chromium V8 06/07/2023 0.00612 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2023-3079 https://vulncheck.com/xdb/3c2b1c7c45b7
CVE-2023-33010 Zyxel Multiple Firewalls 06/05/2023 0.07196 9.8 FALSE FALSE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33010
CVE-2023-33009 Zyxel Multiple Firewalls 06/05/2023 0.04637 9.8 FALSE FALSE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-buffer-overflow-vulnerabilities-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-33009
CVE-2023-34362 Progress MOVEit Transfer 06/02/2023 0.94485 9.8 https://viz.greynoise.io/tag/moveit-transfer-scanner||https://viz.greynoise.io/tag/moveit-transfer-scanner , https://viz.greynoise.io/tag/moveit-sql-injection-attempt||https://viz.greynoise.io/tag/moveit-sql-injection-attempt , https://viz.greynoise.io/tag/moveit-csrf-spoof-attempt||https://viz.greynoise.io/tag/moveit-csrf-spoof-attempt , https://viz.greynoise.io/tag/moveit-cve-2023-34362-attempt||https://viz.greynoise.io/tag/moveit-cve-2023-34362-attempt 0 TRUE TRUE FALSE This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023.; https://nvd.nist.gov/vuln/detail/CVE-2023-34362 https://vulncheck.com/xdb/cf79e9f8e1ec||https://vulncheck.com/xdb/cf79e9f8e1ec , https://vulncheck.com/xdb/11c34e25ffba||https://vulncheck.com/xdb/11c34e25ffba , https://vulncheck.com/xdb/0fae161dfedc||https://vulncheck.com/xdb/0fae161dfedc , https://vulncheck.com/xdb/5b8de9df4561||https://vulncheck.com/xdb/5b8de9df4561 , https://vulncheck.com/xdb/cd4489a09748||https://vulncheck.com/xdb/cd4489a09748
CVE-2023-28771 Zyxel Multiple Firewalls 05/31/2023 0.94350 9.8 https://viz.greynoise.io/tag/zyxel-ike-server-rce-cve-2023-28771-attempt||https://viz.greynoise.io/tag/zyxel-ike-server-rce-cve-2023-28771-attempt 8 FALSE TRUE FALSE https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls; https://nvd.nist.gov/vuln/detail/CVE-2023-28771
CVE-2023-2868 Barracuda Networks Email Security Gateway (ESG) Appliance 05/26/2023 0.90104 9.4 FALSE TRUE FALSE https://status.barracuda.com/incidents/34kx82j5n4q9; https://nvd.nist.gov/vuln/detail/CVE-2023-2868 https://vulncheck.com/xdb/eb964d29bc36
CVE-2023-28204 Apple Multiple Products 05/22/2023 0.00042 6.5 FALSE FALSE FALSE https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-28204
CVE-2023-32373 Apple Multiple Products 05/22/2023 0.00014 8.8 FALSE FALSE FALSE https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-32373
CVE-2023-32409 Apple Multiple Products 05/22/2023 0.00354 8.6 FALSE FALSE FALSE https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-32409
CVE-2004-1464 Cisco IOS 05/19/2023 0.01257 5.9 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464
CVE-2023-21492 Samsung Mobile Devices 05/19/2023 0.00494 4.4 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2023-21492
CVE-2016-6415 Cisco IOS, IOS XR, and IOS XE 05/19/2023 0.92948 7.5 FALSE TRUE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1; https://nvd.nist.gov/vuln/detail/CVE-2016-6415 https://vulncheck.com/xdb/e720a3447e7a||https://vulncheck.com/xdb/e720a3447e7a , https://vulncheck.com/xdb/196b3cc71710||https://vulncheck.com/xdb/196b3cc71710
CVE-2016-8735 Apache Tomcat 05/12/2023 0.94096 9.8 FALSE FALSE FALSE https://tomcat.apache.org/security-9.html; https://nvd.nist.gov/vuln/detail/CVE-2016-8735
CVE-2016-3427 Oracle Java SE and JRockit 05/12/2023 0.93934 9.8 FALSE FALSE FALSE https://www.oracle.com/security-alerts/cpuapr2016v3.html; https://nvd.nist.gov/vuln/detail/CVE-2016-3427
CVE-2021-3560 Red Hat Polkit 05/12/2023 0.05351 7.8 FALSE TRUE FALSE https://bugzilla.redhat.com/show_bug.cgi?id=1961710; https://nvd.nist.gov/vuln/detail/CVE-2021-3560 https://vulncheck.com/xdb/5458d4a55c6f||https://vulncheck.com/xdb/5458d4a55c6f , https://vulncheck.com/xdb/201ca3f02f33||https://vulncheck.com/xdb/201ca3f02f33 , https://vulncheck.com/xdb/635680273494||https://vulncheck.com/xdb/635680273494 , https://vulncheck.com/xdb/f006252e1faa||https://vulncheck.com/xdb/f006252e1faa , https://vulncheck.com/xdb/e55338406838||https://vulncheck.com/xdb/e55338406838 , https://vulncheck.com/xdb/4c9042d8ae10||https://vulncheck.com/xdb/4c9042d8ae10 , https://vulncheck.com/xdb/b9083d54f435||https://vulncheck.com/xdb/b9083d54f435 , https://vulncheck.com/xdb/eb01bdf5882c||https://vulncheck.com/xdb/eb01bdf5882c , https://vulncheck.com/xdb/fe5ce90a026f||https://vulncheck.com/xdb/fe5ce90a026f , https://vulncheck.com/xdb/1a9fd1b14178||https://vulncheck.com/xdb/1a9fd1b14178 , https://vulncheck.com/xdb/b9903bce0f77||https://vulncheck.com/xdb/b9903bce0f77 , https://vulncheck.com/xdb/d89126ce6bd4||https://vulncheck.com/xdb/d89126ce6bd4 , https://vulncheck.com/xdb/cd90ec71f715||https://vulncheck.com/xdb/cd90ec71f715 , https://vulncheck.com/xdb/25e4e99ad519||https://vulncheck.com/xdb/25e4e99ad519 , https://vulncheck.com/xdb/ab99d39a10ae||https://vulncheck.com/xdb/ab99d39a10ae , https://vulncheck.com/xdb/3c3962d97923||https://vulncheck.com/xdb/3c3962d97923 , https://vulncheck.com/xdb/bed1611a3e31||https://vulncheck.com/xdb/bed1611a3e31 , https://vulncheck.com/xdb/0d4f1d0b0a97||https://vulncheck.com/xdb/0d4f1d0b0a97 , https://vulncheck.com/xdb/9e693b05320b||https://vulncheck.com/xdb/9e693b05320b , https://vulncheck.com/xdb/dd1aeadeb04f||https://vulncheck.com/xdb/dd1aeadeb04f , https://vulncheck.com/xdb/e4e946e08867||https://vulncheck.com/xdb/e4e946e08867 , https://vulncheck.com/xdb/d61c55d40a53||https://vulncheck.com/xdb/d61c55d40a53
CVE-2014-0196 Linux Kernel 05/12/2023 0.60264 5.5 FALSE TRUE FALSE https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196 https://vulncheck.com/xdb/dc9022508ef9||https://vulncheck.com/xdb/dc9022508ef9 , https://vulncheck.com/xdb/cd9f2a0f1fca||https://vulncheck.com/xdb/cd9f2a0f1fca
CVE-2015-5317 Jenkins Jenkins User Interface (UI) 05/12/2023 0.28615 7.5 FALSE FALSE FALSE https://www.jenkins.io/security/advisory/2015-11-11/; https://nvd.nist.gov/vuln/detail/CVE-2015-5317
CVE-2010-3904 Linux Kernel 05/12/2023 0.02116 7.8 FALSE TRUE FALSE https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904 https://vulncheck.com/xdb/5cf258448d69
CVE-2023-25717 Ruckus Wireless Multiple Products 05/12/2023 0.94354 9.8 https://viz.greynoise.io/tag/ruckus-wireless-admin-rce-attempt||https://viz.greynoise.io/tag/ruckus-wireless-admin-rce-attempt 0 FALSE FALSE TRUE https://support.ruckuswireless.com/security_bulletins/315; https://nvd.nist.gov/vuln/detail/CVE-2023-25717
CVE-2023-29336 Microsoft Win32k 05/09/2023 0.74584 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29336; https://nvd.nist.gov/vuln/detail/CVE-2023-29336 https://vulncheck.com/xdb/79154f41d6e7||https://vulncheck.com/xdb/79154f41d6e7 , https://vulncheck.com/xdb/3661f8004753||https://vulncheck.com/xdb/3661f8004753
CVE-2023-21839 Oracle WebLogic Server 05/01/2023 0.93259 7.5 https://viz.greynoise.io/tag/oracle-weblogic-cve-2023-21839-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2023-21839-rce-attempt FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpujan2023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21839 https://vulncheck.com/xdb/996186ddaca6||https://vulncheck.com/xdb/996186ddaca6 , https://vulncheck.com/xdb/592e612813ca||https://vulncheck.com/xdb/592e612813ca , https://vulncheck.com/xdb/da2508c4c86e||https://vulncheck.com/xdb/da2508c4c86e , https://vulncheck.com/xdb/cd2f75e7d0eb||https://vulncheck.com/xdb/cd2f75e7d0eb
CVE-2021-45046 Apache Log4j2 05/01/2023 0.94340 9.0 https://viz.greynoise.io/tag/apache-log4j-rce-attempt||https://viz.greynoise.io/tag/apache-log4j-rce-attempt TRUE TRUE FALSE https://logging.apache.org/log4j/2.x/security.html; https://nvd.nist.gov/vuln/detail/CVE-2021-45046 https://vulncheck.com/xdb/be66907d213a||https://vulncheck.com/xdb/be66907d213a , https://vulncheck.com/xdb/0c7bc7dc64b4||https://vulncheck.com/xdb/0c7bc7dc64b4
CVE-2023-1389 TP-Link Archer AX21 05/01/2023 0.93893 8.8 https://viz.greynoise.io/tag/tplink-archer-ax21-cij-scan||https://viz.greynoise.io/tag/tplink-archer-ax21-cij-scan 4 FALSE TRUE TRUE https://www.tp-link.com/us/support/download/archer-ax21/v3/#Firmware; https://nvd.nist.gov/vuln/detail/CVE-2023-1389 https://vulncheck.com/xdb/ab6c386fe91a||https://vulncheck.com/xdb/ab6c386fe91a , https://vulncheck.com/xdb/62ee86041daf||https://vulncheck.com/xdb/62ee86041daf , https://vulncheck.com/xdb/de122ba820a3||https://vulncheck.com/xdb/de122ba820a3
CVE-2023-2136 Google Chromium Skia 04/21/2023 0.00289 9.6 FALSE FALSE FALSE https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2136
CVE-2023-28432 MinIO MinIO 04/21/2023 0.93860 7.5 https://viz.greynoise.io/tag/minio-information-disclosure-attempt||https://viz.greynoise.io/tag/minio-information-disclosure-attempt 1 FALSE TRUE FALSE https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q; https://nvd.nist.gov/vuln/detail/CVE-2023-28432 https://vulncheck.com/xdb/b5a191fe1548||https://vulncheck.com/xdb/b5a191fe1548 , https://vulncheck.com/xdb/2f2181c8c371||https://vulncheck.com/xdb/2f2181c8c371 , https://vulncheck.com/xdb/265e34c2d00b||https://vulncheck.com/xdb/265e34c2d00b , https://vulncheck.com/xdb/135cba389f2d||https://vulncheck.com/xdb/135cba389f2d , https://vulncheck.com/xdb/88c33874c8a8||https://vulncheck.com/xdb/88c33874c8a8 , https://vulncheck.com/xdb/8a90a12dbb9d||https://vulncheck.com/xdb/8a90a12dbb9d , https://vulncheck.com/xdb/b03d61e273cd||https://vulncheck.com/xdb/b03d61e273cd , https://vulncheck.com/xdb/b297acbd5c68||https://vulncheck.com/xdb/b297acbd5c68 , https://vulncheck.com/xdb/2bce5ce3653d||https://vulncheck.com/xdb/2bce5ce3653d , https://vulncheck.com/xdb/c098a3a1e4d1||https://vulncheck.com/xdb/c098a3a1e4d1 , https://vulncheck.com/xdb/3fa0cfa7912a||https://vulncheck.com/xdb/3fa0cfa7912a , https://vulncheck.com/xdb/ddf25a501579||https://vulncheck.com/xdb/ddf25a501579 , https://vulncheck.com/xdb/362042b30e53||https://vulncheck.com/xdb/362042b30e53 , https://vulncheck.com/xdb/ce019ea1d113||https://vulncheck.com/xdb/ce019ea1d113 , https://vulncheck.com/xdb/f8d3bffd0b5f||https://vulncheck.com/xdb/f8d3bffd0b5f
CVE-2023-27350 PaperCut MF/NG 04/21/2023 0.94257 9.8 https://viz.greynoise.io/tag/papercut-rce-attempt||https://viz.greynoise.io/tag/papercut-rce-attempt , https://viz.greynoise.io/tag/papercut-authentication-bypass-check||https://viz.greynoise.io/tag/papercut-authentication-bypass-check 2 TRUE TRUE FALSE https://www.papercut.com/kb/Main/PO-1216-and-PO-1219; https://nvd.nist.gov/vuln/detail/CVE-2023-27350 https://vulncheck.com/xdb/1c0718580d28||https://vulncheck.com/xdb/1c0718580d28 , https://vulncheck.com/xdb/bd68c4a2099b||https://vulncheck.com/xdb/bd68c4a2099b , https://vulncheck.com/xdb/40e9921e9645||https://vulncheck.com/xdb/40e9921e9645 , https://vulncheck.com/xdb/5436303f61fa||https://vulncheck.com/xdb/5436303f61fa , https://vulncheck.com/xdb/c6701956d915||https://vulncheck.com/xdb/c6701956d915 , https://vulncheck.com/xdb/26313d6db3f2||https://vulncheck.com/xdb/26313d6db3f2 , https://vulncheck.com/xdb/e218f81318d4||https://vulncheck.com/xdb/e218f81318d4
CVE-2017-6742 Cisco IOS and IOS XE Software 04/19/2023 0.05565 8.8 FALSE FALSE FALSE https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742
CVE-2019-8526 Apple macOS 04/17/2023 0.00349 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT209600; https://nvd.nist.gov/vuln/detail/CVE-2019-8526
CVE-2023-2033 Google Chromium V8 04/17/2023 0.05697 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2033 https://vulncheck.com/xdb/d26f2d5a3b34||https://vulncheck.com/xdb/d26f2d5a3b34 , https://vulncheck.com/xdb/c1a7e545bc7d||https://vulncheck.com/xdb/c1a7e545bc7d
CVE-2023-20963 Android Framework 04/13/2023 0.03721 7.8 FALSE TRUE FALSE https://source.android.com/docs/security/bulletin/2023-03-01; https://nvd.nist.gov/vuln/detail/CVE-2023-20963 https://vulncheck.com/xdb/b65e107ed569||https://vulncheck.com/xdb/b65e107ed569 , https://vulncheck.com/xdb/ab7e394561a2||https://vulncheck.com/xdb/ab7e394561a2
CVE-2023-29492 Novi Survey Novi Survey 04/13/2023 0.25529 9.8 FALSE FALSE FALSE https://novisurvey.net/blog/novi-survey-security-advisory-apr-2023.aspx; https://nvd.nist.gov/vuln/detail/CVE-2023-29492
CVE-2023-28252 Microsoft Windows 04/11/2023 0.52956 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252; https://nvd.nist.gov/vuln/detail/CVE-2023-28252 https://vulncheck.com/xdb/18c023678d14||https://vulncheck.com/xdb/18c023678d14 , https://vulncheck.com/xdb/6f57704a8749||https://vulncheck.com/xdb/6f57704a8749 , https://vulncheck.com/xdb/98d4738b82f7||https://vulncheck.com/xdb/98d4738b82f7 , https://vulncheck.com/xdb/c433f2e8bd59||https://vulncheck.com/xdb/c433f2e8bd59
CVE-2023-28206 Apple iOS, iPadOS, and macOS 04/10/2023 0.23339 8.6 FALSE TRUE FALSE https://support.apple.com/en-us/HT213720, https://support.apple.com/en-us/HT213721; https://nvd.nist.gov/vuln/detail/CVE-2023-28206 https://vulncheck.com/xdb/431fb00495f9
CVE-2023-28205 Apple Multiple Products 04/10/2023 0.00120 8.8 FALSE TRUE FALSE https://support.apple.com/en-us/HT213720,https://support.apple.com/en-us/HT213721,https://support.apple.com/en-us/HT213722,https://support.apple.com/en-us/HT213723; https://nvd.nist.gov/vuln/detail/CVE-2023-28205 https://vulncheck.com/xdb/9a944fb94c97
CVE-2021-27877 Veritas Backup Exec Agent 04/07/2023 0.00970 8.2 TRUE TRUE FALSE https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27877
CVE-2019-1388 Microsoft Windows 04/07/2023 0.03381 7.8 TRUE TRUE FALSE https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1388; https://nvd.nist.gov/vuln/detail/CVE-2019-1388 https://vulncheck.com/xdb/ffc4f0f49488
CVE-2021-27878 Veritas Backup Exec Agent 04/07/2023 0.00976 8.8 TRUE TRUE FALSE https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27878
CVE-2023-26083 Arm Mali Graphics Processing Unit (GPU) 04/07/2023 0.00466 3.3 FALSE FALSE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2023-26083
CVE-2021-27876 Veritas Backup Exec Agent 04/07/2023 0.00640 8.1 TRUE TRUE FALSE https://www.veritas.com/support/en_US/security/VTS21-001; https://nvd.nist.gov/vuln/detail/CVE-2021-27876
CVE-2022-27926 Synacor Zimbra Collaboration Suite (ZCS) 04/03/2023 0.94239 6.1 https://viz.greynoise.io/tag/zimbra-collaboration-suite-rxss||https://viz.greynoise.io/tag/zimbra-collaboration-suite-rxss FALSE FALSE FALSE https://wiki.zimbra.com/wiki/Security_Center; https://nvd.nist.gov/vuln/detail/CVE-2022-27926
CVE-2022-38181 Arm Mali Graphics Processing Unit (GPU) 03/30/2023 0.20978 8.8 FALSE TRUE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2022-38181 https://vulncheck.com/xdb/0ea5523595cc||https://vulncheck.com/xdb/0ea5523595cc , https://vulncheck.com/xdb/36b7eb9b6e72||https://vulncheck.com/xdb/36b7eb9b6e72 , https://vulncheck.com/xdb/3d6d1c7d139e||https://vulncheck.com/xdb/3d6d1c7d139e
CVE-2017-7494 Samba Samba 03/30/2023 0.94300 9.8 TRUE TRUE FALSE https://www.samba.org/samba/security/CVE-2017-7494.html; https://nvd.nist.gov/vuln/detail/CVE-2017-7494 https://vulncheck.com/xdb/874bfa3f41cc||https://vulncheck.com/xdb/874bfa3f41cc , https://vulncheck.com/xdb/e6971e9715d0||https://vulncheck.com/xdb/e6971e9715d0 , https://vulncheck.com/xdb/6b2fdeea9b0e||https://vulncheck.com/xdb/6b2fdeea9b0e , https://vulncheck.com/xdb/6095b3679d4f||https://vulncheck.com/xdb/6095b3679d4f , https://vulncheck.com/xdb/57e3c5583e71||https://vulncheck.com/xdb/57e3c5583e71 , https://vulncheck.com/xdb/b4a79e992993||https://vulncheck.com/xdb/b4a79e992993 , https://vulncheck.com/xdb/d60f0bdd37ca||https://vulncheck.com/xdb/d60f0bdd37ca , https://vulncheck.com/xdb/5febf3930e17||https://vulncheck.com/xdb/5febf3930e17 , https://vulncheck.com/xdb/0e1687dfba66||https://vulncheck.com/xdb/0e1687dfba66 , https://vulncheck.com/xdb/5192c6b266c3||https://vulncheck.com/xdb/5192c6b266c3 , https://vulncheck.com/xdb/03f724914e5d||https://vulncheck.com/xdb/03f724914e5d
CVE-2022-22706 Arm Mali Graphics Processing Unit (GPU) 03/30/2023 0.00052 7.8 FALSE FALSE FALSE https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities; https://nvd.nist.gov/vuln/detail/CVE-2022-22706
CVE-2013-3163 Microsoft Internet Explorer 03/30/2023 0.85365 8.8 FALSE TRUE FALSE https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055; https://nvd.nist.gov/vuln/detail/CVE-2013-3163
CVE-2022-42948 Fortra Cobalt Strike 03/30/2023 0.12130 9.8 FALSE FALSE FALSE https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-2/; https://nvd.nist.gov/vuln/detail/CVE-2022-42948
CVE-2022-39197 Fortra Cobalt Strike 03/30/2023 0.10252 6.1 FALSE TRUE FALSE https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/; https://nvd.nist.gov/vuln/detail/CVE-2022-39197 https://vulncheck.com/xdb/4af7d16aa28e||https://vulncheck.com/xdb/4af7d16aa28e , https://vulncheck.com/xdb/2cbdcb7cc5f9||https://vulncheck.com/xdb/2cbdcb7cc5f9 , https://vulncheck.com/xdb/2167a9246991||https://vulncheck.com/xdb/2167a9246991 , https://vulncheck.com/xdb/e27264b8a97a||https://vulncheck.com/xdb/e27264b8a97a , https://vulncheck.com/xdb/e6228f53d546||https://vulncheck.com/xdb/e6228f53d546 , https://vulncheck.com/xdb/c4a0f56cf3e1||https://vulncheck.com/xdb/c4a0f56cf3e1 , https://vulncheck.com/xdb/828e9a4bb798||https://vulncheck.com/xdb/828e9a4bb798
CVE-2021-30900 Apple iOS, iPadOS, and macOS 03/30/2023 0.01375 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT21286, https://support.apple.com/en-us/HT212868, https://support.apple.com/kb/HT212872; https://nvd.nist.gov/vuln/detail/CVE-2021-30900
CVE-2023-0266 Linux Kernel 03/30/2023 0.00022 7.9 FALSE FALSE FALSE https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4; https://nvd.nist.gov/vuln/detail/CVE-2023-0266
CVE-2022-3038 Google Chromium Network Service 03/30/2023 0.81619 8.8 FALSE FALSE FALSE https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html; https://nvd.nist.gov/vuln/detail/CVE-2022-3038
CVE-2023-26360 Adobe ColdFusion 03/15/2023 0.94326 8.6 https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-cve-2023-26359-attempt 0 FALSE TRUE FALSE https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html; https://nvd.nist.gov/vuln/detail/CVE-2023-26360 https://vulncheck.com/xdb/cea794a31955||https://vulncheck.com/xdb/cea794a31955 , https://vulncheck.com/xdb/857e746a829b||https://vulncheck.com/xdb/857e746a829b
CVE-2023-24880 Microsoft Windows 03/14/2023 0.90535 4.4 TRUE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-24880; https://nvd.nist.gov/vuln/detail/CVE-2023-24880
CVE-2023-23397 Microsoft Office 03/14/2023 0.93547 9.8 https://viz.greynoise.io/tag/microsoft-outlook-rce-attempt||https://viz.greynoise.io/tag/microsoft-outlook-rce-attempt TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23397, https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/, ; https://nvd.nist.gov/vuln/detail/CVE-2023-23397 https://vulncheck.com/xdb/d75a920b3234||https://vulncheck.com/xdb/d75a920b3234 , https://vulncheck.com/xdb/c0620b5dfee4||https://vulncheck.com/xdb/c0620b5dfee4 , https://vulncheck.com/xdb/92069e59a002||https://vulncheck.com/xdb/92069e59a002 , https://vulncheck.com/xdb/6b1515a227c5||https://vulncheck.com/xdb/6b1515a227c5 , https://vulncheck.com/xdb/7c5622c2d3a6||https://vulncheck.com/xdb/7c5622c2d3a6 , https://vulncheck.com/xdb/dc500bda81a1||https://vulncheck.com/xdb/dc500bda81a1 , https://vulncheck.com/xdb/99246ea573d0||https://vulncheck.com/xdb/99246ea573d0 , https://vulncheck.com/xdb/8983cd572882||https://vulncheck.com/xdb/8983cd572882 , https://vulncheck.com/xdb/2c4a55aaa42a||https://vulncheck.com/xdb/2c4a55aaa42a , https://vulncheck.com/xdb/d597159f1565||https://vulncheck.com/xdb/d597159f1565 , https://vulncheck.com/xdb/7d72184f22bf||https://vulncheck.com/xdb/7d72184f22bf , https://vulncheck.com/xdb/645d3afa21d8||https://vulncheck.com/xdb/645d3afa21d8 , https://vulncheck.com/xdb/d533570ebdfa||https://vulncheck.com/xdb/d533570ebdfa , https://vulncheck.com/xdb/6f2546c042ef||https://vulncheck.com/xdb/6f2546c042ef , https://vulncheck.com/xdb/e7dac301aad2||https://vulncheck.com/xdb/e7dac301aad2 , https://vulncheck.com/xdb/205fe7e2ef61||https://vulncheck.com/xdb/205fe7e2ef61 , https://vulncheck.com/xdb/baaf8b3e5c4b||https://vulncheck.com/xdb/baaf8b3e5c4b , https://vulncheck.com/xdb/4a869df48f74||https://vulncheck.com/xdb/4a869df48f74 , https://vulncheck.com/xdb/d81f13d3b637||https://vulncheck.com/xdb/d81f13d3b637 , https://vulncheck.com/xdb/fe69ab5a1930||https://vulncheck.com/xdb/fe69ab5a1930
CVE-2022-41328 Fortinet FortiOS 03/14/2023 0.00135 6.7 FALSE FALSE FALSE https://www.fortiguard.com/psirt/FG-IR-22-369; https://nvd.nist.gov/vuln/detail/CVE-2022-41328
CVE-2020-5741 Plex Media Server 03/10/2023 0.44383 7.2 https://viz.greynoise.io/tag/plex-media-server-unpickle-rce-attempt||https://viz.greynoise.io/tag/plex-media-server-unpickle-rce-attempt FALSE TRUE FALSE https://forums.plex.tv/t/security-regarding-cve-2020-5741/586819; https://nvd.nist.gov/vuln/detail/CVE-2020-5741
CVE-2021-39144 XStream XStream 03/10/2023 0.94412 8.5 https://viz.greynoise.io/tag/vmware-nsx-manager-xstream-rce-attempt||https://viz.greynoise.io/tag/vmware-nsx-manager-xstream-rce-attempt 0 FALSE TRUE FALSE https://www.vmware.com/security/advisories/VMSA-2022-0027.html, https://x-stream.github.io/CVE-2021-39144.html; https://nvd.nist.gov/vuln/detail/CVE-2021-39144
CVE-2022-33891 Apache Spark 03/07/2023 0.94275 8.8 https://viz.greynoise.io/tag/apache-spark-rce-attempt||https://viz.greynoise.io/tag/apache-spark-rce-attempt 1 FALSE TRUE FALSE https://lists.apache.org/thread/p847l3kopoo5bjtmxrcwk21xp6tjxqlc; https://nvd.nist.gov/vuln/detail/CVE-2022-33891 https://vulncheck.com/xdb/b58818c44ca8||https://vulncheck.com/xdb/b58818c44ca8 , https://vulncheck.com/xdb/6cbb30123977||https://vulncheck.com/xdb/6cbb30123977 , https://vulncheck.com/xdb/fb4fa1df680f||https://vulncheck.com/xdb/fb4fa1df680f , https://vulncheck.com/xdb/06189b8556e5||https://vulncheck.com/xdb/06189b8556e5 , https://vulncheck.com/xdb/b69bedfcaf5e||https://vulncheck.com/xdb/b69bedfcaf5e , https://vulncheck.com/xdb/9d36b80b7382||https://vulncheck.com/xdb/9d36b80b7382 , https://vulncheck.com/xdb/32b655f1ada0||https://vulncheck.com/xdb/32b655f1ada0
CVE-2022-28810 Zoho ManageEngine 03/07/2023 0.91665 6.8 https://viz.greynoise.io/tag/zoho-manageengine-adselfservice-plus-cve-2022-28810-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-adselfservice-plus-cve-2022-28810-rce-attempt FALSE TRUE FALSE https://www.manageengine.com/products/self-service-password/advisory/CVE-2022-28810.html; https://nvd.nist.gov/vuln/detail/CVE-2022-28810
CVE-2022-35914 Teclib GLPI 03/07/2023 0.94395 9.8 https://viz.greynoise.io/tag/glpi-remote-code-execution-attmempt||https://viz.greynoise.io/tag/glpi-remote-code-execution-attmempt 3 FALSE TRUE FALSE https://glpi-project.org/fr/glpi-10-0-3-disponible/, http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?&Sfs=htmLawedTest.php&Sl=.%2Finternal_utilities%2FhtmLawed.; https://nvd.nist.gov/vuln/detail/CVE-2022-35914 https://vulncheck.com/xdb/af7f5f766475||https://vulncheck.com/xdb/af7f5f766475 , https://vulncheck.com/xdb/8a8a19d6a785||https://vulncheck.com/xdb/8a8a19d6a785 , https://vulncheck.com/xdb/bd875145c829||https://vulncheck.com/xdb/bd875145c829 , https://vulncheck.com/xdb/c61286d5aed7||https://vulncheck.com/xdb/c61286d5aed7 , https://vulncheck.com/xdb/c9b94cb0248e||https://vulncheck.com/xdb/c9b94cb0248e , https://vulncheck.com/xdb/b18a1f9302c3||https://vulncheck.com/xdb/b18a1f9302c3 , https://vulncheck.com/xdb/fcbba9e81eb7||https://vulncheck.com/xdb/fcbba9e81eb7 , https://vulncheck.com/xdb/e6fd88586096||https://vulncheck.com/xdb/e6fd88586096
CVE-2022-36537 ZK Framework AuUploader 02/27/2023 0.93948 7.5 https://viz.greynoise.io/tag/zk-framework-information-disclosure-attempt||https://viz.greynoise.io/tag/zk-framework-information-disclosure-attempt TRUE TRUE FALSE https://tracker.zkoss.org/browse/ZK-5150; https://nvd.nist.gov/vuln/detail/CVE-2022-36537 https://vulncheck.com/xdb/0508bf2f3fce||https://vulncheck.com/xdb/0508bf2f3fce , https://vulncheck.com/xdb/5ba33e292bd5||https://vulncheck.com/xdb/5ba33e292bd5
CVE-2022-40765 Mitel MiVoice Connect 02/21/2023 0.02747 6.8 TRUE FALSE FALSE https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0007; https://nvd.nist.gov/vuln/detail/CVE-2022-40765
CVE-2022-47986 IBM Aspera Faspex 02/21/2023 0.94345 9.8 https://viz.greynoise.io/tag/ibm-aspera-faspex-rce-attempt||https://viz.greynoise.io/tag/ibm-aspera-faspex-rce-attempt 2 TRUE TRUE FALSE https://exchange.xforce.ibmcloud.com/vulnerabilities/243512?_ga=2.189195179.1800390251.1676559338-700333034.1676325890; https://nvd.nist.gov/vuln/detail/CVE-2022-47986 https://vulncheck.com/xdb/92809581e13d||https://vulncheck.com/xdb/92809581e13d , https://vulncheck.com/xdb/c1baa4196326||https://vulncheck.com/xdb/c1baa4196326 , https://vulncheck.com/xdb/6b17ce52fb0d||https://vulncheck.com/xdb/6b17ce52fb0d , https://vulncheck.com/xdb/3d189791c438||https://vulncheck.com/xdb/3d189791c438
CVE-2022-41223 Mitel MiVoice Connect 02/21/2023 0.03808 6.8 TRUE FALSE FALSE https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008; https://nvd.nist.gov/vuln/detail/CVE-2022-41223
CVE-2022-46169 Cacti Cacti 02/16/2023 0.94469 9.8 https://viz.greynoise.io/tag/cacti-remote-agent-php-unauthenticated-command-injection-attempt||https://viz.greynoise.io/tag/cacti-remote-agent-php-unauthenticated-command-injection-attempt 2 FALSE TRUE FALSE https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf; https://nvd.nist.gov/vuln/detail/CVE-2022-46169 https://vulncheck.com/xdb/8889d02a2c92||https://vulncheck.com/xdb/8889d02a2c92 , https://vulncheck.com/xdb/62e4658694fe||https://vulncheck.com/xdb/62e4658694fe , https://vulncheck.com/xdb/a55dda03e4e8||https://vulncheck.com/xdb/a55dda03e4e8 , https://vulncheck.com/xdb/adcb07c757a5||https://vulncheck.com/xdb/adcb07c757a5 , https://vulncheck.com/xdb/42e7e3d26487||https://vulncheck.com/xdb/42e7e3d26487 , https://vulncheck.com/xdb/5c3c4797be34||https://vulncheck.com/xdb/5c3c4797be34 , https://vulncheck.com/xdb/6281e1eb6950||https://vulncheck.com/xdb/6281e1eb6950 , https://vulncheck.com/xdb/e0af26285da6||https://vulncheck.com/xdb/e0af26285da6 , https://vulncheck.com/xdb/d6bfae898370||https://vulncheck.com/xdb/d6bfae898370 , https://vulncheck.com/xdb/de179daeb01f||https://vulncheck.com/xdb/de179daeb01f , https://vulncheck.com/xdb/1ea0dc48f935||https://vulncheck.com/xdb/1ea0dc48f935 , https://vulncheck.com/xdb/1f8fe00d0251||https://vulncheck.com/xdb/1f8fe00d0251 , https://vulncheck.com/xdb/e1a4679413d3||https://vulncheck.com/xdb/e1a4679413d3 , https://vulncheck.com/xdb/678315c2b725||https://vulncheck.com/xdb/678315c2b725 , https://vulncheck.com/xdb/9cc18470fe06||https://vulncheck.com/xdb/9cc18470fe06 , https://vulncheck.com/xdb/34a258cbb84e||https://vulncheck.com/xdb/34a258cbb84e , https://vulncheck.com/xdb/033e24c697ac||https://vulncheck.com/xdb/033e24c697ac , https://vulncheck.com/xdb/fe2d74ab12b3||https://vulncheck.com/xdb/fe2d74ab12b3 , https://vulncheck.com/xdb/77058a66967d||https://vulncheck.com/xdb/77058a66967d , https://vulncheck.com/xdb/78ba3372d176||https://vulncheck.com/xdb/78ba3372d176 , https://vulncheck.com/xdb/ab7dd53a6032||https://vulncheck.com/xdb/ab7dd53a6032 , https://vulncheck.com/xdb/18c497dc094d||https://vulncheck.com/xdb/18c497dc094d , https://vulncheck.com/xdb/8ef8e9059276||https://vulncheck.com/xdb/8ef8e9059276 , https://vulncheck.com/xdb/564568ef13c1||https://vulncheck.com/xdb/564568ef13c1 , https://vulncheck.com/xdb/7e40710254da||https://vulncheck.com/xdb/7e40710254da , https://vulncheck.com/xdb/b42b36e9f070||https://vulncheck.com/xdb/b42b36e9f070 , https://vulncheck.com/xdb/4174b70e7788||https://vulncheck.com/xdb/4174b70e7788 , https://vulncheck.com/xdb/1f2f47fde662||https://vulncheck.com/xdb/1f2f47fde662 , https://vulncheck.com/xdb/ced8bc131b4a||https://vulncheck.com/xdb/ced8bc131b4a , https://vulncheck.com/xdb/c3426a18652b||https://vulncheck.com/xdb/c3426a18652b , https://vulncheck.com/xdb/f6ffcfbeab8c||https://vulncheck.com/xdb/f6ffcfbeab8c , https://vulncheck.com/xdb/8b4444ba432d||https://vulncheck.com/xdb/8b4444ba432d , https://vulncheck.com/xdb/a131913950fb||https://vulncheck.com/xdb/a131913950fb
CVE-2023-21823 Microsoft Windows 02/14/2023 0.02438 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21823; https://nvd.nist.gov/vuln/detail/CVE-2023-21823
CVE-2023-23376 Microsoft Windows 02/14/2023 0.12460 7.8 TRUE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-23376; https://nvd.nist.gov/vuln/detail/CVE-2023-23376
CVE-2023-21715 Microsoft Office 02/14/2023 0.00505 7.3 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21715; https://nvd.nist.gov/vuln/detail/CVE-2023-21715
CVE-2023-23529 Apple Multiple Products 02/14/2023 0.00091 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213635, https://support.apple.com/en-us/HT213633, https://support.apple.com/en-us/HT213638; https://nvd.nist.gov/vuln/detail/CVE-2023-23529
CVE-2015-2291 Intel Ethernet Diagnostics Driver for Windows 02/10/2023 0.03152 7.8 TRUE TRUE FALSE https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html; https://nvd.nist.gov/vuln/detail/CVE-2015-2291 https://vulncheck.com/xdb/9cedf5dc5031
CVE-2023-0669 Fortra GoAnywhere MFT 02/10/2023 0.94364 7.2 https://viz.greynoise.io/tag/goanywhere-mft-command-injection-attempt||https://viz.greynoise.io/tag/goanywhere-mft-command-injection-attempt 9 TRUE TRUE FALSE This CVE has a CISA AA located here: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a. Please see the AA for associated IOCs. Additional information is available at: https://my.goanywhere.com/webclient/DownloadProductFiles.xhtml. Fortra users must have an account in order to login and access the patch.; https://nvd.nist.gov/vuln/detail/CVE-2023-0669 https://vulncheck.com/xdb/7b70d10333a3||https://vulncheck.com/xdb/7b70d10333a3 , https://vulncheck.com/xdb/49e1cc44b9bb||https://vulncheck.com/xdb/49e1cc44b9bb
CVE-2022-24990 TerraMaster TerraMaster OS 02/10/2023 0.94401 7.5 https://viz.greynoise.io/tag/terramaster-nas-api-php-rce-check||https://viz.greynoise.io/tag/terramaster-nas-api-php-rce-check 1 TRUE TRUE TRUE https://forum.terra-master.com/en/viewtopic.php?t=3030; https://nvd.nist.gov/vuln/detail/CVE-2022-24990 https://vulncheck.com/xdb/25b052136658||https://vulncheck.com/xdb/25b052136658 , https://vulncheck.com/xdb/7b15adc7f2a9||https://vulncheck.com/xdb/7b15adc7f2a9 , https://vulncheck.com/xdb/ddb92a8e6f44||https://vulncheck.com/xdb/ddb92a8e6f44
CVE-2022-21587 Oracle E-Business Suite 02/02/2023 0.94393 9.8 https://viz.greynoise.io/tag/oracle-web-applications-integrator-rce-attempt||https://viz.greynoise.io/tag/oracle-web-applications-integrator-rce-attempt 2 TRUE TRUE FALSE https://www.oracle.com/security-alerts/cpuoct2022.html; https://nvd.nist.gov/vuln/detail/CVE-2022-21587 https://vulncheck.com/xdb/ae3226ff5bc2||https://vulncheck.com/xdb/ae3226ff5bc2 , https://vulncheck.com/xdb/e5086a4de697||https://vulncheck.com/xdb/e5086a4de697 , https://vulncheck.com/xdb/f0d1bff36115||https://vulncheck.com/xdb/f0d1bff36115 , https://vulncheck.com/xdb/59e3339ef54c||https://vulncheck.com/xdb/59e3339ef54c
CVE-2023-22952 SugarCRM Multiple Products 02/02/2023 0.93756 8.8 https://viz.greynoise.io/tag/sugarcrm-auth-bypass-rce-attempt||https://viz.greynoise.io/tag/sugarcrm-auth-bypass-rce-attempt 0 FALSE TRUE FALSE https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-001/; https://nvd.nist.gov/vuln/detail/CVE-2023-22952
CVE-2017-11357 Telerik User Interface (UI) for ASP.NET AJAX 01/26/2023 0.93419 9.8 TRUE TRUE FALSE https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/asyncupload-insecure-direct-object-reference; https://nvd.nist.gov/vuln/detail/CVE-2017-11357 https://vulncheck.com/xdb/ab7968edc0f3
CVE-2022-47966 Zoho ManageEngine 01/23/2023 0.94421 9.8 https://viz.greynoise.io/tag/zoho-manageengine-rce-cve-2022-47966-attempt||https://viz.greynoise.io/tag/zoho-manageengine-rce-cve-2022-47966-attempt 2 TRUE TRUE FALSE https://www.manageengine.com/security/advisory/CVE/cve-2022-47966.html; https://nvd.nist.gov/vuln/detail/CVE-2022-47966 https://vulncheck.com/xdb/c50d25ff81f2||https://vulncheck.com/xdb/c50d25ff81f2 , https://vulncheck.com/xdb/ef4910f82e02||https://vulncheck.com/xdb/ef4910f82e02 , https://vulncheck.com/xdb/ad16f2bea338||https://vulncheck.com/xdb/ad16f2bea338 , https://vulncheck.com/xdb/556d0f5a7136||https://vulncheck.com/xdb/556d0f5a7136
CVE-2022-44877 CWP Control Web Panel 01/17/2023 0.94434 9.8 https://viz.greynoise.io/tag/centos-web-panel-rce-cve-2022-44877-attempt||https://viz.greynoise.io/tag/centos-web-panel-rce-cve-2022-44877-attempt FALSE TRUE FALSE https://control-webpanel.com/changelog#1669855527714-450fb335-6194; https://nvd.nist.gov/vuln/detail/CVE-2022-44877 https://vulncheck.com/xdb/500e8a0e02e1||https://vulncheck.com/xdb/500e8a0e02e1 , https://vulncheck.com/xdb/8af08da7a934||https://vulncheck.com/xdb/8af08da7a934 , https://vulncheck.com/xdb/c7c9b96ed2ce||https://vulncheck.com/xdb/c7c9b96ed2ce , https://vulncheck.com/xdb/9bd08aaee5d4||https://vulncheck.com/xdb/9bd08aaee5d4 , https://vulncheck.com/xdb/d1a80792b675||https://vulncheck.com/xdb/d1a80792b675 , https://vulncheck.com/xdb/112b1d817777||https://vulncheck.com/xdb/112b1d817777 , https://vulncheck.com/xdb/4cbc25e487aa||https://vulncheck.com/xdb/4cbc25e487aa
CVE-2022-41080 Microsoft Exchange Server 01/10/2023 0.93743 8.8 https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt||https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41080; https://nvd.nist.gov/vuln/detail/CVE-2022-41080 https://vulncheck.com/xdb/3e1c1c7ad5b2||https://vulncheck.com/xdb/3e1c1c7ad5b2 , https://vulncheck.com/xdb/96274752561d||https://vulncheck.com/xdb/96274752561d
CVE-2023-21674 Microsoft Windows 01/10/2023 0.09979 8.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-21674; https://nvd.nist.gov/vuln/detail/CVE-2023-21674 https://vulncheck.com/xdb/5b660d198fe3
CVE-2018-5430 TIBCO JasperReports 12/29/2022 0.54599 7.7 https://viz.greynoise.io/tag/tibco-jasperreports-path-traversal-attempt||https://viz.greynoise.io/tag/tibco-jasperreports-path-traversal-attempt FALSE TRUE FALSE https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430;https://nvd.nist.gov/vuln/detail/CVE-2018-5430
CVE-2018-18809 TIBCO JasperReports 12/29/2022 0.94056 9.9 https://viz.greynoise.io/tag/tibco-jaspersoft-path-traversal-attempt||https://viz.greynoise.io/tag/tibco-jaspersoft-path-traversal-attempt FALSE FALSE FALSE https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809; https://nvd.nist.gov/vuln/detail/CVE-2018-18809
CVE-2022-42856 Apple iOS 12/14/2022 0.00157 8.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213516; https://nvd.nist.gov/vuln/detail/CVE-2022-42856
CVE-2022-26500 Veeam Backup & Replication 12/13/2022 0.20430 8.8 https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check||https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check TRUE FALSE FALSE https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26500
CVE-2022-44698 Microsoft Defender 12/13/2022 0.88727 5.4 TRUE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698; https://nvd.nist.gov/vuln/detail/CVE-2022-44698
CVE-2022-27518 Citrix Application Delivery Controller (ADC) and Gateway 12/13/2022 0.11238 9.8 FALSE FALSE FALSE https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/; https://nvd.nist.gov/vuln/detail/CVE-2022-27518
CVE-2022-42475 Fortinet FortiOS 12/13/2022 0.93196 9.8 https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-attempt||https://viz.greynoise.io/tag/fortios-ssl-vpn-rce-attempt TRUE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-22-398; https://nvd.nist.gov/vuln/detail/CVE-2022-42475 https://vulncheck.com/xdb/276c2d2f8553||https://vulncheck.com/xdb/276c2d2f8553 , https://vulncheck.com/xdb/cd08caecebf5||https://vulncheck.com/xdb/cd08caecebf5 , https://vulncheck.com/xdb/c058dffc5d81||https://vulncheck.com/xdb/c058dffc5d81 , https://vulncheck.com/xdb/bf45a56af2ba||https://vulncheck.com/xdb/bf45a56af2ba , https://vulncheck.com/xdb/d8adbeedff1b||https://vulncheck.com/xdb/d8adbeedff1b , https://vulncheck.com/xdb/c670713df10f||https://vulncheck.com/xdb/c670713df10f
CVE-2022-26501 Veeam Backup & Replication 12/13/2022 0.84659 9.8 https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check||https://viz.greynoise.io/tag/veeam-backup-and-replication-rce-check TRUE TRUE FALSE https://www.veeam.com/kb4288; https://nvd.nist.gov/vuln/detail/CVE-2022-26501 https://vulncheck.com/xdb/0e3a221258e9
CVE-2022-4262 Google Chromium V8 12/05/2022 0.04354 8.8 FALSE TRUE FALSE https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html; https://nvd.nist.gov/vuln/detail/CVE-2022-4262 https://vulncheck.com/xdb/b8e4029b5cec||https://vulncheck.com/xdb/b8e4029b5cec , https://vulncheck.com/xdb/0ab67251faee||https://vulncheck.com/xdb/0ab67251faee , https://vulncheck.com/xdb/39379e9096d7||https://vulncheck.com/xdb/39379e9096d7
CVE-2021-35587 Oracle Fusion Middleware 11/28/2022 0.94235 9.8 https://viz.greynoise.io/tag/oracle-access-manager-rce-attempt||https://viz.greynoise.io/tag/oracle-access-manager-rce-attempt , https://viz.greynoise.io/tag/oracle-access-manager-rce-check||https://viz.greynoise.io/tag/oracle-access-manager-rce-check 2 FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpujan2022.html; https://nvd.nist.gov/vuln/detail/CVE-2021-35587
CVE-2022-4135 Google Chromium GPU 11/28/2022 0.00132 9.6 FALSE FALSE FALSE https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html; https://nvd.nist.gov/vuln/detail/CVE-2022-4135
CVE-2022-41049 Microsoft Windows 11/14/2022 0.29966 5.4 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41049; https://nvd.nist.gov/vuln/detail/CVE-2022-41049
CVE-2021-25370 Samsung Mobile Devices 11/08/2022 0.00879 6.1 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370
CVE-2021-25337 Samsung Mobile Devices 11/08/2022 0.00349 4.4 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25337
CVE-2021-25369 Samsung Mobile Devices 11/08/2022 0.00214 6.2 FALSE FALSE FALSE https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25369
CVE-2022-41073 Microsoft Windows 11/08/2022 0.00699 7.8 TRUE FALSE FALSE https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41073; https://nvd.nist.gov/vuln/detail/CVE-2022-41073
CVE-2022-41125 Microsoft Windows 11/08/2022 0.00529 7.8 FALSE FALSE FALSE https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41125; https://nvd.nist.gov/vuln/detail/CVE-2022-41125
CVE-2022-41091 Microsoft Windows 11/08/2022 0.06229 5.4 TRUE FALSE FALSE https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41091; https://nvd.nist.gov/vuln/detail/CVE-2022-41091
CVE-2022-41128 Microsoft Windows 11/08/2022 0.75375 8.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41128; https://nvd.nist.gov/vuln/detail/CVE-2022-41128
CVE-2022-3723 Google Chromium V8 10/28/2022 0.00599 8.8 FALSE FALSE FALSE https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_27.html; https://nvd.nist.gov/vuln/detail/CVE-2022-3723
CVE-2022-42827 Apple iOS and iPadOS 10/25/2022 0.00381 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213489; https://nvd.nist.gov/vuln/detail/CVE-2022-42827
CVE-2020-3153 Cisco AnyConnect Secure 10/24/2022 0.43482 6.5 TRUE TRUE FALSE https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-win-path-traverse-qO4HWBsj; https://nvd.nist.gov/vuln/detail/CVE-2020-3153 https://vulncheck.com/xdb/6f8fc16d4a3f||https://vulncheck.com/xdb/6f8fc16d4a3f , https://vulncheck.com/xdb/beb12bd9f715||https://vulncheck.com/xdb/beb12bd9f715
CVE-2018-19321 GIGABYTE Multiple Products 10/24/2022 0.21036 7.8 TRUE TRUE FALSE https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19321 https://vulncheck.com/xdb/74650e8a4a65
CVE-2020-3433 Cisco AnyConnect Secure 10/24/2022 0.06347 7.8 TRUE TRUE FALSE https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-dll-F26WwJW; https://nvd.nist.gov/vuln/detail/CVE-2020-3433 https://vulncheck.com/xdb/ef8f0e3c268e
CVE-2018-19320 GIGABYTE Multiple Products 10/24/2022 0.18855 7.8 TRUE TRUE FALSE https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19320 https://vulncheck.com/xdb/9f7285db8cd7||https://vulncheck.com/xdb/9f7285db8cd7 , https://vulncheck.com/xdb/60a5b5fb8d11||https://vulncheck.com/xdb/60a5b5fb8d11 , https://vulncheck.com/xdb/30b1dd7f2714||https://vulncheck.com/xdb/30b1dd7f2714
CVE-2018-19323 GIGABYTE Multiple Products 10/24/2022 0.23126 9.8 TRUE FALSE FALSE https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19323
CVE-2018-19322 GIGABYTE Multiple Products 10/24/2022 0.03957 7.8 TRUE FALSE FALSE https://www.gigabyte.com/Support/Security/1801; https://nvd.nist.gov/vuln/detail/CVE-2018-19322
CVE-2022-41352 Synacor Zimbra Collaboration Suite (ZCS) 10/20/2022 0.79129 9.8 TRUE TRUE FALSE https://wiki.zimbra.com/wiki/Security_Center; https://nvd.nist.gov/vuln/detail/CVE-2022-41352 https://vulncheck.com/xdb/77c50ee3ab48||https://vulncheck.com/xdb/77c50ee3ab48 , https://vulncheck.com/xdb/c78c78269dc3||https://vulncheck.com/xdb/c78c78269dc3
CVE-2021-3493 Linux Kernel 10/20/2022 0.73876 8.8 FALSE TRUE FALSE https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7c03e2cda4a584cadc398e8f6641ca9988a39d52; https://nvd.nist.gov/vuln/detail/CVE-2021-3493 https://vulncheck.com/xdb/ed42677360ba||https://vulncheck.com/xdb/ed42677360ba , https://vulncheck.com/xdb/b1b3a8751d53||https://vulncheck.com/xdb/b1b3a8751d53 , https://vulncheck.com/xdb/8bc3c24df427||https://vulncheck.com/xdb/8bc3c24df427 , https://vulncheck.com/xdb/53855273d7f8||https://vulncheck.com/xdb/53855273d7f8 , https://vulncheck.com/xdb/bf6732e3daca||https://vulncheck.com/xdb/bf6732e3daca , https://vulncheck.com/xdb/f8390219793f||https://vulncheck.com/xdb/f8390219793f , https://vulncheck.com/xdb/44567c4bebd7||https://vulncheck.com/xdb/44567c4bebd7 , https://vulncheck.com/xdb/93af15d63cbb||https://vulncheck.com/xdb/93af15d63cbb , https://vulncheck.com/xdb/39754c7f28a6||https://vulncheck.com/xdb/39754c7f28a6 , https://vulncheck.com/xdb/9f1aa472b331||https://vulncheck.com/xdb/9f1aa472b331 , https://vulncheck.com/xdb/f90698fb4173||https://vulncheck.com/xdb/f90698fb4173 , https://vulncheck.com/xdb/260ad0a548b5||https://vulncheck.com/xdb/260ad0a548b5 , https://vulncheck.com/xdb/80b50ee28342||https://vulncheck.com/xdb/80b50ee28342 , https://vulncheck.com/xdb/2ab470a88220||https://vulncheck.com/xdb/2ab470a88220 , https://vulncheck.com/xdb/165ca931536b||https://vulncheck.com/xdb/165ca931536b , https://vulncheck.com/xdb/c90d13040f2a||https://vulncheck.com/xdb/c90d13040f2a , https://vulncheck.com/xdb/586ebe33df5f||https://vulncheck.com/xdb/586ebe33df5f , https://vulncheck.com/xdb/df20ad5b82e3||https://vulncheck.com/xdb/df20ad5b82e3 , https://vulncheck.com/xdb/76f421f52f8f||https://vulncheck.com/xdb/76f421f52f8f , https://vulncheck.com/xdb/f3abef618150||https://vulncheck.com/xdb/f3abef618150
CVE-2022-40684 Fortinet Multiple Products 10/11/2022 0.94427 9.8 https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt||https://viz.greynoise.io/tag/fortios-authentication-bypass-attempt 13 TRUE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-22-377; https://nvd.nist.gov/vuln/detail/CVE-2022-40684 https://vulncheck.com/xdb/0f732bdee343||https://vulncheck.com/xdb/0f732bdee343 , https://vulncheck.com/xdb/db8ccd288f72||https://vulncheck.com/xdb/db8ccd288f72 , https://vulncheck.com/xdb/b6787ce31611||https://vulncheck.com/xdb/b6787ce31611 , https://vulncheck.com/xdb/2e43eee43157||https://vulncheck.com/xdb/2e43eee43157 , https://vulncheck.com/xdb/dc9f6a9f6c27||https://vulncheck.com/xdb/dc9f6a9f6c27 , https://vulncheck.com/xdb/a36497ad5dd2||https://vulncheck.com/xdb/a36497ad5dd2 , https://vulncheck.com/xdb/6a6f9b30827f||https://vulncheck.com/xdb/6a6f9b30827f , https://vulncheck.com/xdb/76441680e6b1||https://vulncheck.com/xdb/76441680e6b1 , https://vulncheck.com/xdb/b30548fd63d6||https://vulncheck.com/xdb/b30548fd63d6 , https://vulncheck.com/xdb/1315787605ec||https://vulncheck.com/xdb/1315787605ec , https://vulncheck.com/xdb/0037fa291764||https://vulncheck.com/xdb/0037fa291764 , https://vulncheck.com/xdb/94e9ab177128||https://vulncheck.com/xdb/94e9ab177128 , https://vulncheck.com/xdb/a29d24addb6d||https://vulncheck.com/xdb/a29d24addb6d , https://vulncheck.com/xdb/b1bf53fd758d||https://vulncheck.com/xdb/b1bf53fd758d , https://vulncheck.com/xdb/e7be9b40e314||https://vulncheck.com/xdb/e7be9b40e314 , https://vulncheck.com/xdb/9f2799649c05||https://vulncheck.com/xdb/9f2799649c05 , https://vulncheck.com/xdb/687ac29ec096||https://vulncheck.com/xdb/687ac29ec096 , https://vulncheck.com/xdb/006745572ba2||https://vulncheck.com/xdb/006745572ba2 , https://vulncheck.com/xdb/38b52c3e8812||https://vulncheck.com/xdb/38b52c3e8812 , https://vulncheck.com/xdb/ae0c71764619||https://vulncheck.com/xdb/ae0c71764619 , https://vulncheck.com/xdb/37fe630b4cc1||https://vulncheck.com/xdb/37fe630b4cc1
CVE-2022-41033 Microsoft Windows COM+ Event System Service 10/11/2022 0.00234 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41033; https://nvd.nist.gov/vuln/detail/CVE-2022-41033
CVE-2022-36804 Atlassian Bitbucket Server and Data Center 09/30/2022 0.94429 8.8 https://viz.greynoise.io/tag/atlassian-bitbucket-server-rce-attempt||https://viz.greynoise.io/tag/atlassian-bitbucket-server-rce-attempt 0 FALSE TRUE FALSE https://jira.atlassian.com/browse/BSERV-13438; https://nvd.nist.gov/vuln/detail/CVE-2022-36804 https://vulncheck.com/xdb/9acca76e1447||https://vulncheck.com/xdb/9acca76e1447 , https://vulncheck.com/xdb/a3d1dc5fac30||https://vulncheck.com/xdb/a3d1dc5fac30 , https://vulncheck.com/xdb/78e356140b29||https://vulncheck.com/xdb/78e356140b29 , https://vulncheck.com/xdb/0b7d76c7611b||https://vulncheck.com/xdb/0b7d76c7611b , https://vulncheck.com/xdb/232d2df2698d||https://vulncheck.com/xdb/232d2df2698d , https://vulncheck.com/xdb/f437b6e9f563||https://vulncheck.com/xdb/f437b6e9f563 , https://vulncheck.com/xdb/6e85e1c51f7e||https://vulncheck.com/xdb/6e85e1c51f7e , https://vulncheck.com/xdb/af7d6ba3c236||https://vulncheck.com/xdb/af7d6ba3c236 , https://vulncheck.com/xdb/8a763ff2ccf9||https://vulncheck.com/xdb/8a763ff2ccf9 , https://vulncheck.com/xdb/9828f81b9d39||https://vulncheck.com/xdb/9828f81b9d39 , https://vulncheck.com/xdb/104d7f8f5541||https://vulncheck.com/xdb/104d7f8f5541 , https://vulncheck.com/xdb/e6120ad8c2fa||https://vulncheck.com/xdb/e6120ad8c2fa , https://vulncheck.com/xdb/0efacd5def82||https://vulncheck.com/xdb/0efacd5def82
CVE-2022-41082 Microsoft Exchange Server 09/30/2022 0.92453 8.0 https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt||https://viz.greynoise.io/tag/exchange-owassrf-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check 85 TRUE TRUE FALSE https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/; https://nvd.nist.gov/vuln/detail/CVE-2022-41082 https://vulncheck.com/xdb/fce0b6801443||https://vulncheck.com/xdb/fce0b6801443 , https://vulncheck.com/xdb/0ae82720da9d||https://vulncheck.com/xdb/0ae82720da9d , https://vulncheck.com/xdb/7774cccb028e||https://vulncheck.com/xdb/7774cccb028e , https://vulncheck.com/xdb/e9a822b336ed||https://vulncheck.com/xdb/e9a822b336ed , https://vulncheck.com/xdb/0b916230c113||https://vulncheck.com/xdb/0b916230c113 , https://vulncheck.com/xdb/e84e1c26f420||https://vulncheck.com/xdb/e84e1c26f420 , https://vulncheck.com/xdb/15f159f290df||https://vulncheck.com/xdb/15f159f290df , https://vulncheck.com/xdb/33385974e77d||https://vulncheck.com/xdb/33385974e77d , https://vulncheck.com/xdb/376b7c31c8cc||https://vulncheck.com/xdb/376b7c31c8cc
CVE-2022-41040 Microsoft Exchange Server 09/30/2022 0.94229 8.8 https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-attempt , https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxynotshell-vuln-check TRUE TRUE FALSE https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/; https://nvd.nist.gov/vuln/detail/CVE-2022-41040 https://vulncheck.com/xdb/565a6ab56ed1||https://vulncheck.com/xdb/565a6ab56ed1 , https://vulncheck.com/xdb/79d4403bdb61||https://vulncheck.com/xdb/79d4403bdb61 , https://vulncheck.com/xdb/fa8fd853a94c||https://vulncheck.com/xdb/fa8fd853a94c , https://vulncheck.com/xdb/db559cb540cd||https://vulncheck.com/xdb/db559cb540cd , https://vulncheck.com/xdb/7a4e1c3bf38a||https://vulncheck.com/xdb/7a4e1c3bf38a , https://vulncheck.com/xdb/843adb0cff04||https://vulncheck.com/xdb/843adb0cff04 , https://vulncheck.com/xdb/ed9b509bae9a||https://vulncheck.com/xdb/ed9b509bae9a
CVE-2022-3236 Sophos Firewall 09/23/2022 0.92697 9.8 https://viz.greynoise.io/tag/sophos-firewall-rce-cve-2022-3236-attempt||https://viz.greynoise.io/tag/sophos-firewall-rce-cve-2022-3236-attempt FALSE FALSE FALSE https://www.sophos.com/en-us/security-advisories/sophos-sa-20220923-sfos-rce; https://nvd.nist.gov/vuln/detail/CVE-2022-3236
CVE-2022-35405 Zoho ManageEngine 09/22/2022 0.94412 9.8 https://viz.greynoise.io/tag/zoho-password-manager-pro-xml-rpc-rce-attempt||https://viz.greynoise.io/tag/zoho-password-manager-pro-xml-rpc-rce-attempt FALSE TRUE FALSE https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html; https://nvd.nist.gov/vuln/detail/CVE-2022-35405 https://vulncheck.com/xdb/b3c77689953e
CVE-2013-2094 Linux Kernel 09/15/2022 0.63396 8.4 FALSE TRUE FALSE https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8176cced706b5e5d15887584150764894e94e02f; https://nvd.nist.gov/vuln/detail/CVE-2013-2094 https://vulncheck.com/xdb/9dbfce6b00bc||https://vulncheck.com/xdb/9dbfce6b00bc , https://vulncheck.com/xdb/553d40d9c74c||https://vulncheck.com/xdb/553d40d9c74c , https://vulncheck.com/xdb/1b5a2f6d40ca||https://vulncheck.com/xdb/1b5a2f6d40ca
CVE-2013-2596 Linux Kernel 09/15/2022 0.00589 7.8 FALSE TRUE FALSE https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc9bbca8f650e5f738af8806317c0a041a48ae4a; https://nvd.nist.gov/vuln/detail/CVE-2013-2596 https://vulncheck.com/xdb/2cf915667038
CVE-2013-2597 Code Aurora ACDB Audio Driver 09/15/2022 0.04612 8.4 FALSE FALSE FALSE https://web.archive.org/web/20161226013354/https:/www.codeaurora.org/news/security-advisories/stack-based-buffer-overflow-acdb-audio-driver-cve-2013-2597; https://nvd.nist.gov/vuln/detail/CVE-2013-2597
CVE-2013-6282 Linux Kernel 09/15/2022 0.46916 8.8 FALSE TRUE FALSE https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04; https://nvd.nist.gov/vuln/detail/CVE-2013-6282 https://vulncheck.com/xdb/b71a08d20773||https://vulncheck.com/xdb/b71a08d20773 , https://vulncheck.com/xdb/8dbca12d6df7||https://vulncheck.com/xdb/8dbca12d6df7
CVE-2022-40139 Trend Micro Apex One and Apex One as a Service 09/15/2022 0.18386 7.2 FALSE FALSE FALSE https://success.trendmicro.com/dcx/s/solution/000291528?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2022-40139
CVE-2010-2568 Microsoft Windows 09/15/2022 0.93403 7.8 FALSE TRUE FALSE https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568
CVE-2022-32917 Apple iOS, iPadOS, and macOS 09/14/2022 0.00091 7.8 FALSE FALSE FALSE https://support.apple.com/en-us/HT213445, https://support.apple.com/en-us/HT213444; https://nvd.nist.gov/vuln/detail/CVE-2022-32917
CVE-2022-37969 Microsoft Windows 09/14/2022 0.04824 7.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37969; https://nvd.nist.gov/vuln/detail/CVE-2022-37969 https://vulncheck.com/xdb/fd0780f4f9c6
CVE-2022-27593 QNAP Photo Station 09/08/2022 0.93613 10.0 https://viz.greynoise.io/tag/qnap-cve-2022-27593-attempt||https://viz.greynoise.io/tag/qnap-cve-2022-27593-attempt 3 TRUE FALSE TRUE https://www.qnap.com/en/security-advisory/qsa-22-24; https://nvd.nist.gov/vuln/detail/CVE-2022-27593
CVE-2022-26258 D-Link DIR-820L 09/08/2022 0.89422 9.8 https://viz.greynoise.io/tag/dlink-820l-rce-attempt||https://viz.greynoise.io/tag/dlink-820l-rce-attempt FALSE FALSE FALSE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10295; https://nvd.nist.gov/vuln/detail/CVE-2022-26258
CVE-2018-2628 Oracle WebLogic Server 09/08/2022 0.94422 9.8 https://viz.greynoise.io/tag/oracle-weblogic-rce-cve-2018-2628-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-rce-cve-2018-2628-rce-attempt FALSE TRUE FALSE https://www.oracle.com/security-alerts/cpuapr2018.html; https://nvd.nist.gov/vuln/detail/CVE-2018-2628 https://vulncheck.com/xdb/efdf79b80de3||https://vulncheck.com/xdb/efdf79b80de3 , https://vulncheck.com/xdb/9bb8a4f5bcd7||https://vulncheck.com/xdb/9bb8a4f5bcd7 , https://vulncheck.com/xdb/9897ff7f2048||https://vulncheck.com/xdb/9897ff7f2048 , https://vulncheck.com/xdb/1502741aa6e5||https://vulncheck.com/xdb/1502741aa6e5 , https://vulncheck.com/xdb/b96cd5cb34d6||https://vulncheck.com/xdb/b96cd5cb34d6 , https://vulncheck.com/xdb/d6dc32e5b5af||https://vulncheck.com/xdb/d6dc32e5b5af , https://vulncheck.com/xdb/9568d7a3210d||https://vulncheck.com/xdb/9568d7a3210d , https://vulncheck.com/xdb/2d7c1b752013||https://vulncheck.com/xdb/2d7c1b752013 , https://vulncheck.com/xdb/b7a4c562d6cc||https://vulncheck.com/xdb/b7a4c562d6cc , https://vulncheck.com/xdb/7459b9092084||https://vulncheck.com/xdb/7459b9092084 , https://vulncheck.com/xdb/50c18de3d86a||https://vulncheck.com/xdb/50c18de3d86a , https://vulncheck.com/xdb/f5c1eb50cf55||https://vulncheck.com/xdb/f5c1eb50cf55 , https://vulncheck.com/xdb/eed7ace69d37||https://vulncheck.com/xdb/eed7ace69d37 , https://vulncheck.com/xdb/d5a92dce5856||https://vulncheck.com/xdb/d5a92dce5856 , https://vulncheck.com/xdb/c7bbf0a3a56c||https://vulncheck.com/xdb/c7bbf0a3a56c , https://vulncheck.com/xdb/a0a66287ef5b||https://vulncheck.com/xdb/a0a66287ef5b
CVE-2018-6530 D-Link Multiple Routers 09/08/2022 0.93760 9.8 https://viz.greynoise.io/tag/d-link-soap-cgi-cve-2018-6530-command-injection-attempt||https://viz.greynoise.io/tag/d-link-soap-cgi-cve-2018-6530-command-injection-attempt 3 TRUE FALSE TRUE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10105; https://nvd.nist.gov/vuln/detail/CVE-2018-6530
CVE-2022-28958 D-Link DIR-816L 09/08/2022 0.00967 9.8 https://viz.greynoise.io/tag/dlink-dir816-rce-attempt||https://viz.greynoise.io/tag/dlink-dir816-rce-attempt FALSE FALSE FALSE https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10300
CVE-2018-13374 Fortinet FortiOS and FortiADC 09/08/2022 0.02722 4.3 TRUE TRUE FALSE https://www.fortiguard.com/psirt/FG-IR-18-157; https://nvd.nist.gov/vuln/detail/CVE-2018-13374
CVE-2022-3075 Google Chromium Mojo 09/08/2022 0.01332 9.6 FALSE FALSE FALSE https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3075; https://nvd.nist.gov/vuln/detail/CVE-2022-3075
CVE-2018-7445 MikroTik RouterOS 09/08/2022 0.86030 9.8 https://viz.greynoise.io/tag/mikrotik-routeros-smb-buffer-overflow-attempt||https://viz.greynoise.io/tag/mikrotik-routeros-smb-buffer-overflow-attempt FALSE TRUE FALSE https://www.coresecurity.com/core-labs/advisories/mikrotik-routeros-smb-buffer-overflow#vendor_update, https://mikrotik.com/download; https://nvd.nist.gov/vuln/detail/CVE-2018-7445 https://vulncheck.com/xdb/a4ebb4cef4b7
CVE-2017-5521 NETGEAR Multiple Devices 09/08/2022 0.94171 8.1 https://viz.greynoise.io/tag/netgear-password-disclosure-attempt||https://viz.greynoise.io/tag/netgear-password-disclosure-attempt 1 FALSE TRUE TRUE https://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2017-5521
CVE-2011-4723 D-Link DIR-300 Router 09/08/2022 0.08706 5.7 FALSE FALSE FALSE https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723
CVE-2020-9934 Apple iOS, iPadOS, and macOS 09/08/2022 0.01965 5.5 FALSE TRUE FALSE https://support.apple.com/en-us/HT211288, https://support.apple.com/en-us/HT211289; https://nvd.nist.gov/vuln/detail/CVE-2020-9934
CVE-2011-1823 Android Android OS 09/08/2022 0.73728 7.8 FALSE FALSE FALSE https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823
CVE-2021-39226 Grafana Labs Grafana 08/25/2022 0.94350 9.8 1 FALSE FALSE FALSE https://grafana.com/blog/2021/10/05/grafana-7.5.11-and-8.1.6-released-with-critical-security-fix/; https://nvd.nist.gov/vuln/detail/CVE-2021-39226
CVE-2020-36193 PEAR Archive_Tar 08/25/2022 0.79342 7.5 TRUE FALSE FALSE https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193; https://nvd.nist.gov/vuln/detail/CVE-2020-36193
CVE-2022-26352 dotCMS dotCMS 08/25/2022 0.94264 9.8 https://viz.greynoise.io/tag/dotcms-file-upload-attempt||https://viz.greynoise.io/tag/dotcms-file-upload-attempt 2 TRUE TRUE FALSE https://www.dotcms.com/security/SI-62; https://nvd.nist.gov/vuln/detail/CVE-2022-26352
CVE-2022-22963 VMware Tanzu Spring Cloud 08/25/2022 0.94474 9.8 https://viz.greynoise.io/tag/spring-cloud-function-spel-rce-attempt||https://viz.greynoise.io/tag/spring-cloud-function-spel-rce-attempt 0 FALSE TRUE FALSE https://tanzu.vmware.com/security/cve-2022-22963; https://nvd.nist.gov/vuln/detail/CVE-2022-22963 https://vulncheck.com/xdb/e735e076c22d||https://vulncheck.com/xdb/e735e076c22d , https://vulncheck.com/xdb/1066ae419f9b||https://vulncheck.com/xdb/1066ae419f9b , https://vulncheck.com/xdb/28f51035796b||https://vulncheck.com/xdb/28f51035796b , https://vulncheck.com/xdb/c00844238ab5||https://vulncheck.com/xdb/c00844238ab5 , https://vulncheck.com/xdb/8182bb40e66a||https://vulncheck.com/xdb/8182bb40e66a , https://vulncheck.com/xdb/698c9d96f1d6||https://vulncheck.com/xdb/698c9d96f1d6 , https://vulncheck.com/xdb/25acfb6faf58||https://vulncheck.com/xdb/25acfb6faf58 , https://vulncheck.com/xdb/e2c12294de2e||https://vulncheck.com/xdb/e2c12294de2e , https://vulncheck.com/xdb/6857dd5dc99e||https://vulncheck.com/xdb/6857dd5dc99e , https://vulncheck.com/xdb/a1c6ea2e02bc||https://vulncheck.com/xdb/a1c6ea2e02bc , https://vulncheck.com/xdb/5922af7bf5b9||https://vulncheck.com/xdb/5922af7bf5b9 , https://vulncheck.com/xdb/b67b2f1cc825||https://vulncheck.com/xdb/b67b2f1cc825 , https://vulncheck.com/xdb/365b57443ae6||https://vulncheck.com/xdb/365b57443ae6 , https://vulncheck.com/xdb/28fa125e7119||https://vulncheck.com/xdb/28fa125e7119 , https://vulncheck.com/xdb/8fdc0fdf513e||https://vulncheck.com/xdb/8fdc0fdf513e , https://vulncheck.com/xdb/b3ed0886366b||https://vulncheck.com/xdb/b3ed0886366b
CVE-2022-24706 Apache CouchDB 08/25/2022 0.94412 9.8 https://viz.greynoise.io/tag/apache-couchdb-rce-cve-2022-24706-attempt||https://viz.greynoise.io/tag/apache-couchdb-rce-cve-2022-24706-attempt FALSE TRUE FALSE https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00; https://nvd.nist.gov/vuln/detail/CVE-2022-24706 https://vulncheck.com/xdb/3302ea7b22f5||https://vulncheck.com/xdb/3302ea7b22f5 , https://vulncheck.com/xdb/b9f980c9e9d9||https://vulncheck.com/xdb/b9f980c9e9d9 , https://vulncheck.com/xdb/b8f0f62ec11e||https://vulncheck.com/xdb/b8f0f62ec11e , https://vulncheck.com/xdb/6df53e02aaab||https://vulncheck.com/xdb/6df53e02aaab
CVE-2021-38406 Delta Electronics DOPSoft 2 08/25/2022 0.82169 7.8 FALSE FALSE FALSE https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-02; https://nvd.nist.gov/vuln/detail/CVE-2021-38406
CVE-2022-24112 Apache APISIX 08/25/2022 0.94340 9.8 https://viz.greynoise.io/tag/apache-apisix-rce-attempt||https://viz.greynoise.io/tag/apache-apisix-rce-attempt 2 FALSE TRUE FALSE https://lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94; https://nvd.nist.gov/vuln/detail/CVE-2022-24112 https://vulncheck.com/xdb/6d3274e69e7d||https://vulncheck.com/xdb/6d3274e69e7d , https://vulncheck.com/xdb/567acb29cab1||https://vulncheck.com/xdb/567acb29cab1 , https://vulncheck.com/xdb/697e6089d0d1||https://vulncheck.com/xdb/697e6089d0d1 , https://vulncheck.com/xdb/7d43df93b6e3||https://vulncheck.com/xdb/7d43df93b6e3 , https://vulncheck.com/xdb/36b87ae59b55||https://vulncheck.com/xdb/36b87ae59b55
CVE-2022-2294 WebRTC WebRTC 08/25/2022 0.02203 8.8 TRUE FALSE FALSE https://groups.google.com/g/discuss-webrtc/c/5KBtZx2gvcQ; https://nvd.nist.gov/vuln/detail/CVE-2022-2294
CVE-2020-28949 PEAR Archive_Tar 08/25/2022 0.93057 7.8 TRUE TRUE FALSE https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949; https://nvd.nist.gov/vuln/detail/CVE-2020-28949 https://vulncheck.com/xdb/b36055977e47
CVE-2021-31010 Apple iOS, macOS, watchOS 08/25/2022 0.01359 7.5 FALSE FALSE FALSE https://support.apple.com/en-us/HT212804, https://support.apple.com/en-us/HT212805, https://support.apple.com/en-us/HT212806, https://support.apple.com/en-us/HT212807, https://support.apple.com/en-us/HT212824; https://nvd.nist.gov/vuln/detail/CVE-2021-31010
CVE-2022-0028 Palo Alto Networks PAN-OS 08/22/2022 0.05447 8.6 FALSE FALSE FALSE https://security.paloaltonetworks.com/CVE-2022-0028; https://nvd.nist.gov/vuln/detail/CVE-2022-0028
CVE-2022-32894 Apple iOS and macOS 08/18/2022 0.00338 7.8 FALSE FALSE FALSE https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32894
CVE-2022-32893 Apple iOS and macOS 08/18/2022 0.00145 8.8 FALSE FALSE FALSE https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32893
CVE-2022-22536 SAP Multiple Products 08/18/2022 0.93898 10.0 https://viz.greynoise.io/tag/http-request-smuggling-attempt||https://viz.greynoise.io/tag/http-request-smuggling-attempt 1 FALSE TRUE FALSE SAP users must have an account in order to login and access the patch. https://accounts.sap.com/saml2/idp/sso; https://nvd.nist.gov/vuln/detail/CVE-2022-22536 https://vulncheck.com/xdb/9187843a104d
CVE-2022-26923 Microsoft Active Directory 08/18/2022 0.91618 8.8 TRUE TRUE FALSE https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923; https://nvd.nist.gov/vuln/detail/CVE-2022-26923 https://vulncheck.com/xdb/4b73e57e2b6c||https://vulncheck.com/xdb/4b73e57e2b6c , https://vulncheck.com/xdb/41c7f4689ee0||https://vulncheck.com/xdb/41c7f4689ee0 , https://vulncheck.com/xdb/f701cb67018d||https://vulncheck.com/xdb/f701cb67018d
CVE-2022-21971 Microsoft Windows 08/18/2022 0.83939 7.8 FALSE TRUE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971; https://nvd.nist.gov/vuln/detail/CVE-2022-21971 https://vulncheck.com/xdb/39981df7046c
CVE-2017-15944 Palo Alto Networks PAN-OS 08/18/2022 0.94017 9.8 https://viz.greynoise.io/tag/palo-alto-panos-rce-check||https://viz.greynoise.io/tag/palo-alto-panos-rce-check 3 FALSE TRUE FALSE https://security.paloaltonetworks.com/CVE-2017-15944; https://nvd.nist.gov/vuln/detail/CVE-2017-15944 https://vulncheck.com/xdb/1ae6d431ce23||https://vulncheck.com/xdb/1ae6d431ce23 , https://vulncheck.com/xdb/6fa4d071811c||https://vulncheck.com/xdb/6fa4d071811c , https://vulncheck.com/xdb/bcdd700f4481||https://vulncheck.com/xdb/bcdd700f4481 , https://vulncheck.com/xdb/9868b0da7a73||https://vulncheck.com/xdb/9868b0da7a73
CVE-2022-2856 Google Chromium Intents 08/18/2022 0.03079 6.5 FALSE FALSE FALSE https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2022-2856
CVE-2022-27925 Synacor Zimbra Collaboration Suite (ZCS) 08/11/2022 0.94306 7.2 https://viz.greynoise.io/tag/zimbra-collaboration-suite-rce-cve-2022-27925-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-rce-cve-2022-27925-attempt TRUE TRUE FALSE https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-27925 https://vulncheck.com/xdb/d5a6e23307f7||https://vulncheck.com/xdb/d5a6e23307f7 , https://vulncheck.com/xdb/3e7ba25d24e0||https://vulncheck.com/xdb/3e7ba25d24e0 , https://vulncheck.com/xdb/7027aa1cb914||https://vulncheck.com/xdb/7027aa1cb914 , https://vulncheck.com/xdb/a30f3f76e904||https://vulncheck.com/xdb/a30f3f76e904 , https://vulncheck.com/xdb/c3794744db87||https://vulncheck.com/xdb/c3794744db87 , https://vulncheck.com/xdb/ef0204263380||https://vulncheck.com/xdb/ef0204263380 , https://vulncheck.com/xdb/941aad11c8ff||https://vulncheck.com/xdb/941aad11c8ff , https://vulncheck.com/xdb/cf4b91e0fcf4||https://vulncheck.com/xdb/cf4b91e0fcf4 , https://vulncheck.com/xdb/462a8414f903||https://vulncheck.com/xdb/462a8414f903
CVE-2022-37042 Synacor Zimbra Collaboration Suite (ZCS) 08/11/2022 0.94274 9.8 https://viz.greynoise.io/tag/zimbra-collaboration-suite-auth-bypass-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-auth-bypass-attempt 11 TRUE TRUE FALSE https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-37042 https://vulncheck.com/xdb/34da7c0acbe5||https://vulncheck.com/xdb/34da7c0acbe5 , https://vulncheck.com/xdb/8a7f6b96da60||https://vulncheck.com/xdb/8a7f6b96da60
CVE-2022-34713 Microsoft Windows 08/09/2022 0.08936 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713; https://nvd.nist.gov/vuln/detail/CVE-2022-34713
CVE-2022-30333 RARLAB UnRAR 08/09/2022 0.90964 7.5 TRUE TRUE FALSE Vulnerability updated with version 6.12. Accessing link will download update information: https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz; https://nvd.nist.gov/vuln/detail/CVE-2022-30333 https://vulncheck.com/xdb/2cf5d07b7a85||https://vulncheck.com/xdb/2cf5d07b7a85 , https://vulncheck.com/xdb/470dc3493197||https://vulncheck.com/xdb/470dc3493197
CVE-2022-27924 Synacor Zimbra Collaboration Suite (ZCS) 08/04/2022 0.64074 7.5 TRUE FALSE FALSE https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24.1#Security_Fixes; https://nvd.nist.gov/vuln/detail/CVE-2022-27924
CVE-2022-26138 Atlassian Confluence 07/29/2022 0.94258 9.8 https://viz.greynoise.io/tag/atlassian-questions-for-confluence-hardcoded-password-attempt||https://viz.greynoise.io/tag/atlassian-questions-for-confluence-hardcoded-password-attempt 3 TRUE TRUE FALSE https://confluence.atlassian.com/doc/questions-for-confluence-security-advisory-2022-07-20-1142446709.html; https://nvd.nist.gov/vuln/detail/CVE-2022-26138 https://vulncheck.com/xdb/873623f6c96a||https://vulncheck.com/xdb/873623f6c96a , https://vulncheck.com/xdb/ab074460fbb8||https://vulncheck.com/xdb/ab074460fbb8
CVE-2022-22047 Microsoft Windows 07/12/2022 0.00751 7.8 FALSE FALSE FALSE https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047; https://nvd.nist.gov/vuln/detail/CVE-2022-22047
CVE-2022-26925 Microsoft Windows 07/01/2022 0.35265 8.1 TRUE FALSE FALSE WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.; https://nvd.nist.gov/vuln/detail/CVE-2022-26925
CVE-2021-30983 Apple iOS and iPadOS 06/27/2022 0.00603 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30983
CVE-2021-4034 Red Hat Polkit 06/27/2022 0.88711 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-4034 https://vulncheck.com/xdb/0822b980ab59||https://vulncheck.com/xdb/0822b980ab59 , https://vulncheck.com/xdb/82d76074ec2c||https://vulncheck.com/xdb/82d76074ec2c , https://vulncheck.com/xdb/ca1dec61675d||https://vulncheck.com/xdb/ca1dec61675d , https://vulncheck.com/xdb/dcb8ccccb4a4||https://vulncheck.com/xdb/dcb8ccccb4a4 , https://vulncheck.com/xdb/6ccd3614a0e6||https://vulncheck.com/xdb/6ccd3614a0e6 , https://vulncheck.com/xdb/0a57ebc4b646||https://vulncheck.com/xdb/0a57ebc4b646 , https://vulncheck.com/xdb/7a12f449c111||https://vulncheck.com/xdb/7a12f449c111 , https://vulncheck.com/xdb/28f7b014212a||https://vulncheck.com/xdb/28f7b014212a , https://vulncheck.com/xdb/554bad753eda||https://vulncheck.com/xdb/554bad753eda , https://vulncheck.com/xdb/b7e4df92a4d4||https://vulncheck.com/xdb/b7e4df92a4d4 , https://vulncheck.com/xdb/c615a22c11b5||https://vulncheck.com/xdb/c615a22c11b5 , https://vulncheck.com/xdb/da8065962774||https://vulncheck.com/xdb/da8065962774 , https://vulncheck.com/xdb/4e869d74e438||https://vulncheck.com/xdb/4e869d74e438 , https://vulncheck.com/xdb/af2920365802||https://vulncheck.com/xdb/af2920365802 , https://vulncheck.com/xdb/8edd43972cea||https://vulncheck.com/xdb/8edd43972cea , https://vulncheck.com/xdb/ff2419e574a6||https://vulncheck.com/xdb/ff2419e574a6 , https://vulncheck.com/xdb/3d94e1e3d56f||https://vulncheck.com/xdb/3d94e1e3d56f , https://vulncheck.com/xdb/de924e14635b||https://vulncheck.com/xdb/de924e14635b , https://vulncheck.com/xdb/648c06dea4e8||https://vulncheck.com/xdb/648c06dea4e8 , https://vulncheck.com/xdb/8cbd93d3f54f||https://vulncheck.com/xdb/8cbd93d3f54f , https://vulncheck.com/xdb/a82a11bda873||https://vulncheck.com/xdb/a82a11bda873 , https://vulncheck.com/xdb/8be356a486c4||https://vulncheck.com/xdb/8be356a486c4 , https://vulncheck.com/xdb/96b10f9f9462||https://vulncheck.com/xdb/96b10f9f9462 , https://vulncheck.com/xdb/ee97190e81df||https://vulncheck.com/xdb/ee97190e81df , https://vulncheck.com/xdb/dbff6b3f68a2||https://vulncheck.com/xdb/dbff6b3f68a2 , https://vulncheck.com/xdb/f79d44984be7||https://vulncheck.com/xdb/f79d44984be7 , https://vulncheck.com/xdb/21e6735149ba||https://vulncheck.com/xdb/21e6735149ba , https://vulncheck.com/xdb/15d01c8fd429||https://vulncheck.com/xdb/15d01c8fd429 , https://vulncheck.com/xdb/48c06988841a||https://vulncheck.com/xdb/48c06988841a , https://vulncheck.com/xdb/3bfba57943e6||https://vulncheck.com/xdb/3bfba57943e6 , https://vulncheck.com/xdb/438507d272fa||https://vulncheck.com/xdb/438507d272fa , https://vulncheck.com/xdb/a3f4d60ee73d||https://vulncheck.com/xdb/a3f4d60ee73d , https://vulncheck.com/xdb/3b1f261f3baf||https://vulncheck.com/xdb/3b1f261f3baf , https://vulncheck.com/xdb/5dd88cd8c9e6||https://vulncheck.com/xdb/5dd88cd8c9e6 , https://vulncheck.com/xdb/443c740547a3||https://vulncheck.com/xdb/443c740547a3 , https://vulncheck.com/xdb/3fbc89827712||https://vulncheck.com/xdb/3fbc89827712 , https://vulncheck.com/xdb/39d787f93c25||https://vulncheck.com/xdb/39d787f93c25 , https://vulncheck.com/xdb/398590244678||https://vulncheck.com/xdb/398590244678 , https://vulncheck.com/xdb/8d29d67ad340||https://vulncheck.com/xdb/8d29d67ad340 , https://vulncheck.com/xdb/939114e4914e||https://vulncheck.com/xdb/939114e4914e , https://vulncheck.com/xdb/3e38d35f4014||https://vulncheck.com/xdb/3e38d35f4014 , https://vulncheck.com/xdb/2da3980b43c5||https://vulncheck.com/xdb/2da3980b43c5 , https://vulncheck.com/xdb/5c1b6088a2b9||https://vulncheck.com/xdb/5c1b6088a2b9 , https://vulncheck.com/xdb/f32860e93f99||https://vulncheck.com/xdb/f32860e93f99 , https://vulncheck.com/xdb/1f50a9f9474a||https://vulncheck.com/xdb/1f50a9f9474a , https://vulncheck.com/xdb/a7d202f88e7e||https://vulncheck.com/xdb/a7d202f88e7e , https://vulncheck.com/xdb/0d3ecb1c75fc||https://vulncheck.com/xdb/0d3ecb1c75fc , https://vulncheck.com/xdb/63b2573f076f||https://vulncheck.com/xdb/63b2573f076f , https://vulncheck.com/xdb/148e1dcef753||https://vulncheck.com/xdb/148e1dcef753 , https://vulncheck.com/xdb/7f47a9a77ae8||https://vulncheck.com/xdb/7f47a9a77ae8 , https://vulncheck.com/xdb/4e83675a9d9b||https://vulncheck.com/xdb/4e83675a9d9b , https://vulncheck.com/xdb/96b7b896707c||https://vulncheck.com/xdb/96b7b896707c , https://vulncheck.com/xdb/6bec8c0df126||https://vulncheck.com/xdb/6bec8c0df126 , https://vulncheck.com/xdb/56fa565d9f0d||https://vulncheck.com/xdb/56fa565d9f0d , https://vulncheck.com/xdb/48e01189be2f||https://vulncheck.com/xdb/48e01189be2f , https://vulncheck.com/xdb/fb7cc0ba1dd7||https://vulncheck.com/xdb/fb7cc0ba1dd7 , https://vulncheck.com/xdb/6458cc9b6c90||https://vulncheck.com/xdb/6458cc9b6c90 , https://vulncheck.com/xdb/50a7d45a3497||https://vulncheck.com/xdb/50a7d45a3497 , https://vulncheck.com/xdb/c8939ffa9f47||https://vulncheck.com/xdb/c8939ffa9f47 , https://vulncheck.com/xdb/0602fa69a56f||https://vulncheck.com/xdb/0602fa69a56f , https://vulncheck.com/xdb/3c5ab90e5a59||https://vulncheck.com/xdb/3c5ab90e5a59 , https://vulncheck.com/xdb/ff9f3019c482||https://vulncheck.com/xdb/ff9f3019c482 , https://vulncheck.com/xdb/f6773c8e8540||https://vulncheck.com/xdb/f6773c8e8540 , https://vulncheck.com/xdb/f3c18b402a6e||https://vulncheck.com/xdb/f3c18b402a6e , https://vulncheck.com/xdb/e60dc3425a52||https://vulncheck.com/xdb/e60dc3425a52 , https://vulncheck.com/xdb/f7eb79323eec||https://vulncheck.com/xdb/f7eb79323eec , https://vulncheck.com/xdb/fb1c03042f33||https://vulncheck.com/xdb/fb1c03042f33 , https://vulncheck.com/xdb/acfc56af30a1||https://vulncheck.com/xdb/acfc56af30a1 , https://vulncheck.com/xdb/17b6417968eb||https://vulncheck.com/xdb/17b6417968eb , https://vulncheck.com/xdb/f02cebe5dcc2||https://vulncheck.com/xdb/f02cebe5dcc2 , https://vulncheck.com/xdb/e22fe812e2c8||https://vulncheck.com/xdb/e22fe812e2c8 , https://vulncheck.com/xdb/7b392e48f101||https://vulncheck.com/xdb/7b392e48f101 , https://vulncheck.com/xdb/dc9c347e8516||https://vulncheck.com/xdb/dc9c347e8516 , https://vulncheck.com/xdb/4d2ae30ede35||https://vulncheck.com/xdb/4d2ae30ede35 , https://vulncheck.com/xdb/0b7b8bfadb64||https://vulncheck.com/xdb/0b7b8bfadb64 , https://vulncheck.com/xdb/a851d92d0b6f||https://vulncheck.com/xdb/a851d92d0b6f , https://vulncheck.com/xdb/1f98fd3754fa||https://vulncheck.com/xdb/1f98fd3754fa , https://vulncheck.com/xdb/e53709a1c012||https://vulncheck.com/xdb/e53709a1c012 , https://vulncheck.com/xdb/901cf6699765||https://vulncheck.com/xdb/901cf6699765 , https://vulncheck.com/xdb/5cef827064b0||https://vulncheck.com/xdb/5cef827064b0 , https://vulncheck.com/xdb/5770e6fe3bf8||https://vulncheck.com/xdb/5770e6fe3bf8 , https://vulncheck.com/xdb/2cf2be7ba166||https://vulncheck.com/xdb/2cf2be7ba166 , https://vulncheck.com/xdb/14dd45d27287||https://vulncheck.com/xdb/14dd45d27287 , https://vulncheck.com/xdb/03e0030161c2||https://vulncheck.com/xdb/03e0030161c2 , https://vulncheck.com/xdb/4f033f2ca1da||https://vulncheck.com/xdb/4f033f2ca1da , https://vulncheck.com/xdb/8e64384edb6f||https://vulncheck.com/xdb/8e64384edb6f , https://vulncheck.com/xdb/42cfe42e7d59||https://vulncheck.com/xdb/42cfe42e7d59 , https://vulncheck.com/xdb/8aa7e042d851||https://vulncheck.com/xdb/8aa7e042d851 , https://vulncheck.com/xdb/57f121c7d9ed||https://vulncheck.com/xdb/57f121c7d9ed , https://vulncheck.com/xdb/b56f14805318||https://vulncheck.com/xdb/b56f14805318 , https://vulncheck.com/xdb/1db24935e067||https://vulncheck.com/xdb/1db24935e067 , https://vulncheck.com/xdb/942f4234ebaf||https://vulncheck.com/xdb/942f4234ebaf , https://vulncheck.com/xdb/0dc62d3c155a||https://vulncheck.com/xdb/0dc62d3c155a , https://vulncheck.com/xdb/f591e47123fc||https://vulncheck.com/xdb/f591e47123fc , https://vulncheck.com/xdb/5a6b21dad53f||https://vulncheck.com/xdb/5a6b21dad53f , https://vulncheck.com/xdb/b006b2fe1bf8||https://vulncheck.com/xdb/b006b2fe1bf8 , https://vulncheck.com/xdb/ff0ef95d1a40||https://vulncheck.com/xdb/ff0ef95d1a40 , https://vulncheck.com/xdb/493568e38cd7||https://vulncheck.com/xdb/493568e38cd7 , https://vulncheck.com/xdb/c12e2f1e8b68||https://vulncheck.com/xdb/c12e2f1e8b68 , https://vulncheck.com/xdb/6b8d0b342171||https://vulncheck.com/xdb/6b8d0b342171 , https://vulncheck.com/xdb/6d5efc2b7ff9||https://vulncheck.com/xdb/6d5efc2b7ff9 , https://vulncheck.com/xdb/5e2e4073e0f1||https://vulncheck.com/xdb/5e2e4073e0f1 , https://vulncheck.com/xdb/881ce2b1d4e9||https://vulncheck.com/xdb/881ce2b1d4e9 , https://vulncheck.com/xdb/a6499a9f0ece||https://vulncheck.com/xdb/a6499a9f0ece , https://vulncheck.com/xdb/242a109de376||https://vulncheck.com/xdb/242a109de376 , https://vulncheck.com/xdb/c650576cc1dc||https://vulncheck.com/xdb/c650576cc1dc , https://vulncheck.com/xdb/fcffa308ff36||https://vulncheck.com/xdb/fcffa308ff36 , https://vulncheck.com/xdb/75e973a32ca0||https://vulncheck.com/xdb/75e973a32ca0 , https://vulncheck.com/xdb/2d3bdbe3b846||https://vulncheck.com/xdb/2d3bdbe3b846 , https://vulncheck.com/xdb/f7eb725d575d||https://vulncheck.com/xdb/f7eb725d575d , https://vulncheck.com/xdb/355c6f6064c4||https://vulncheck.com/xdb/355c6f6064c4 , https://vulncheck.com/xdb/9ba9a40cd868||https://vulncheck.com/xdb/9ba9a40cd868 , https://vulncheck.com/xdb/967303c3d942||https://vulncheck.com/xdb/967303c3d942 , https://vulncheck.com/xdb/e6b891d3c91f||https://vulncheck.com/xdb/e6b891d3c91f , https://vulncheck.com/xdb/0d8ebba65e94||https://vulncheck.com/xdb/0d8ebba65e94 , https://vulncheck.com/xdb/30fcd0d191a3||https://vulncheck.com/xdb/30fcd0d191a3 , https://vulncheck.com/xdb/2526c4e141f3||https://vulncheck.com/xdb/2526c4e141f3 , https://vulncheck.com/xdb/244786f0586a||https://vulncheck.com/xdb/244786f0586a , https://vulncheck.com/xdb/48147332ce2b||https://vulncheck.com/xdb/48147332ce2b , https://vulncheck.com/xdb/566964b48b0a||https://vulncheck.com/xdb/566964b48b0a , https://vulncheck.com/xdb/b80421acd99d||https://vulncheck.com/xdb/b80421acd99d , https://vulncheck.com/xdb/343ddc1361a9||https://vulncheck.com/xdb/343ddc1361a9 , https://vulncheck.com/xdb/f0523fed79c3||https://vulncheck.com/xdb/f0523fed79c3 , https://vulncheck.com/xdb/d7f5349cf878||https://vulncheck.com/xdb/d7f5349cf878 , https://vulncheck.com/xdb/bdac5d88146f||https://vulncheck.com/xdb/bdac5d88146f , https://vulncheck.com/xdb/344207902686||https://vulncheck.com/xdb/344207902686 , https://vulncheck.com/xdb/cef0cb4ead97||https://vulncheck.com/xdb/cef0cb4ead97 , https://vulncheck.com/xdb/91cfa39a3866||https://vulncheck.com/xdb/91cfa39a3866 , https://vulncheck.com/xdb/722d83b48dd0||https://vulncheck.com/xdb/722d83b48dd0 , https://vulncheck.com/xdb/aeecf13a2fe2||https://vulncheck.com/xdb/aeecf13a2fe2 , https://vulncheck.com/xdb/f81ade7ce959||https://vulncheck.com/xdb/f81ade7ce959 , https://vulncheck.com/xdb/fc91e648cdb7||https://vulncheck.com/xdb/fc91e648cdb7 , https://vulncheck.com/xdb/df5b9312957b||https://vulncheck.com/xdb/df5b9312957b , https://vulncheck.com/xdb/b46d72a94313||https://vulncheck.com/xdb/b46d72a94313 , https://vulncheck.com/xdb/2355bc59a8b4||https://vulncheck.com/xdb/2355bc59a8b4 , https://vulncheck.com/xdb/2fbfcd89b625||https://vulncheck.com/xdb/2fbfcd89b625 , https://vulncheck.com/xdb/fe47fe6ea534||https://vulncheck.com/xdb/fe47fe6ea534 , https://vulncheck.com/xdb/306f7e9e244b||https://vulncheck.com/xdb/306f7e9e244b , https://vulncheck.com/xdb/5008ad912a6b||https://vulncheck.com/xdb/5008ad912a6b , https://vulncheck.com/xdb/5580126ba38c||https://vulncheck.com/xdb/5580126ba38c , https://vulncheck.com/xdb/273b1f8f417f||https://vulncheck.com/xdb/273b1f8f417f , https://vulncheck.com/xdb/5cbdc401e4c7||https://vulncheck.com/xdb/5cbdc401e4c7 , https://vulncheck.com/xdb/5cdf60043d8c||https://vulncheck.com/xdb/5cdf60043d8c
CVE-2020-9907 Apple Multiple Products 06/27/2022 0.01455 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-9907
CVE-2021-30533 Google Chromium PopupBlocker 06/27/2022 0.06193 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30533
CVE-2018-4344 Apple Multiple Products 06/27/2022 0.00462 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-4344
CVE-2020-3837 Apple Multiple Products 06/27/2022 0.08588 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3837
CVE-2022-29499 Mitel MiVoice Connect 06/27/2022 0.89829 9.8 https://viz.greynoise.io/tag/mitel-mivoice-connect-ssrf-cve-2022-29499-attempt||https://viz.greynoise.io/tag/mitel-mivoice-connect-ssrf-cve-2022-29499-attempt TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-29499
CVE-2019-8605 Apple Multiple Products 06/27/2022 0.09803 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-8605 https://vulncheck.com/xdb/e1003c53cc92||https://vulncheck.com/xdb/e1003c53cc92 , https://vulncheck.com/xdb/05dcb535155a||https://vulncheck.com/xdb/05dcb535155a
CVE-2022-30190 Microsoft Windows 06/14/2022 0.93429 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-30190 https://vulncheck.com/xdb/ce385fe1282f||https://vulncheck.com/xdb/ce385fe1282f , https://vulncheck.com/xdb/15bf7cdea333||https://vulncheck.com/xdb/15bf7cdea333 , https://vulncheck.com/xdb/4fa26719340c||https://vulncheck.com/xdb/4fa26719340c , https://vulncheck.com/xdb/e03a55c6cfd8||https://vulncheck.com/xdb/e03a55c6cfd8 , https://vulncheck.com/xdb/4fb550777afd||https://vulncheck.com/xdb/4fb550777afd , https://vulncheck.com/xdb/b4cb973319f6||https://vulncheck.com/xdb/b4cb973319f6 , https://vulncheck.com/xdb/c5f95b440666||https://vulncheck.com/xdb/c5f95b440666 , https://vulncheck.com/xdb/39be3db1c3a9||https://vulncheck.com/xdb/39be3db1c3a9 , https://vulncheck.com/xdb/c22411de313c||https://vulncheck.com/xdb/c22411de313c , https://vulncheck.com/xdb/23ec9e87f75c||https://vulncheck.com/xdb/23ec9e87f75c , https://vulncheck.com/xdb/cdbdee6a1fd2||https://vulncheck.com/xdb/cdbdee6a1fd2 , https://vulncheck.com/xdb/bc38656013e9||https://vulncheck.com/xdb/bc38656013e9 , https://vulncheck.com/xdb/1b8342efad20||https://vulncheck.com/xdb/1b8342efad20 , https://vulncheck.com/xdb/f09c047235a9||https://vulncheck.com/xdb/f09c047235a9 , https://vulncheck.com/xdb/ec804773a346||https://vulncheck.com/xdb/ec804773a346 , https://vulncheck.com/xdb/c00e3fafa938||https://vulncheck.com/xdb/c00e3fafa938 , https://vulncheck.com/xdb/f87cc7447ce1||https://vulncheck.com/xdb/f87cc7447ce1 , https://vulncheck.com/xdb/b388e145f6cf||https://vulncheck.com/xdb/b388e145f6cf , https://vulncheck.com/xdb/eb69721d55b4||https://vulncheck.com/xdb/eb69721d55b4 , https://vulncheck.com/xdb/9e20f124a34a||https://vulncheck.com/xdb/9e20f124a34a , https://vulncheck.com/xdb/70970cd2ac26||https://vulncheck.com/xdb/70970cd2ac26 , https://vulncheck.com/xdb/fd7c95a5f90f||https://vulncheck.com/xdb/fd7c95a5f90f , https://vulncheck.com/xdb/3aa02158ccc4||https://vulncheck.com/xdb/3aa02158ccc4 , https://vulncheck.com/xdb/030dab3ef947||https://vulncheck.com/xdb/030dab3ef947 , https://vulncheck.com/xdb/05001d61d2a9||https://vulncheck.com/xdb/05001d61d2a9
CVE-2016-2388 SAP NetWeaver 06/09/2022 0.58230 5.3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-2388 https://vulncheck.com/xdb/c34824a10b75
CVE-2016-2386 SAP NetWeaver 06/09/2022 0.43189 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-2386 https://vulncheck.com/xdb/a6e1ca13fa66||https://vulncheck.com/xdb/a6e1ca13fa66 , https://vulncheck.com/xdb/a1ec325bed83||https://vulncheck.com/xdb/a1ec325bed83
CVE-2021-38163 SAP NetWeaver 06/09/2022 0.88372 9.9 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38163 https://vulncheck.com/xdb/f849d74a8cfd||https://vulncheck.com/xdb/f849d74a8cfd , https://vulncheck.com/xdb/f2e5e933e053||https://vulncheck.com/xdb/f2e5e933e053
CVE-2018-17480 Google Chromium V8 06/08/2022 0.30285 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-17480
CVE-2017-5070 Google Chromium V8 06/08/2022 0.80300 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-5070
CVE-2008-0655 Adobe Acrobat and Reader 06/08/2022 0.71023 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2008-0655
CVE-2012-0754 Adobe Flash Player 06/08/2022 0.93101 8.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0754
CVE-2011-0609 Adobe Flash Player 06/08/2022 0.92675 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-0609
CVE-2018-6065 Google Chromium V8 06/08/2022 0.88889 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-6065 https://vulncheck.com/xdb/e7c218d4bb1a
CVE-2011-2462 Adobe Acrobat and Reader 06/08/2022 0.92550 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-2462
CVE-2016-1646 Google Chromium V8 06/08/2022 0.71874 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-1646
CVE-2019-7192 QNAP Photo Station 06/08/2022 0.94298 9.8 https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt 6 TRUE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2019-7192 https://vulncheck.com/xdb/aa44f54dfe37
CVE-2013-1331 Microsoft Office 06/08/2022 0.86622 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-1331
CVE-2012-0151 Microsoft Windows 06/08/2022 0.88523 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0151
CVE-2007-5659 Adobe Acrobat and Reader 06/08/2022 0.93247 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2007-5659
CVE-2019-7193 QNAP QTS 06/08/2022 0.58429 9.8 https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7193
CVE-2010-2883 Adobe Acrobat and Reader 06/08/2022 0.93216 7.3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-2883
CVE-2012-5054 Adobe Flash Player 06/08/2022 0.70117 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-5054
CVE-2009-4324 Adobe Acrobat and Reader 06/08/2022 0.93498 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-4324
CVE-2016-5198 Google Chromium V8 06/08/2022 0.74718 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-5198
CVE-2019-5825 Google Chromium V8 06/08/2022 0.77431 6.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-5825 https://vulncheck.com/xdb/0b54c4eee1ca
CVE-2009-3953 Adobe Acrobat and Reader 06/08/2022 0.90514 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-3953
CVE-2009-0557 Microsoft Office 06/08/2022 0.83015 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-0557
CVE-2006-2492 Microsoft Word 06/08/2022 0.74716 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2006-2492
CVE-2010-2572 Microsoft PowerPoint 06/08/2022 0.69871 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-2572
CVE-2009-1862 Adobe Acrobat and Reader, Flash Player 06/08/2022 0.57995 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-1862
CVE-2012-4969 Microsoft Internet Explorer 06/08/2022 0.93147 8.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-4969
CVE-2009-0563 Microsoft Office 06/08/2022 0.77797 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-0563
CVE-2012-0767 Adobe Flash Player 06/08/2022 0.16382 6.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0767
CVE-2012-1889 Microsoft XML Core Services 06/08/2022 0.92143 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1889 https://vulncheck.com/xdb/6d2b0550c86e
CVE-2017-6862 NETGEAR Multiple Devices 06/08/2022 0.58696 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6862
CVE-2019-7194 QNAP Photo Station 06/08/2022 0.89163 9.8 https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7194
CVE-2018-17463 Google Chromium V8 06/08/2022 0.91128 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-17463 https://vulncheck.com/xdb/d8e2ff9c09ba||https://vulncheck.com/xdb/d8e2ff9c09ba , https://vulncheck.com/xdb/0b8ebcbe653d||https://vulncheck.com/xdb/0b8ebcbe653d
CVE-2010-1297 Adobe Flash Player 06/08/2022 0.93679 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-1297
CVE-2022-31460 Owl Labs Meeting Owl Pro and Whiteboard Owl 06/08/2022 0.04810 7.4 FALSE FALSE FALSE
CVE-2019-7195 QNAP Photo Station 06/08/2022 0.89510 9.8 https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-check , https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt||https://viz.greynoise.io/tag/qnap-qts-and-photo-station-lfi-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7195
CVE-2018-4990 Adobe Acrobat and Reader 06/08/2022 0.60065 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-4990
CVE-2017-5030 Google Chromium V8 06/08/2022 0.67597 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-5030
CVE-2019-15271 Cisco RV Series Routers 06/08/2022 0.10945 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-15271
CVE-2022-26134 Atlassian Confluence Server/Data Center 06/02/2022 0.94426 9.8 https://viz.greynoise.io/tag/atlassian-confluence-server-cve-2022-26134-ognl-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-cve-2022-26134-ognl-injection-attempt 25 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26134 https://vulncheck.com/xdb/9fecf5c3535a||https://vulncheck.com/xdb/9fecf5c3535a , https://vulncheck.com/xdb/d8d2a4e09b27||https://vulncheck.com/xdb/d8d2a4e09b27 , https://vulncheck.com/xdb/3e4ac0104159||https://vulncheck.com/xdb/3e4ac0104159 , https://vulncheck.com/xdb/39e06de0be1f||https://vulncheck.com/xdb/39e06de0be1f , https://vulncheck.com/xdb/86443907f2d8||https://vulncheck.com/xdb/86443907f2d8 , https://vulncheck.com/xdb/c75d37232bc3||https://vulncheck.com/xdb/c75d37232bc3 , https://vulncheck.com/xdb/eb21e9bfe5eb||https://vulncheck.com/xdb/eb21e9bfe5eb , https://vulncheck.com/xdb/61805bb30396||https://vulncheck.com/xdb/61805bb30396 , https://vulncheck.com/xdb/6f9382355146||https://vulncheck.com/xdb/6f9382355146 , https://vulncheck.com/xdb/aa3c74a7faf0||https://vulncheck.com/xdb/aa3c74a7faf0 , https://vulncheck.com/xdb/addd382b1e54||https://vulncheck.com/xdb/addd382b1e54 , https://vulncheck.com/xdb/842a7b278086||https://vulncheck.com/xdb/842a7b278086 , https://vulncheck.com/xdb/6faa1c9d88f6||https://vulncheck.com/xdb/6faa1c9d88f6 , https://vulncheck.com/xdb/dc2f3c02f8d4||https://vulncheck.com/xdb/dc2f3c02f8d4 , https://vulncheck.com/xdb/d673882b1749||https://vulncheck.com/xdb/d673882b1749 , https://vulncheck.com/xdb/628331d44c34||https://vulncheck.com/xdb/628331d44c34 , https://vulncheck.com/xdb/4a62fb975d25||https://vulncheck.com/xdb/4a62fb975d25 , https://vulncheck.com/xdb/546df2d43760||https://vulncheck.com/xdb/546df2d43760 , https://vulncheck.com/xdb/84304f834234||https://vulncheck.com/xdb/84304f834234 , https://vulncheck.com/xdb/5b4caf96d2c6||https://vulncheck.com/xdb/5b4caf96d2c6 , https://vulncheck.com/xdb/648550535509||https://vulncheck.com/xdb/648550535509 , https://vulncheck.com/xdb/4dd293ad4c62||https://vulncheck.com/xdb/4dd293ad4c62 , https://vulncheck.com/xdb/33ae84bef451||https://vulncheck.com/xdb/33ae84bef451 , https://vulncheck.com/xdb/bf4a212e429b||https://vulncheck.com/xdb/bf4a212e429b , https://vulncheck.com/xdb/b0ddf8e8e190||https://vulncheck.com/xdb/b0ddf8e8e190 , https://vulncheck.com/xdb/14047453ba17||https://vulncheck.com/xdb/14047453ba17 , https://vulncheck.com/xdb/6e3b669985c0||https://vulncheck.com/xdb/6e3b669985c0 , https://vulncheck.com/xdb/68a67174cffb||https://vulncheck.com/xdb/68a67174cffb , https://vulncheck.com/xdb/ccf22111c515||https://vulncheck.com/xdb/ccf22111c515 , https://vulncheck.com/xdb/610e8ac40120||https://vulncheck.com/xdb/610e8ac40120 , https://vulncheck.com/xdb/e68dc3f67ff5||https://vulncheck.com/xdb/e68dc3f67ff5 , https://vulncheck.com/xdb/0e38e7f0c998||https://vulncheck.com/xdb/0e38e7f0c998 , https://vulncheck.com/xdb/b8975356b7ec||https://vulncheck.com/xdb/b8975356b7ec , https://vulncheck.com/xdb/556ef02d9595||https://vulncheck.com/xdb/556ef02d9595 , https://vulncheck.com/xdb/fe6b0b57fa24||https://vulncheck.com/xdb/fe6b0b57fa24 , https://vulncheck.com/xdb/36e25b480581||https://vulncheck.com/xdb/36e25b480581 , https://vulncheck.com/xdb/afb357664032||https://vulncheck.com/xdb/afb357664032 , https://vulncheck.com/xdb/66716e60c64a||https://vulncheck.com/xdb/66716e60c64a , https://vulncheck.com/xdb/6e612cea3dda||https://vulncheck.com/xdb/6e612cea3dda
CVE-2015-2360 Microsoft Win32k 05/25/2022 0.05865 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2360
CVE-2013-3993 IBM InfoSphere BigInsights 05/25/2022 0.13220 6.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3993
CVE-2015-4495 Mozilla Firefox 05/25/2022 0.75940 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-4495
CVE-2014-4148 Microsoft Windows 05/25/2022 0.29976 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4148
CVE-2015-0016 Microsoft Windows 05/25/2022 0.91858 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0016
CVE-2014-0546 Adobe Acrobat and Reader 05/25/2022 0.16664 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0546
CVE-2013-0422 Oracle Java Runtime Environment (JRE) 05/25/2022 0.93647 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0422
CVE-2013-2423 Oracle Java Runtime Environment (JRE) 05/25/2022 0.93539 3.7 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-2423
CVE-2010-1428 Red Hat JBoss 05/25/2022 0.64971 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-1428
CVE-2014-3153 Linux Kernel 05/25/2022 0.82357 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-3153 https://vulncheck.com/xdb/d3ba259b964e||https://vulncheck.com/xdb/d3ba259b964e , https://vulncheck.com/xdb/476b6caadabb||https://vulncheck.com/xdb/476b6caadabb , https://vulncheck.com/xdb/6457f28f2fe3||https://vulncheck.com/xdb/6457f28f2fe3 , https://vulncheck.com/xdb/406d42ee9247||https://vulncheck.com/xdb/406d42ee9247 , https://vulncheck.com/xdb/5a9f900eacd4||https://vulncheck.com/xdb/5a9f900eacd4 , https://vulncheck.com/xdb/c58b69fea619||https://vulncheck.com/xdb/c58b69fea619
CVE-2015-1769 Microsoft Windows 05/25/2022 0.10775 6.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1769
CVE-2016-3393 Microsoft Windows 05/25/2022 0.29859 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3393
CVE-2014-2817 Microsoft Internet Explorer 05/25/2022 0.19808 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-2817
CVE-2016-1010 Adobe Flash Player and AIR 05/25/2022 0.28792 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-1010
CVE-2015-0071 Microsoft Internet Explorer 05/25/2022 0.35046 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0071
CVE-2019-3010 Oracle Solaris 05/25/2022 0.35865 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-3010 https://vulncheck.com/xdb/1e5824c4ab7a
CVE-2015-6175 Microsoft Windows 05/25/2022 0.01742 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-6175
CVE-2013-3896 Microsoft Silverlight 05/25/2022 0.80331 5.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3896
CVE-2010-0840 Oracle Java Runtime Environment (JRE) 05/25/2022 0.92616 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-0840
CVE-2015-0310 Adobe Flash Player 05/25/2022 0.40551 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0310
CVE-2014-8439 Adobe Flash Player 05/25/2022 0.31479 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-8439
CVE-2013-7331 Microsoft Internet Explorer 05/25/2022 0.85642 6.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-7331
CVE-2014-4077 Microsoft Input Method Editor (IME) Japanese 05/25/2022 0.29560 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4077
CVE-2015-1671 Microsoft Windows 05/25/2022 0.74124 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1671
CVE-2015-2425 Microsoft Internet Explorer 05/25/2022 0.40446 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2425
CVE-2016-0034 Microsoft Silverlight 05/25/2022 0.43433 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0034
CVE-2015-8651 Adobe Flash Player 05/25/2022 0.89783 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-8651
CVE-2013-0074 Microsoft Silverlight 05/25/2022 0.93054 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0074
CVE-2014-4123 Microsoft Internet Explorer 05/25/2022 0.17914 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4123
CVE-2016-0984 Adobe Flash Player and AIR 05/25/2022 0.67641 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0984
CVE-2012-1710 Oracle Fusion Middleware 05/25/2022 0.74567 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1710
CVE-2013-0431 Oracle Java Runtime Environment (JRE) 05/25/2022 0.91587 5.3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0431
CVE-2010-0738 Red Hat JBoss 05/25/2022 0.92458 5.3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-0738
CVE-2016-7256 Microsoft Windows 05/25/2022 0.50761 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7256
CVE-2016-4656 Apple iOS 05/24/2022 0.69019 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4656
CVE-2016-4657 Apple iOS 05/24/2022 0.78192 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4657 https://vulncheck.com/xdb/e2f10ce0ea66||https://vulncheck.com/xdb/e2f10ce0ea66 , https://vulncheck.com/xdb/682e7cc60ee0||https://vulncheck.com/xdb/682e7cc60ee0 , https://vulncheck.com/xdb/86ce9e51f6fd||https://vulncheck.com/xdb/86ce9e51f6fd
CVE-2017-0149 Microsoft Internet Explorer 05/24/2022 0.29481 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0149
CVE-2017-0147 Microsoft SMBv1 server 05/24/2022 0.92418 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0147
CVE-2017-8543 Microsoft Windows 05/24/2022 0.75252 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8543
CVE-2016-6366 Cisco Adaptive Security Appliance (ASA) 05/24/2022 0.91801 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-6366 https://vulncheck.com/xdb/4d9d31fa7b9e||https://vulncheck.com/xdb/4d9d31fa7b9e , https://vulncheck.com/xdb/b78b17da0cfd||https://vulncheck.com/xdb/b78b17da0cfd
CVE-2016-4655 Apple iOS 05/24/2022 0.82450 5.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4655 https://vulncheck.com/xdb/7f6e9c5ac8a8
CVE-2017-0005 Microsoft Windows 05/24/2022 0.10057 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0005 https://vulncheck.com/xdb/0894a2e08694
CVE-2018-19949 QNAP Network Attached Storage (NAS) 05/24/2022 0.57621 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-19949
CVE-2017-0022 Microsoft XML Core Services 05/24/2022 0.48804 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0022
CVE-2017-18362 Kaseya Virtual System/Server Administrator (VSA) 05/24/2022 0.46205 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-18362
CVE-2016-3351 Microsoft Internet Explorer and Edge 05/24/2022 0.59448 6.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3351
CVE-2018-19943 QNAP Network Attached Storage (NAS) 05/24/2022 0.10255 8.0 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-19943
CVE-2016-0162 Microsoft Internet Explorer 05/24/2022 0.19010 4.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0162
CVE-2017-0210 Microsoft Internet Explorer 05/24/2022 0.22615 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0210
CVE-2017-8291 Artifex Ghostscript 05/24/2022 0.92675 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8291 https://vulncheck.com/xdb/f15ef2684963||https://vulncheck.com/xdb/f15ef2684963 , https://vulncheck.com/xdb/094166e5b7b5||https://vulncheck.com/xdb/094166e5b7b5 , https://vulncheck.com/xdb/32af267712cb||https://vulncheck.com/xdb/32af267712cb
CVE-2016-6367 Cisco Adaptive Security Appliance (ASA) 05/24/2022 0.23087 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-6367
CVE-2018-19953 QNAP Network Attached Storage (NAS) 05/24/2022 0.40146 6.1 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-19953
CVE-2018-8611 Microsoft Windows 05/24/2022 0.06510 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8611 https://vulncheck.com/xdb/8342f589a1bd
CVE-2016-3298 Microsoft Internet Explorer 05/24/2022 0.27734 6.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3298
CVE-2019-18426 Meta Platforms WhatsApp 05/23/2022 0.57339 8.2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-18426
CVE-2021-30883 Apple Multiple Products 05/23/2022 0.00444 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30883 https://vulncheck.com/xdb/521ee8c9f2b3
CVE-2019-8720 WebKitGTK WebKitGTK 05/23/2022 0.08241 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-8720
CVE-2020-0638 Microsoft Update Notification Manager 05/23/2022 0.07187 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0638
CVE-2019-1130 Microsoft Windows 05/23/2022 0.04095 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1130
CVE-2018-8589 Microsoft Win32k 05/23/2022 0.05524 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8589
CVE-2019-11708 Mozilla Firefox and Thunderbird 05/23/2022 0.62964 10.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11708 https://vulncheck.com/xdb/5cf17684b0a0||https://vulncheck.com/xdb/5cf17684b0a0 , https://vulncheck.com/xdb/06ea94b0dfdc||https://vulncheck.com/xdb/06ea94b0dfdc , https://vulncheck.com/xdb/be2e1d3c8a14||https://vulncheck.com/xdb/be2e1d3c8a14
CVE-2021-0920 Android Kernel 05/23/2022 0.00510 6.4 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-0920
CVE-2019-5786 Google Chrome Blink 05/23/2022 0.90281 6.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-5786 https://vulncheck.com/xdb/b7d5385c6094||https://vulncheck.com/xdb/b7d5385c6094 , https://vulncheck.com/xdb/5d48649bb47a||https://vulncheck.com/xdb/5d48649bb47a , https://vulncheck.com/xdb/87f2d6f034f9||https://vulncheck.com/xdb/87f2d6f034f9
CVE-2019-7286 Apple Multiple Products 05/23/2022 0.01627 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7286
CVE-2019-0703 Microsoft Windows 05/23/2022 0.08842 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0703
CVE-2019-0880 Microsoft Windows 05/23/2022 0.01370 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0880
CVE-2019-11707 Mozilla Firefox and Thunderbird 05/23/2022 0.84214 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11707 https://vulncheck.com/xdb/f32e1037e391||https://vulncheck.com/xdb/f32e1037e391 , https://vulncheck.com/xdb/20099b4eda22||https://vulncheck.com/xdb/20099b4eda22
CVE-2020-1027 Microsoft Windows 05/23/2022 0.13396 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1027
CVE-2022-20821 Cisco IOS XR 05/23/2022 0.13178 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20821
CVE-2018-5002 Adobe Flash Player 05/23/2022 0.37375 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-5002
CVE-2019-7287 Apple iOS 05/23/2022 0.04076 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7287
CVE-2019-1385 Microsoft Windows 05/23/2022 0.00381 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1385
CVE-2021-1048 Android Kernel 05/23/2022 0.01486 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1048
CVE-2019-13720 Google Chrome WebAudio 05/23/2022 0.90359 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-13720 https://vulncheck.com/xdb/a67a66f67e9e
CVE-2019-0676 Microsoft Internet Explorer 05/23/2022 0.29573 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0676
CVE-2022-22947 VMware Spring Cloud Gateway 05/16/2022 0.94474 10.0 https://viz.greynoise.io/tag/spring-cloud-gateway-code-injection-attempt||https://viz.greynoise.io/tag/spring-cloud-gateway-code-injection-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22947 https://vulncheck.com/xdb/afa67d1ce366||https://vulncheck.com/xdb/afa67d1ce366 , https://vulncheck.com/xdb/e911b1c2597f||https://vulncheck.com/xdb/e911b1c2597f , https://vulncheck.com/xdb/6eeb91b260d2||https://vulncheck.com/xdb/6eeb91b260d2 , https://vulncheck.com/xdb/3e6c0320c020||https://vulncheck.com/xdb/3e6c0320c020 , https://vulncheck.com/xdb/7bc2856e5f63||https://vulncheck.com/xdb/7bc2856e5f63 , https://vulncheck.com/xdb/d03fdfb98036||https://vulncheck.com/xdb/d03fdfb98036 , https://vulncheck.com/xdb/497a7868a7f8||https://vulncheck.com/xdb/497a7868a7f8 , https://vulncheck.com/xdb/e709c7824d6f||https://vulncheck.com/xdb/e709c7824d6f , https://vulncheck.com/xdb/1c0791ff43d4||https://vulncheck.com/xdb/1c0791ff43d4 , https://vulncheck.com/xdb/32e3404666d2||https://vulncheck.com/xdb/32e3404666d2 , https://vulncheck.com/xdb/2665970cc7d0||https://vulncheck.com/xdb/2665970cc7d0 , https://vulncheck.com/xdb/ee5d2b5c3f92||https://vulncheck.com/xdb/ee5d2b5c3f92 , https://vulncheck.com/xdb/ef11176b296d||https://vulncheck.com/xdb/ef11176b296d , https://vulncheck.com/xdb/66245b597db0||https://vulncheck.com/xdb/66245b597db0 , https://vulncheck.com/xdb/bd2a06bbd8bb||https://vulncheck.com/xdb/bd2a06bbd8bb , https://vulncheck.com/xdb/a02abe0b70a0||https://vulncheck.com/xdb/a02abe0b70a0 , https://vulncheck.com/xdb/06a474d9b7ec||https://vulncheck.com/xdb/06a474d9b7ec , https://vulncheck.com/xdb/0751146bcae7||https://vulncheck.com/xdb/0751146bcae7 , https://vulncheck.com/xdb/0e346534d99c||https://vulncheck.com/xdb/0e346534d99c , https://vulncheck.com/xdb/e7ca8c762802||https://vulncheck.com/xdb/e7ca8c762802 , https://vulncheck.com/xdb/fd72b929a3ae||https://vulncheck.com/xdb/fd72b929a3ae , https://vulncheck.com/xdb/9344fae60775||https://vulncheck.com/xdb/9344fae60775 , https://vulncheck.com/xdb/769ad48809b9||https://vulncheck.com/xdb/769ad48809b9 , https://vulncheck.com/xdb/a48d3f6ecc63||https://vulncheck.com/xdb/a48d3f6ecc63
CVE-2022-30525 Zyxel Multiple Firewalls 05/16/2022 0.94445 9.8 https://viz.greynoise.io/tag/zyxel-fw-unauthenticated-remote-command-injection-attempt||https://viz.greynoise.io/tag/zyxel-fw-unauthenticated-remote-command-injection-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-30525 https://vulncheck.com/xdb/bb42ffd583c7||https://vulncheck.com/xdb/bb42ffd583c7 , https://vulncheck.com/xdb/fae80e0c7f01||https://vulncheck.com/xdb/fae80e0c7f01 , https://vulncheck.com/xdb/f52f29d8e852||https://vulncheck.com/xdb/f52f29d8e852 , https://vulncheck.com/xdb/e15afba00994||https://vulncheck.com/xdb/e15afba00994 , https://vulncheck.com/xdb/6355edd8b2d3||https://vulncheck.com/xdb/6355edd8b2d3
CVE-2022-1388 F5 BIG-IP 05/10/2022 0.94456 9.8 https://viz.greynoise.io/tag/f5-big-ip-icontrol-rest-authentication-bypass-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rest-authentication-bypass-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-1388 https://vulncheck.com/xdb/a338399b9740||https://vulncheck.com/xdb/a338399b9740 , https://vulncheck.com/xdb/7c3dfa418e9d||https://vulncheck.com/xdb/7c3dfa418e9d , https://vulncheck.com/xdb/e391ecaf162b||https://vulncheck.com/xdb/e391ecaf162b , https://vulncheck.com/xdb/4b67e5ac9d66||https://vulncheck.com/xdb/4b67e5ac9d66 , https://vulncheck.com/xdb/f8e5e3946332||https://vulncheck.com/xdb/f8e5e3946332 , https://vulncheck.com/xdb/c5dcb13ada50||https://vulncheck.com/xdb/c5dcb13ada50 , https://vulncheck.com/xdb/e8d37213acfb||https://vulncheck.com/xdb/e8d37213acfb , https://vulncheck.com/xdb/fed4ce564309||https://vulncheck.com/xdb/fed4ce564309 , https://vulncheck.com/xdb/86b7a33d25f4||https://vulncheck.com/xdb/86b7a33d25f4 , https://vulncheck.com/xdb/d47c793055aa||https://vulncheck.com/xdb/d47c793055aa , https://vulncheck.com/xdb/a0cd074f32a8||https://vulncheck.com/xdb/a0cd074f32a8 , https://vulncheck.com/xdb/39da6fb6bae8||https://vulncheck.com/xdb/39da6fb6bae8 , https://vulncheck.com/xdb/4f60c165a253||https://vulncheck.com/xdb/4f60c165a253 , https://vulncheck.com/xdb/bf15a5b1ddea||https://vulncheck.com/xdb/bf15a5b1ddea , https://vulncheck.com/xdb/eaac7855e8ba||https://vulncheck.com/xdb/eaac7855e8ba , https://vulncheck.com/xdb/c5bc057dd650||https://vulncheck.com/xdb/c5bc057dd650 , https://vulncheck.com/xdb/1beebdc63339||https://vulncheck.com/xdb/1beebdc63339 , https://vulncheck.com/xdb/6f0d150b9526||https://vulncheck.com/xdb/6f0d150b9526 , https://vulncheck.com/xdb/5a2182b56ffd||https://vulncheck.com/xdb/5a2182b56ffd , https://vulncheck.com/xdb/f174aa99be3a||https://vulncheck.com/xdb/f174aa99be3a , https://vulncheck.com/xdb/db69e56a1a55||https://vulncheck.com/xdb/db69e56a1a55 , https://vulncheck.com/xdb/4ecf220a775e||https://vulncheck.com/xdb/4ecf220a775e , https://vulncheck.com/xdb/92cfa936edec||https://vulncheck.com/xdb/92cfa936edec , https://vulncheck.com/xdb/284187c7cc92||https://vulncheck.com/xdb/284187c7cc92 , https://vulncheck.com/xdb/1e755f4e5a91||https://vulncheck.com/xdb/1e755f4e5a91 , https://vulncheck.com/xdb/4e0a09831520||https://vulncheck.com/xdb/4e0a09831520 , https://vulncheck.com/xdb/a2fba35605c7||https://vulncheck.com/xdb/a2fba35605c7 , https://vulncheck.com/xdb/02a73fcd6f5f||https://vulncheck.com/xdb/02a73fcd6f5f , https://vulncheck.com/xdb/596c32191ea1||https://vulncheck.com/xdb/596c32191ea1 , https://vulncheck.com/xdb/bd11226cd569||https://vulncheck.com/xdb/bd11226cd569 , https://vulncheck.com/xdb/2a3d27be8a50||https://vulncheck.com/xdb/2a3d27be8a50 , https://vulncheck.com/xdb/91f823cf5ee3||https://vulncheck.com/xdb/91f823cf5ee3 , https://vulncheck.com/xdb/7819f0e28fc2||https://vulncheck.com/xdb/7819f0e28fc2 , https://vulncheck.com/xdb/55c8c0c71985||https://vulncheck.com/xdb/55c8c0c71985 , https://vulncheck.com/xdb/9574cfe06a5c||https://vulncheck.com/xdb/9574cfe06a5c , https://vulncheck.com/xdb/19a91efb19cb||https://vulncheck.com/xdb/19a91efb19cb , https://vulncheck.com/xdb/089a0ce1c93a||https://vulncheck.com/xdb/089a0ce1c93a , https://vulncheck.com/xdb/c18be49db148||https://vulncheck.com/xdb/c18be49db148 , https://vulncheck.com/xdb/b187533ab332||https://vulncheck.com/xdb/b187533ab332 , https://vulncheck.com/xdb/49c26aab032e||https://vulncheck.com/xdb/49c26aab032e , https://vulncheck.com/xdb/8bb60772cff1||https://vulncheck.com/xdb/8bb60772cff1 , https://vulncheck.com/xdb/f0d43db5ffcb||https://vulncheck.com/xdb/f0d43db5ffcb , https://vulncheck.com/xdb/b3ba3d9e25bb||https://vulncheck.com/xdb/b3ba3d9e25bb , https://vulncheck.com/xdb/de351a9eaa73||https://vulncheck.com/xdb/de351a9eaa73 , https://vulncheck.com/xdb/fe095bfcae0a||https://vulncheck.com/xdb/fe095bfcae0a , https://vulncheck.com/xdb/dfd966532bd4||https://vulncheck.com/xdb/dfd966532bd4 , https://vulncheck.com/xdb/792f8d436653||https://vulncheck.com/xdb/792f8d436653 , https://vulncheck.com/xdb/3fe86ad28ffe||https://vulncheck.com/xdb/3fe86ad28ffe , https://vulncheck.com/xdb/502567296299||https://vulncheck.com/xdb/502567296299 , https://vulncheck.com/xdb/d2f6260efc0f||https://vulncheck.com/xdb/d2f6260efc0f , https://vulncheck.com/xdb/1374857fc440||https://vulncheck.com/xdb/1374857fc440 , https://vulncheck.com/xdb/da0ee1760a50||https://vulncheck.com/xdb/da0ee1760a50 , https://vulncheck.com/xdb/d8d92a442a79||https://vulncheck.com/xdb/d8d92a442a79 , https://vulncheck.com/xdb/1ce7755efb91||https://vulncheck.com/xdb/1ce7755efb91 , https://vulncheck.com/xdb/0869637d461d||https://vulncheck.com/xdb/0869637d461d , https://vulncheck.com/xdb/a90a4f4fa523||https://vulncheck.com/xdb/a90a4f4fa523 , https://vulncheck.com/xdb/3ac3f4ccae08||https://vulncheck.com/xdb/3ac3f4ccae08 , https://vulncheck.com/xdb/317ac291487c||https://vulncheck.com/xdb/317ac291487c
CVE-2021-1789 Apple Multiple Products 05/04/2022 0.00218 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1789
CVE-2014-4113 Microsoft Win32k 05/04/2022 0.78854 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4113 https://vulncheck.com/xdb/8029f175ac9c||https://vulncheck.com/xdb/8029f175ac9c , https://vulncheck.com/xdb/05fff57b709b||https://vulncheck.com/xdb/05fff57b709b , https://vulncheck.com/xdb/d796605547b2||https://vulncheck.com/xdb/d796605547b2 , https://vulncheck.com/xdb/34d9389c9ba7||https://vulncheck.com/xdb/34d9389c9ba7
CVE-2019-8506 Apple Multiple Products 05/04/2022 0.16048 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-8506
CVE-2014-0322 Microsoft Internet Explorer 05/04/2022 0.92573 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0322
CVE-2014-0160 OpenSSL OpenSSL 05/04/2022 0.94462 7.5 https://viz.greynoise.io/tag/heartbleed-scanner||https://viz.greynoise.io/tag/heartbleed-scanner FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0160 https://vulncheck.com/xdb/fcbef4f6ba27||https://vulncheck.com/xdb/fcbef4f6ba27 , https://vulncheck.com/xdb/9b3591a427cb||https://vulncheck.com/xdb/9b3591a427cb , https://vulncheck.com/xdb/e57d9c60a44c||https://vulncheck.com/xdb/e57d9c60a44c , https://vulncheck.com/xdb/8311b472a11a||https://vulncheck.com/xdb/8311b472a11a , https://vulncheck.com/xdb/16161c93e8de||https://vulncheck.com/xdb/16161c93e8de , https://vulncheck.com/xdb/ced85a07daad||https://vulncheck.com/xdb/ced85a07daad , https://vulncheck.com/xdb/f3c627ddd56c||https://vulncheck.com/xdb/f3c627ddd56c , https://vulncheck.com/xdb/e236a82d5676||https://vulncheck.com/xdb/e236a82d5676 , https://vulncheck.com/xdb/1c0f2aa2ac17||https://vulncheck.com/xdb/1c0f2aa2ac17 , https://vulncheck.com/xdb/878c4a2de132||https://vulncheck.com/xdb/878c4a2de132 , https://vulncheck.com/xdb/f824571c8c19||https://vulncheck.com/xdb/f824571c8c19 , https://vulncheck.com/xdb/886614a9cf7f||https://vulncheck.com/xdb/886614a9cf7f , https://vulncheck.com/xdb/f328891e9eac||https://vulncheck.com/xdb/f328891e9eac , https://vulncheck.com/xdb/5caf3f40fb1d||https://vulncheck.com/xdb/5caf3f40fb1d , https://vulncheck.com/xdb/051785dcdfd8||https://vulncheck.com/xdb/051785dcdfd8 , https://vulncheck.com/xdb/3c96ba13f2b0||https://vulncheck.com/xdb/3c96ba13f2b0 , https://vulncheck.com/xdb/7c9998eeef71||https://vulncheck.com/xdb/7c9998eeef71 , https://vulncheck.com/xdb/e30f1c9ea953||https://vulncheck.com/xdb/e30f1c9ea953 , https://vulncheck.com/xdb/db71d342ecf5||https://vulncheck.com/xdb/db71d342ecf5 , https://vulncheck.com/xdb/f9a7bb7f45e4||https://vulncheck.com/xdb/f9a7bb7f45e4 , https://vulncheck.com/xdb/180c504a4ab9||https://vulncheck.com/xdb/180c504a4ab9 , https://vulncheck.com/xdb/6fd3881a18c4||https://vulncheck.com/xdb/6fd3881a18c4 , https://vulncheck.com/xdb/bd1cb68e3a25||https://vulncheck.com/xdb/bd1cb68e3a25 , https://vulncheck.com/xdb/2777a83a11fb||https://vulncheck.com/xdb/2777a83a11fb , https://vulncheck.com/xdb/982bf0b4eb89||https://vulncheck.com/xdb/982bf0b4eb89 , https://vulncheck.com/xdb/8a3b36c16af2||https://vulncheck.com/xdb/8a3b36c16af2 , https://vulncheck.com/xdb/03d9bdcb45e0||https://vulncheck.com/xdb/03d9bdcb45e0 , https://vulncheck.com/xdb/31dbd59f952b||https://vulncheck.com/xdb/31dbd59f952b , https://vulncheck.com/xdb/a5f2ac732a33||https://vulncheck.com/xdb/a5f2ac732a33 , https://vulncheck.com/xdb/a4ecbf735c2c||https://vulncheck.com/xdb/a4ecbf735c2c
CVE-2022-29464 WSO2 Multiple Products 04/25/2022 0.94434 9.8 https://viz.greynoise.io/tag/wso2-api-manager-file-upload-attempt||https://viz.greynoise.io/tag/wso2-api-manager-file-upload-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-29464 https://vulncheck.com/xdb/86a670679b59||https://vulncheck.com/xdb/86a670679b59 , https://vulncheck.com/xdb/f381bd45a664||https://vulncheck.com/xdb/f381bd45a664 , https://vulncheck.com/xdb/0a4c343b0014||https://vulncheck.com/xdb/0a4c343b0014 , https://vulncheck.com/xdb/f5b17b3bface||https://vulncheck.com/xdb/f5b17b3bface , https://vulncheck.com/xdb/fb07ec0c6437||https://vulncheck.com/xdb/fb07ec0c6437 , https://vulncheck.com/xdb/51ec326380b8||https://vulncheck.com/xdb/51ec326380b8 , https://vulncheck.com/xdb/692f8dbe0563||https://vulncheck.com/xdb/692f8dbe0563 , https://vulncheck.com/xdb/057c3b65744e||https://vulncheck.com/xdb/057c3b65744e , https://vulncheck.com/xdb/91f9d53e4538||https://vulncheck.com/xdb/91f9d53e4538 , https://vulncheck.com/xdb/b3297f4dd55c||https://vulncheck.com/xdb/b3297f4dd55c , https://vulncheck.com/xdb/5c2ba6bd6d73||https://vulncheck.com/xdb/5c2ba6bd6d73 , https://vulncheck.com/xdb/00ad5fff1b1d||https://vulncheck.com/xdb/00ad5fff1b1d , https://vulncheck.com/xdb/d98d3fe174f9||https://vulncheck.com/xdb/d98d3fe174f9 , https://vulncheck.com/xdb/eda98189c7b4||https://vulncheck.com/xdb/eda98189c7b4 , https://vulncheck.com/xdb/11fb9f164ff9||https://vulncheck.com/xdb/11fb9f164ff9 , https://vulncheck.com/xdb/c0f15d01be06||https://vulncheck.com/xdb/c0f15d01be06 , https://vulncheck.com/xdb/7407640180cb||https://vulncheck.com/xdb/7407640180cb , https://vulncheck.com/xdb/82f284db0232||https://vulncheck.com/xdb/82f284db0232
CVE-2021-41357 Microsoft Win32k 04/25/2022 0.12041 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-41357
CVE-2022-0847 Linux Kernel 04/25/2022 0.84653 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-0847 https://vulncheck.com/xdb/a77a7570c91b||https://vulncheck.com/xdb/a77a7570c91b , https://vulncheck.com/xdb/6651072dd4a6||https://vulncheck.com/xdb/6651072dd4a6 , https://vulncheck.com/xdb/27ac660f03de||https://vulncheck.com/xdb/27ac660f03de , https://vulncheck.com/xdb/b665c30d7b05||https://vulncheck.com/xdb/b665c30d7b05 , https://vulncheck.com/xdb/b7ade02a3da0||https://vulncheck.com/xdb/b7ade02a3da0 , https://vulncheck.com/xdb/370b7021f8a9||https://vulncheck.com/xdb/370b7021f8a9 , https://vulncheck.com/xdb/c735aeb744ea||https://vulncheck.com/xdb/c735aeb744ea , https://vulncheck.com/xdb/96d8ebedfe2f||https://vulncheck.com/xdb/96d8ebedfe2f , https://vulncheck.com/xdb/830e350bd642||https://vulncheck.com/xdb/830e350bd642 , https://vulncheck.com/xdb/4876d153c69a||https://vulncheck.com/xdb/4876d153c69a , https://vulncheck.com/xdb/54b99f9179fb||https://vulncheck.com/xdb/54b99f9179fb , https://vulncheck.com/xdb/17eac3a8349d||https://vulncheck.com/xdb/17eac3a8349d , https://vulncheck.com/xdb/7681898c4d58||https://vulncheck.com/xdb/7681898c4d58 , https://vulncheck.com/xdb/d34eb7cc4235||https://vulncheck.com/xdb/d34eb7cc4235 , https://vulncheck.com/xdb/d6a71047f04c||https://vulncheck.com/xdb/d6a71047f04c , https://vulncheck.com/xdb/610fa05f7ec4||https://vulncheck.com/xdb/610fa05f7ec4 , https://vulncheck.com/xdb/79c51557e8e7||https://vulncheck.com/xdb/79c51557e8e7 , https://vulncheck.com/xdb/39fa7f44daa8||https://vulncheck.com/xdb/39fa7f44daa8 , https://vulncheck.com/xdb/5a77169c0797||https://vulncheck.com/xdb/5a77169c0797 , https://vulncheck.com/xdb/6c64ccbb8d52||https://vulncheck.com/xdb/6c64ccbb8d52 , https://vulncheck.com/xdb/82740f737207||https://vulncheck.com/xdb/82740f737207 , https://vulncheck.com/xdb/c4258f9dc626||https://vulncheck.com/xdb/c4258f9dc626 , https://vulncheck.com/xdb/e74c2b6094ac||https://vulncheck.com/xdb/e74c2b6094ac , https://vulncheck.com/xdb/42ba5e95ff5b||https://vulncheck.com/xdb/42ba5e95ff5b , https://vulncheck.com/xdb/de3da6925a66||https://vulncheck.com/xdb/de3da6925a66 , https://vulncheck.com/xdb/d3ad03153f6e||https://vulncheck.com/xdb/d3ad03153f6e , https://vulncheck.com/xdb/d542c059ef55||https://vulncheck.com/xdb/d542c059ef55 , https://vulncheck.com/xdb/a76c9b8da62a||https://vulncheck.com/xdb/a76c9b8da62a , https://vulncheck.com/xdb/bef271559611||https://vulncheck.com/xdb/bef271559611 , https://vulncheck.com/xdb/cbca31fa2346||https://vulncheck.com/xdb/cbca31fa2346 , https://vulncheck.com/xdb/86e89699a34a||https://vulncheck.com/xdb/86e89699a34a , https://vulncheck.com/xdb/986760f90254||https://vulncheck.com/xdb/986760f90254 , https://vulncheck.com/xdb/11089b6096c2||https://vulncheck.com/xdb/11089b6096c2 , https://vulncheck.com/xdb/7f2dbb1be2fa||https://vulncheck.com/xdb/7f2dbb1be2fa , https://vulncheck.com/xdb/0ff57a4fbafc||https://vulncheck.com/xdb/0ff57a4fbafc , https://vulncheck.com/xdb/7a4fbe4458fb||https://vulncheck.com/xdb/7a4fbe4458fb , https://vulncheck.com/xdb/d3a70ff7bafd||https://vulncheck.com/xdb/d3a70ff7bafd , https://vulncheck.com/xdb/a3b3ce85d0a5||https://vulncheck.com/xdb/a3b3ce85d0a5 , https://vulncheck.com/xdb/46be9d6ea639||https://vulncheck.com/xdb/46be9d6ea639 , https://vulncheck.com/xdb/5e1cd4381cd2||https://vulncheck.com/xdb/5e1cd4381cd2 , https://vulncheck.com/xdb/f44fe86cdbd8||https://vulncheck.com/xdb/f44fe86cdbd8 , https://vulncheck.com/xdb/3b34006b6ed8||https://vulncheck.com/xdb/3b34006b6ed8 , https://vulncheck.com/xdb/e2dbb982b5da||https://vulncheck.com/xdb/e2dbb982b5da , https://vulncheck.com/xdb/5753c6aff2e2||https://vulncheck.com/xdb/5753c6aff2e2 , https://vulncheck.com/xdb/57ffde1c1df6||https://vulncheck.com/xdb/57ffde1c1df6 , https://vulncheck.com/xdb/df0bacb0b7bc||https://vulncheck.com/xdb/df0bacb0b7bc , https://vulncheck.com/xdb/4a62a2a669be||https://vulncheck.com/xdb/4a62a2a669be , https://vulncheck.com/xdb/e4ea692dc95e||https://vulncheck.com/xdb/e4ea692dc95e , https://vulncheck.com/xdb/bc3dc26b7001||https://vulncheck.com/xdb/bc3dc26b7001 , https://vulncheck.com/xdb/8fecaa2db7c9||https://vulncheck.com/xdb/8fecaa2db7c9
CVE-2022-26904 Microsoft Windows 04/25/2022 0.17651 7.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26904
CVE-2019-1003029 Jenkins Script Security Plugin 04/25/2022 0.92658 9.9 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1003029
CVE-2021-40450 Microsoft Win32k 04/25/2022 0.13834 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40450
CVE-2022-21919 Microsoft Windows 04/25/2022 0.00605 7.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-21919
CVE-2018-6882 Synacor Zimbra Collaboration Suite (ZCS) 04/19/2022 0.65605 6.1 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-6882
CVE-2022-22718 Microsoft Windows 04/19/2022 0.07521 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22718
CVE-2019-3568 Meta Platforms WhatsApp 04/19/2022 0.33311 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-3568
CVE-2022-22960 VMware Multiple Products 04/15/2022 0.75809 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22960
CVE-2019-16057 D-Link DNS-320 Storage Device 04/15/2022 0.94047 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-16057
CVE-2022-1364 Google Chromium V8 04/15/2022 0.10518 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-1364 https://vulncheck.com/xdb/fa9ae46e4f9d
CVE-2010-5330 Ubiquiti AirOS 04/15/2022 0.61526 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-5330
CVE-2019-3929 Crestron Multiple Products 04/15/2022 0.94043 9.8 https://viz.greynoise.io/tag/awind-presentation-platform-rce-attempt||https://viz.greynoise.io/tag/awind-presentation-platform-rce-attempt 3 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2019-3929 https://vulncheck.com/xdb/b1661be8a793
CVE-2014-0780 InduSoft Web Studio 04/15/2022 0.91403 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0780
CVE-2016-4523 Trihedral VTScada (formerly VTS) 04/15/2022 0.68567 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4523
CVE-2007-3010 Alcatel OmniPCX Enterprise 04/15/2022 0.94065 9.8 https://viz.greynoise.io/tag/alcatel-lucent-omnipcx-rce-attempt||https://viz.greynoise.io/tag/alcatel-lucent-omnipcx-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2007-3010
CVE-2018-7841 Schneider Electric U.motion Builder 04/15/2022 0.39097 9.8 https://viz.greynoise.io/tag/schneider-electric-u-motion-rce-attempt||https://viz.greynoise.io/tag/schneider-electric-u-motion-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-7841
CVE-2022-22954 VMware Workspace ONE Access and Identity Manager 04/14/2022 0.94441 9.8 https://viz.greynoise.io/tag/vmware-workspace-one-rce-attempt||https://viz.greynoise.io/tag/vmware-workspace-one-rce-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22954 https://vulncheck.com/xdb/c9ec81500cf0||https://vulncheck.com/xdb/c9ec81500cf0 , https://vulncheck.com/xdb/2184ae956a90||https://vulncheck.com/xdb/2184ae956a90 , https://vulncheck.com/xdb/eb9450cfb07a||https://vulncheck.com/xdb/eb9450cfb07a , https://vulncheck.com/xdb/13023d4a2d10||https://vulncheck.com/xdb/13023d4a2d10 , https://vulncheck.com/xdb/3129d733dec5||https://vulncheck.com/xdb/3129d733dec5 , https://vulncheck.com/xdb/e1e21d39f7ed||https://vulncheck.com/xdb/e1e21d39f7ed , https://vulncheck.com/xdb/3cac1b8f8b74||https://vulncheck.com/xdb/3cac1b8f8b74
CVE-2018-7602 Drupal Core 04/13/2022 0.94316 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-7602 https://vulncheck.com/xdb/c3bdef4dbd21||https://vulncheck.com/xdb/c3bdef4dbd21 , https://vulncheck.com/xdb/b1a7a12a9987||https://vulncheck.com/xdb/b1a7a12a9987 , https://vulncheck.com/xdb/352de7a463fa||https://vulncheck.com/xdb/352de7a463fa , https://vulncheck.com/xdb/49a9c9975129||https://vulncheck.com/xdb/49a9c9975129
CVE-2018-20753 Kaseya Virtual System/Server Administrator (VSA) 04/13/2022 0.37234 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-20753
CVE-2015-3113 Adobe Flash Player 04/13/2022 0.92609 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-3113
CVE-2014-9163 Adobe Flash Player 04/13/2022 0.12835 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-9163
CVE-2015-0313 Adobe Flash Player 04/13/2022 0.93399 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0313
CVE-2015-5122 Adobe Flash Player 04/13/2022 0.92389 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-5122 https://vulncheck.com/xdb/f32e362c2ef9
CVE-2015-2502 Microsoft Internet Explorer 04/13/2022 0.17800 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2502
CVE-2015-5123 Adobe Flash Player 04/13/2022 0.45202 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-5123
CVE-2022-24521 Microsoft Windows 04/13/2022 0.03840 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-24521
CVE-2015-0311 Adobe Flash Player 04/13/2022 0.92871 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0311 https://vulncheck.com/xdb/48142db4596a
CVE-2020-2509 QNAP QNAP Network-Attached Storage (NAS) 04/11/2022 0.86915 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-2509 https://vulncheck.com/xdb/533b5e83b1eb
CVE-2021-39793 Google Pixel 04/11/2022 0.00043 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-39793
CVE-2021-42287 Microsoft Active Directory 04/11/2022 0.93954 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42287 https://vulncheck.com/xdb/be2316d8bd2e||https://vulncheck.com/xdb/be2316d8bd2e , https://vulncheck.com/xdb/d55c30346a8e||https://vulncheck.com/xdb/d55c30346a8e , https://vulncheck.com/xdb/626f11bd7b9c||https://vulncheck.com/xdb/626f11bd7b9c , https://vulncheck.com/xdb/26882e31c656||https://vulncheck.com/xdb/26882e31c656 , https://vulncheck.com/xdb/de00aae17015||https://vulncheck.com/xdb/de00aae17015
CVE-2017-11317 Telerik User Interface (UI) for ASP.NET AJAX 04/11/2022 0.92279 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-11317 https://vulncheck.com/xdb/130118043aa6||https://vulncheck.com/xdb/130118043aa6 , https://vulncheck.com/xdb/a71140babcca||https://vulncheck.com/xdb/a71140babcca
CVE-2022-23176 WatchGuard Firebox and XTM 04/11/2022 0.17683 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-23176
CVE-2021-22600 Linux Kernel 04/11/2022 0.00037 6.6 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22600 https://vulncheck.com/xdb/17eb97e14356
CVE-2021-27852 Checkbox Checkbox Survey 04/11/2022 0.21464 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27852
CVE-2021-42278 Microsoft Active Directory 04/11/2022 0.94019 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42278 https://vulncheck.com/xdb/9c7330f5adf3||https://vulncheck.com/xdb/9c7330f5adf3 , https://vulncheck.com/xdb/34b0d2463eda||https://vulncheck.com/xdb/34b0d2463eda , https://vulncheck.com/xdb/e8ed8fd973a7||https://vulncheck.com/xdb/e8ed8fd973a7 , https://vulncheck.com/xdb/230d7f3a2644||https://vulncheck.com/xdb/230d7f3a2644 , https://vulncheck.com/xdb/8c3a23782131||https://vulncheck.com/xdb/8c3a23782131 , https://vulncheck.com/xdb/db23ac405047||https://vulncheck.com/xdb/db23ac405047
CVE-2021-31166 Microsoft HTTP Protocol Stack 04/06/2022 0.93043 9.8 https://viz.greynoise.io/tag/microsoft-http-sys-rce-attempt||https://viz.greynoise.io/tag/microsoft-http-sys-rce-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31166 https://vulncheck.com/xdb/e25c79214978||https://vulncheck.com/xdb/e25c79214978 , https://vulncheck.com/xdb/74d91688925d||https://vulncheck.com/xdb/74d91688925d , https://vulncheck.com/xdb/b60f189b7005||https://vulncheck.com/xdb/b60f189b7005 , https://vulncheck.com/xdb/3d89c1c29c99||https://vulncheck.com/xdb/3d89c1c29c99 , https://vulncheck.com/xdb/a07dc76a6f89||https://vulncheck.com/xdb/a07dc76a6f89 , https://vulncheck.com/xdb/3dbf2e48a531||https://vulncheck.com/xdb/3dbf2e48a531 , https://vulncheck.com/xdb/86c76b7eb3bc||https://vulncheck.com/xdb/86c76b7eb3bc , https://vulncheck.com/xdb/e1866d71c3af||https://vulncheck.com/xdb/e1866d71c3af , https://vulncheck.com/xdb/5719bfcb7a63||https://vulncheck.com/xdb/5719bfcb7a63
CVE-2017-0148 Microsoft SMBv1 server 04/06/2022 0.94167 8.1 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0148 https://vulncheck.com/xdb/01fbcaf8d8bd
CVE-2021-3156 Sudo Sudo 04/06/2022 0.92188 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-3156 https://vulncheck.com/xdb/b2ee85cf4e76||https://vulncheck.com/xdb/b2ee85cf4e76 , https://vulncheck.com/xdb/84e3dea90796||https://vulncheck.com/xdb/84e3dea90796 , https://vulncheck.com/xdb/a36a6349c87b||https://vulncheck.com/xdb/a36a6349c87b , https://vulncheck.com/xdb/956619acb26b||https://vulncheck.com/xdb/956619acb26b , https://vulncheck.com/xdb/8f873fe619f2||https://vulncheck.com/xdb/8f873fe619f2 , https://vulncheck.com/xdb/0573a1989e58||https://vulncheck.com/xdb/0573a1989e58 , https://vulncheck.com/xdb/ff18a04b19fb||https://vulncheck.com/xdb/ff18a04b19fb , https://vulncheck.com/xdb/791107725e9b||https://vulncheck.com/xdb/791107725e9b , https://vulncheck.com/xdb/6f8a62e9dc05||https://vulncheck.com/xdb/6f8a62e9dc05 , https://vulncheck.com/xdb/a7e527112fb0||https://vulncheck.com/xdb/a7e527112fb0 , https://vulncheck.com/xdb/d82fe374addc||https://vulncheck.com/xdb/d82fe374addc , https://vulncheck.com/xdb/d818ae56992a||https://vulncheck.com/xdb/d818ae56992a , https://vulncheck.com/xdb/22cb903c9959||https://vulncheck.com/xdb/22cb903c9959 , https://vulncheck.com/xdb/c1fae139d5d4||https://vulncheck.com/xdb/c1fae139d5d4 , https://vulncheck.com/xdb/a3fcd264aa62||https://vulncheck.com/xdb/a3fcd264aa62 , https://vulncheck.com/xdb/750ce3551def||https://vulncheck.com/xdb/750ce3551def , https://vulncheck.com/xdb/94ac175265db||https://vulncheck.com/xdb/94ac175265db , https://vulncheck.com/xdb/cb038c4634e2||https://vulncheck.com/xdb/cb038c4634e2 , https://vulncheck.com/xdb/b72767d3ef0b||https://vulncheck.com/xdb/b72767d3ef0b , https://vulncheck.com/xdb/98bc51c674a1||https://vulncheck.com/xdb/98bc51c674a1 , https://vulncheck.com/xdb/b625d38ee231||https://vulncheck.com/xdb/b625d38ee231 , https://vulncheck.com/xdb/20f15e46bf13||https://vulncheck.com/xdb/20f15e46bf13 , https://vulncheck.com/xdb/de59d87d7443||https://vulncheck.com/xdb/de59d87d7443 , https://vulncheck.com/xdb/172fcbe73544||https://vulncheck.com/xdb/172fcbe73544 , https://vulncheck.com/xdb/a2e62b6d17d1||https://vulncheck.com/xdb/a2e62b6d17d1 , https://vulncheck.com/xdb/67522d547498||https://vulncheck.com/xdb/67522d547498 , https://vulncheck.com/xdb/c7646cc24cf1||https://vulncheck.com/xdb/c7646cc24cf1 , https://vulncheck.com/xdb/1e5a3258d388||https://vulncheck.com/xdb/1e5a3258d388 , https://vulncheck.com/xdb/33b2727e22e2||https://vulncheck.com/xdb/33b2727e22e2 , https://vulncheck.com/xdb/f3a81abb3ba0||https://vulncheck.com/xdb/f3a81abb3ba0 , https://vulncheck.com/xdb/5cd3a38f312a||https://vulncheck.com/xdb/5cd3a38f312a , https://vulncheck.com/xdb/dd12494d2728||https://vulncheck.com/xdb/dd12494d2728 , https://vulncheck.com/xdb/42c8e43d9038||https://vulncheck.com/xdb/42c8e43d9038 , https://vulncheck.com/xdb/45a30e5e36fe||https://vulncheck.com/xdb/45a30e5e36fe , https://vulncheck.com/xdb/85981dac158c||https://vulncheck.com/xdb/85981dac158c , https://vulncheck.com/xdb/1db9ceee140b||https://vulncheck.com/xdb/1db9ceee140b , https://vulncheck.com/xdb/8486488deafe||https://vulncheck.com/xdb/8486488deafe , https://vulncheck.com/xdb/64d475da2992||https://vulncheck.com/xdb/64d475da2992 , https://vulncheck.com/xdb/1ded723ada65||https://vulncheck.com/xdb/1ded723ada65 , https://vulncheck.com/xdb/574e35cbc6bc||https://vulncheck.com/xdb/574e35cbc6bc , https://vulncheck.com/xdb/5fa314f8b37f||https://vulncheck.com/xdb/5fa314f8b37f , https://vulncheck.com/xdb/e559a5756f19||https://vulncheck.com/xdb/e559a5756f19 , https://vulncheck.com/xdb/5fb557d581fa||https://vulncheck.com/xdb/5fb557d581fa , https://vulncheck.com/xdb/81c88fb24bd9||https://vulncheck.com/xdb/81c88fb24bd9 , https://vulncheck.com/xdb/c5972ce378fc||https://vulncheck.com/xdb/c5972ce378fc , https://vulncheck.com/xdb/1add099f19fc||https://vulncheck.com/xdb/1add099f19fc , https://vulncheck.com/xdb/9fbcde6203e1||https://vulncheck.com/xdb/9fbcde6203e1 , https://vulncheck.com/xdb/e63e0be85a72||https://vulncheck.com/xdb/e63e0be85a72 , https://vulncheck.com/xdb/3ee223200973||https://vulncheck.com/xdb/3ee223200973 , https://vulncheck.com/xdb/314b3ed04db3||https://vulncheck.com/xdb/314b3ed04db3 , https://vulncheck.com/xdb/12b9978dfd35||https://vulncheck.com/xdb/12b9978dfd35 , https://vulncheck.com/xdb/748cab143d91||https://vulncheck.com/xdb/748cab143d91 , https://vulncheck.com/xdb/e970e6dec7b1||https://vulncheck.com/xdb/e970e6dec7b1 , https://vulncheck.com/xdb/664271a6cb02||https://vulncheck.com/xdb/664271a6cb02 , https://vulncheck.com/xdb/4e52e6bd25cf||https://vulncheck.com/xdb/4e52e6bd25cf , https://vulncheck.com/xdb/6b4c5b3f6b0e||https://vulncheck.com/xdb/6b4c5b3f6b0e , https://vulncheck.com/xdb/42c098e8e2cc||https://vulncheck.com/xdb/42c098e8e2cc , https://vulncheck.com/xdb/73a26a137f38||https://vulncheck.com/xdb/73a26a137f38 , https://vulncheck.com/xdb/25def691895e||https://vulncheck.com/xdb/25def691895e , https://vulncheck.com/xdb/f80704f9c087||https://vulncheck.com/xdb/f80704f9c087 , https://vulncheck.com/xdb/bdfb7b3c721c||https://vulncheck.com/xdb/bdfb7b3c721c , https://vulncheck.com/xdb/c60ebdc30c29||https://vulncheck.com/xdb/c60ebdc30c29 , https://vulncheck.com/xdb/8a16e063dbd5||https://vulncheck.com/xdb/8a16e063dbd5 , https://vulncheck.com/xdb/bfb260e80a93||https://vulncheck.com/xdb/bfb260e80a93 , https://vulncheck.com/xdb/300797d10318||https://vulncheck.com/xdb/300797d10318
CVE-2022-22965 VMware Spring Framework 04/04/2022 0.94460 9.8 https://viz.greynoise.io/tag/spring-core-rce-attempt||https://viz.greynoise.io/tag/spring-core-rce-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22965 https://vulncheck.com/xdb/a06a094eaf77||https://vulncheck.com/xdb/a06a094eaf77 , https://vulncheck.com/xdb/ae290b96b916||https://vulncheck.com/xdb/ae290b96b916 , https://vulncheck.com/xdb/079a4eabc6cb||https://vulncheck.com/xdb/079a4eabc6cb , https://vulncheck.com/xdb/01a71759b184||https://vulncheck.com/xdb/01a71759b184 , https://vulncheck.com/xdb/4b35b8084b29||https://vulncheck.com/xdb/4b35b8084b29 , https://vulncheck.com/xdb/7f595932a60c||https://vulncheck.com/xdb/7f595932a60c , https://vulncheck.com/xdb/813cebc364f3||https://vulncheck.com/xdb/813cebc364f3 , https://vulncheck.com/xdb/94d4cd3e1504||https://vulncheck.com/xdb/94d4cd3e1504 , https://vulncheck.com/xdb/41c3baef6240||https://vulncheck.com/xdb/41c3baef6240 , https://vulncheck.com/xdb/ba950aab55ad||https://vulncheck.com/xdb/ba950aab55ad , https://vulncheck.com/xdb/2d17c8128624||https://vulncheck.com/xdb/2d17c8128624 , https://vulncheck.com/xdb/99a67c155fa1||https://vulncheck.com/xdb/99a67c155fa1 , https://vulncheck.com/xdb/b98563f18c75||https://vulncheck.com/xdb/b98563f18c75 , https://vulncheck.com/xdb/b2f106eac2b1||https://vulncheck.com/xdb/b2f106eac2b1 , https://vulncheck.com/xdb/cb8af208c905||https://vulncheck.com/xdb/cb8af208c905 , https://vulncheck.com/xdb/fabec78da0ff||https://vulncheck.com/xdb/fabec78da0ff , https://vulncheck.com/xdb/6db677f753b7||https://vulncheck.com/xdb/6db677f753b7 , https://vulncheck.com/xdb/598802190749||https://vulncheck.com/xdb/598802190749 , https://vulncheck.com/xdb/c982d62ac774||https://vulncheck.com/xdb/c982d62ac774 , https://vulncheck.com/xdb/4ae197406cec||https://vulncheck.com/xdb/4ae197406cec , https://vulncheck.com/xdb/a00bd5404625||https://vulncheck.com/xdb/a00bd5404625 , https://vulncheck.com/xdb/2f1e13cd31bb||https://vulncheck.com/xdb/2f1e13cd31bb , https://vulncheck.com/xdb/a2a434dff59d||https://vulncheck.com/xdb/a2a434dff59d , https://vulncheck.com/xdb/16f47f13dfb3||https://vulncheck.com/xdb/16f47f13dfb3 , https://vulncheck.com/xdb/2fa78259b5d9||https://vulncheck.com/xdb/2fa78259b5d9 , https://vulncheck.com/xdb/7c26b11a86f0||https://vulncheck.com/xdb/7c26b11a86f0 , https://vulncheck.com/xdb/29679c6bfbb1||https://vulncheck.com/xdb/29679c6bfbb1 , https://vulncheck.com/xdb/1d2c273a6a58||https://vulncheck.com/xdb/1d2c273a6a58 , https://vulncheck.com/xdb/e538f647f0f7||https://vulncheck.com/xdb/e538f647f0f7 , https://vulncheck.com/xdb/44a4aa67f46d||https://vulncheck.com/xdb/44a4aa67f46d , https://vulncheck.com/xdb/3f8ffc5be01f||https://vulncheck.com/xdb/3f8ffc5be01f , https://vulncheck.com/xdb/20accf3817fa||https://vulncheck.com/xdb/20accf3817fa , https://vulncheck.com/xdb/f697d4d9577b||https://vulncheck.com/xdb/f697d4d9577b , https://vulncheck.com/xdb/32aee2a0b3b4||https://vulncheck.com/xdb/32aee2a0b3b4 , https://vulncheck.com/xdb/a99dfc9a1fa0||https://vulncheck.com/xdb/a99dfc9a1fa0 , https://vulncheck.com/xdb/697638d15686||https://vulncheck.com/xdb/697638d15686 , https://vulncheck.com/xdb/30bd37a7b9c8||https://vulncheck.com/xdb/30bd37a7b9c8 , https://vulncheck.com/xdb/b383e52d60dd||https://vulncheck.com/xdb/b383e52d60dd , https://vulncheck.com/xdb/3532ae2b1db3||https://vulncheck.com/xdb/3532ae2b1db3 , https://vulncheck.com/xdb/f1130a964b4f||https://vulncheck.com/xdb/f1130a964b4f , https://vulncheck.com/xdb/5978e9609a96||https://vulncheck.com/xdb/5978e9609a96 , https://vulncheck.com/xdb/43e4620d8285||https://vulncheck.com/xdb/43e4620d8285 , https://vulncheck.com/xdb/c5654abe65dd||https://vulncheck.com/xdb/c5654abe65dd , https://vulncheck.com/xdb/a73d53d733d9||https://vulncheck.com/xdb/a73d53d733d9 , https://vulncheck.com/xdb/e2354921ce12||https://vulncheck.com/xdb/e2354921ce12
CVE-2022-22674 Apple macOS 04/04/2022 0.00145 5.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22674
CVE-2022-22675 Apple macOS 04/04/2022 0.00531 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22675
CVE-2021-45382 D-Link Multiple Routers 04/04/2022 0.93095 9.8 https://viz.greynoise.io/tag/d-link-dir-8xxl-command-injection-cve-2021-45382-attempt||https://viz.greynoise.io/tag/d-link-dir-8xxl-command-injection-cve-2021-45382-attempt 2 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-45382
CVE-2022-26871 Trend Micro Apex Central 03/31/2022 0.08567 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26871
CVE-2021-28799 QNAP Network Attached Storage (NAS) 03/31/2022 0.88780 10.0 https://viz.greynoise.io/tag/qnap-walter-ssh-backdoor-attempt||https://viz.greynoise.io/tag/qnap-walter-ssh-backdoor-attempt TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-28799
CVE-2021-34484 Microsoft Windows 03/31/2022 0.05862 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-34484
CVE-2021-21551 Dell dbutil Driver 03/31/2022 0.52381 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21551 https://vulncheck.com/xdb/8be3d8d1c5b0||https://vulncheck.com/xdb/8be3d8d1c5b0 , https://vulncheck.com/xdb/e8ab324055fa||https://vulncheck.com/xdb/e8ab324055fa , https://vulncheck.com/xdb/53bc14e20b42||https://vulncheck.com/xdb/53bc14e20b42 , https://vulncheck.com/xdb/9ed28f8e8fd9||https://vulncheck.com/xdb/9ed28f8e8fd9 , https://vulncheck.com/xdb/36f3363281a7||https://vulncheck.com/xdb/36f3363281a7 , https://vulncheck.com/xdb/ad79da994145||https://vulncheck.com/xdb/ad79da994145 , https://vulncheck.com/xdb/efad29dc55a9||https://vulncheck.com/xdb/efad29dc55a9 , https://vulncheck.com/xdb/00d3994af95f||https://vulncheck.com/xdb/00d3994af95f
CVE-2022-1040 Sophos Firewall 03/31/2022 0.94439 9.8 https://viz.greynoise.io/tag/sophos-firewall-remote-code-execution-attempt||https://viz.greynoise.io/tag/sophos-firewall-remote-code-execution-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-1040 https://vulncheck.com/xdb/de8e5cbcd18e||https://vulncheck.com/xdb/de8e5cbcd18e , https://vulncheck.com/xdb/e21dcd0c9b19||https://vulncheck.com/xdb/e21dcd0c9b19 , https://vulncheck.com/xdb/27a470af6b96||https://vulncheck.com/xdb/27a470af6b96 , https://vulncheck.com/xdb/739974fb0198||https://vulncheck.com/xdb/739974fb0198
CVE-2018-10561 Dasan Gigabit Passive Optical Network (GPON) Routers 03/31/2022 0.92180 9.8 https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt||https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-10561
CVE-2018-10562 Dasan Gigabit Passive Optical Network (GPON) Routers 03/31/2022 0.94110 9.8 https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt||https://viz.greynoise.io/tag/gpon-cve-2018-10561-router-worm-attempt 215 TRUE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2018-10562 https://vulncheck.com/xdb/7d4c3f77cac1||https://vulncheck.com/xdb/7d4c3f77cac1 , https://vulncheck.com/xdb/1f5e1339366c||https://vulncheck.com/xdb/1f5e1339366c , https://vulncheck.com/xdb/74d302e8b9e2||https://vulncheck.com/xdb/74d302e8b9e2
CVE-2011-2005 Microsoft Ancillary Function Driver (afd.sys) 03/28/2022 0.59278 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-2005 https://vulncheck.com/xdb/f986d5f654bf
CVE-2021-26085 Atlassian Confluence Server 03/28/2022 0.94328 5.3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-26085 https://vulncheck.com/xdb/611d47c6f6fb
CVE-2018-8406 Microsoft DirectX Graphics Kernel (DXGKRNL) 03/28/2022 0.14911 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8406
CVE-2013-2729 Adobe Reader and Acrobat 03/28/2022 0.90244 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-2729
CVE-2015-1770 Microsoft Office 03/28/2022 0.73204 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1770
CVE-2013-2551 Microsoft Internet Explorer 03/28/2022 0.92743 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-2551
CVE-2021-20028 SonicWall Secure Remote Access (SRA) 03/28/2022 0.85908 9.8 https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-attempt||https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-attempt , https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-vuln-check||https://viz.greynoise.io/tag/sonicwall-sra-sql-injection-vuln-check 1 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20028
CVE-2019-7483 SonicWall SMA100 03/28/2022 0.39938 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7483
CVE-2015-2426 Microsoft Windows 03/28/2022 0.91929 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2426
CVE-2010-4398 Microsoft Windows 03/28/2022 0.12282 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-4398
CVE-2022-0543 Redis Debian-specific Redis Servers 03/28/2022 0.94385 10.0 https://viz.greynoise.io/tag/debian-redis-lua-sandbox-escape-cve-2022-0543-attempt||https://viz.greynoise.io/tag/debian-redis-lua-sandbox-escape-cve-2022-0543-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-0543 https://vulncheck.com/xdb/97008fd59436||https://vulncheck.com/xdb/97008fd59436 , https://vulncheck.com/xdb/1de84cdea3d8||https://vulncheck.com/xdb/1de84cdea3d8 , https://vulncheck.com/xdb/8837db7800be||https://vulncheck.com/xdb/8837db7800be , https://vulncheck.com/xdb/b3dbbfacb8c0||https://vulncheck.com/xdb/b3dbbfacb8c0 , https://vulncheck.com/xdb/36bfe91e83c1||https://vulncheck.com/xdb/36bfe91e83c1
CVE-2016-0040 Microsoft Windows 03/28/2022 0.77926 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0040 https://vulncheck.com/xdb/58efcffaec67
CVE-2012-5076 Oracle Java SE 03/28/2022 0.92498 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-5076
CVE-2021-38646 Microsoft Office 03/28/2022 0.66195 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38646
CVE-2012-0518 Oracle Fusion Middleware 03/28/2022 0.29645 4.7 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0518
CVE-2012-2034 Adobe Flash Player 03/28/2022 0.25628 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-2034
CVE-2016-0151 Microsoft Client-Server Run-time Subsystem (CSRSS) 03/28/2022 0.59189 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0151
CVE-2018-8440 Microsoft Windows 03/28/2022 0.74331 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8440 https://vulncheck.com/xdb/88a8a72d4c40
CVE-2017-0037 Microsoft Edge and Internet Explorer 03/28/2022 0.90070 8.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0037
CVE-2016-0189 Microsoft Internet Explorer 03/28/2022 0.92196 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0189 https://vulncheck.com/xdb/eca4b462e71d||https://vulncheck.com/xdb/eca4b462e71d , https://vulncheck.com/xdb/52701635df6d||https://vulncheck.com/xdb/52701635df6d
CVE-2017-0059 Microsoft Internet Explorer 03/28/2022 0.84143 4.3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0059
CVE-2018-8405 Microsoft DirectX Graphics Kernel (DXGKRNL) 03/28/2022 0.14911 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8405
CVE-2021-34486 Microsoft Windows 03/28/2022 0.27685 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-34486 https://vulncheck.com/xdb/88847e980e21
CVE-2013-3660 Microsoft Win32k 03/28/2022 0.67944 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3660
CVE-2013-1690 Mozilla Firefox and Thunderbird 03/28/2022 0.45919 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-1690 https://vulncheck.com/xdb/7f856b52404e
CVE-2017-0213 Microsoft Windows 03/28/2022 0.91805 7.3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0213 https://vulncheck.com/xdb/dbfb297b1e06||https://vulncheck.com/xdb/dbfb297b1e06 , https://vulncheck.com/xdb/4bfbba25e06d||https://vulncheck.com/xdb/4bfbba25e06d , https://vulncheck.com/xdb/07da0b0499de||https://vulncheck.com/xdb/07da0b0499de
CVE-2013-2465 Oracle Java SE 03/28/2022 0.93220 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-2465
CVE-2012-2539 Microsoft Word 03/28/2022 0.81896 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-2539
CVE-2016-7200 Microsoft Edge 03/28/2022 0.89915 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7200 https://vulncheck.com/xdb/1d67efa0a09f
CVE-2016-7201 Microsoft Edge 03/28/2022 0.90138 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7201 https://vulncheck.com/xdb/1116771a9b9c
CVE-2015-2419 Microsoft Internet Explorer 03/28/2022 0.86087 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2419
CVE-2022-1096 Google Chromium V8 03/28/2022 0.19479 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-1096
CVE-2020-2021 Palo Alto Networks PAN-OS 03/25/2022 0.11497 10.0 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-2021
CVE-2010-4345 Exim Exim 03/25/2022 0.11704 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-4345
CVE-2016-1555 NETGEAR Wireless Access Point (WAP) Devices 03/25/2022 0.94152 9.8 https://viz.greynoise.io/tag/netgear-wireless-ap-rce-attempt||https://viz.greynoise.io/tag/netgear-wireless-ap-rce-attempt 3 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2016-1555 https://vulncheck.com/xdb/a582a601575a
CVE-2019-15107 Webmin Webmin 03/25/2022 0.94461 9.8 https://viz.greynoise.io/tag/webmin-rce-attempt||https://viz.greynoise.io/tag/webmin-rce-attempt , https://viz.greynoise.io/tag/webmin-scanner||https://viz.greynoise.io/tag/webmin-scanner 3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-15107 https://vulncheck.com/xdb/a990debb490e||https://vulncheck.com/xdb/a990debb490e , https://vulncheck.com/xdb/c4581c84425b||https://vulncheck.com/xdb/c4581c84425b , https://vulncheck.com/xdb/645d8ca04538||https://vulncheck.com/xdb/645d8ca04538 , https://vulncheck.com/xdb/346894239882||https://vulncheck.com/xdb/346894239882 , https://vulncheck.com/xdb/36f3e23cc53a||https://vulncheck.com/xdb/36f3e23cc53a , https://vulncheck.com/xdb/481f4128612d||https://vulncheck.com/xdb/481f4128612d , https://vulncheck.com/xdb/e9a6c303fcfd||https://vulncheck.com/xdb/e9a6c303fcfd , https://vulncheck.com/xdb/26ea3ae3926d||https://vulncheck.com/xdb/26ea3ae3926d , https://vulncheck.com/xdb/c6da575a25d8||https://vulncheck.com/xdb/c6da575a25d8 , https://vulncheck.com/xdb/486adc8e3e40||https://vulncheck.com/xdb/486adc8e3e40 , https://vulncheck.com/xdb/a13dbcc678b1||https://vulncheck.com/xdb/a13dbcc678b1 , https://vulncheck.com/xdb/73c54650e7c3||https://vulncheck.com/xdb/73c54650e7c3 , https://vulncheck.com/xdb/90ca878ea23a||https://vulncheck.com/xdb/90ca878ea23a , https://vulncheck.com/xdb/908f11836959||https://vulncheck.com/xdb/908f11836959 , https://vulncheck.com/xdb/50552f993bb1||https://vulncheck.com/xdb/50552f993bb1 , https://vulncheck.com/xdb/6d77d7695cd4||https://vulncheck.com/xdb/6d77d7695cd4 , https://vulncheck.com/xdb/075aff434240||https://vulncheck.com/xdb/075aff434240 , https://vulncheck.com/xdb/b745f18fe915||https://vulncheck.com/xdb/b745f18fe915 , https://vulncheck.com/xdb/bc9b78848768||https://vulncheck.com/xdb/bc9b78848768 , https://vulncheck.com/xdb/c749357d2521||https://vulncheck.com/xdb/c749357d2521 , https://vulncheck.com/xdb/bfb7ca362af4||https://vulncheck.com/xdb/bfb7ca362af4 , https://vulncheck.com/xdb/91ebdf06889e||https://vulncheck.com/xdb/91ebdf06889e , https://vulncheck.com/xdb/e5d9d10c9291||https://vulncheck.com/xdb/e5d9d10c9291 , https://vulncheck.com/xdb/660292b95806||https://vulncheck.com/xdb/660292b95806 , https://vulncheck.com/xdb/0d2cd9698102||https://vulncheck.com/xdb/0d2cd9698102 , https://vulncheck.com/xdb/8d9cadf4b346||https://vulncheck.com/xdb/8d9cadf4b346 , https://vulncheck.com/xdb/86807142d202||https://vulncheck.com/xdb/86807142d202 , https://vulncheck.com/xdb/323c8177e804||https://vulncheck.com/xdb/323c8177e804 , https://vulncheck.com/xdb/a6c954e87af6||https://vulncheck.com/xdb/a6c954e87af6 , https://vulncheck.com/xdb/4c6823870c85||https://vulncheck.com/xdb/4c6823870c85
CVE-2018-11138 Quest KACE System Management Appliance 03/25/2022 0.86833 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-11138
CVE-2020-1631 Juniper Junos OS 03/25/2022 0.05639 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1631
CVE-2009-0927 Adobe Reader and Acrobat 03/25/2022 0.93673 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-0927
CVE-2022-26318 WatchGuard Firebox and XTM Appliances 03/25/2022 0.92762 9.8 https://viz.greynoise.io/tag/watchguard-rce-attempt||https://viz.greynoise.io/tag/watchguard-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26318 https://vulncheck.com/xdb/2b6b8cb11413||https://vulncheck.com/xdb/2b6b8cb11413 , https://vulncheck.com/xdb/d1337d2a7e63||https://vulncheck.com/xdb/d1337d2a7e63 , https://vulncheck.com/xdb/1b92b4418032||https://vulncheck.com/xdb/1b92b4418032
CVE-2019-6340 Drupal Core 03/25/2022 0.94438 8.1 https://viz.greynoise.io/tag/drupal-8-remote-code-execution-attempt||https://viz.greynoise.io/tag/drupal-8-remote-code-execution-attempt , https://viz.greynoise.io/tag/drupal-cve-2019-6340-rce-attempt||https://viz.greynoise.io/tag/drupal-cve-2019-6340-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-6340 https://vulncheck.com/xdb/971bb71f8acc||https://vulncheck.com/xdb/971bb71f8acc , https://vulncheck.com/xdb/b716c66caa48||https://vulncheck.com/xdb/b716c66caa48 , https://vulncheck.com/xdb/5aa4db1c5af5||https://vulncheck.com/xdb/5aa4db1c5af5 , https://vulncheck.com/xdb/e32101bbe942||https://vulncheck.com/xdb/e32101bbe942 , https://vulncheck.com/xdb/313b5dedfaee||https://vulncheck.com/xdb/313b5dedfaee
CVE-2017-12617 Apache Tomcat 03/25/2022 0.94394 8.1 https://viz.greynoise.io/tag/apache-tomcat-webdav-webshell-rce-cve-2017-12617-attempt||https://viz.greynoise.io/tag/apache-tomcat-webdav-webshell-rce-cve-2017-12617-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12617 https://vulncheck.com/xdb/d105c8c6f54f||https://vulncheck.com/xdb/d105c8c6f54f , https://vulncheck.com/xdb/f5e54c16d591||https://vulncheck.com/xdb/f5e54c16d591 , https://vulncheck.com/xdb/4d32b8f34452||https://vulncheck.com/xdb/4d32b8f34452 , https://vulncheck.com/xdb/476468103ba2||https://vulncheck.com/xdb/476468103ba2 , https://vulncheck.com/xdb/b858a57a9e2e||https://vulncheck.com/xdb/b858a57a9e2e , https://vulncheck.com/xdb/bd768a95e919||https://vulncheck.com/xdb/bd768a95e919 , https://vulncheck.com/xdb/c42eddecf666||https://vulncheck.com/xdb/c42eddecf666 , https://vulncheck.com/xdb/8fd4c4b18c5f||https://vulncheck.com/xdb/8fd4c4b18c5f , https://vulncheck.com/xdb/0cbcf731ead7||https://vulncheck.com/xdb/0cbcf731ead7 , https://vulncheck.com/xdb/c733f0b8ba46||https://vulncheck.com/xdb/c733f0b8ba46 , https://vulncheck.com/xdb/7804de914c0c||https://vulncheck.com/xdb/7804de914c0c
CVE-2021-22941 Citrix ShareFile 03/25/2022 0.88615 9.8 https://viz.greynoise.io/tag/citrix-sharefile-improper-access-control-cve-2021-22941-attempt||https://viz.greynoise.io/tag/citrix-sharefile-improper-access-control-cve-2021-22941-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22941
CVE-2016-10174 NETGEAR WNR2000v5 Router 03/25/2022 0.91840 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-10174
CVE-2013-2251 Apache Struts 03/25/2022 0.94328 9.8 https://viz.greynoise.io/tag/struts-2-rce-cve-2013-2251||https://viz.greynoise.io/tag/struts-2-rce-cve-2013-2251 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-2251
CVE-2019-12989 Citrix SD-WAN and NetScaler 03/25/2022 0.81791 9.8 https://viz.greynoise.io/tag/citrix-sd-wan-auth-bypass-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-auth-bypass-attempt , https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-12989
CVE-2019-16920 D-Link Multiple Routers 03/25/2022 0.94343 9.8 https://viz.greynoise.io/tag/d-link-cve-2019-16920-rce-attempt||https://viz.greynoise.io/tag/d-link-cve-2019-16920-rce-attempt 3 TRUE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2019-16920 https://vulncheck.com/xdb/f05a19c8f4b4||https://vulncheck.com/xdb/f05a19c8f4b4 , https://vulncheck.com/xdb/84211543c7c0||https://vulncheck.com/xdb/84211543c7c0
CVE-2009-1151 phpMyAdmin phpMyAdmin 03/25/2022 0.93390 9.8 https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-attempt||https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-attempt , https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-check||https://viz.greynoise.io/tag/phpmyadmin-setup-php-remote-command-execution-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-1151 https://vulncheck.com/xdb/a8f294c1448e||https://vulncheck.com/xdb/a8f294c1448e , https://vulncheck.com/xdb/0633e59330f3||https://vulncheck.com/xdb/0633e59330f3
CVE-2020-9054 Zyxel Multiple Network-Attached Storage (NAS) Devices 03/25/2022 0.94265 9.8 https://viz.greynoise.io/tag/zyxel-firewall-nas-rce-attempt||https://viz.greynoise.io/tag/zyxel-firewall-nas-rce-attempt 2 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-9054 https://vulncheck.com/xdb/5c09526730f9
CVE-2020-5410 VMware Tanzu Spring Cloud Configuration (Config) Server 03/25/2022 0.94305 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-5410 https://vulncheck.com/xdb/6eac00f6b406||https://vulncheck.com/xdb/6eac00f6b406 , https://vulncheck.com/xdb/e1abb7641447||https://vulncheck.com/xdb/e1abb7641447
CVE-2014-6287 Rejetto HTTP File Server (HFS) 03/25/2022 0.94327 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-6287 https://vulncheck.com/xdb/7e75a52fb2c4||https://vulncheck.com/xdb/7e75a52fb2c4 , https://vulncheck.com/xdb/d3f707772d31||https://vulncheck.com/xdb/d3f707772d31 , https://vulncheck.com/xdb/87218ce82812||https://vulncheck.com/xdb/87218ce82812 , https://vulncheck.com/xdb/561648cf3450||https://vulncheck.com/xdb/561648cf3450 , https://vulncheck.com/xdb/ac9a55de5631||https://vulncheck.com/xdb/ac9a55de5631 , https://vulncheck.com/xdb/95b99733114b||https://vulncheck.com/xdb/95b99733114b , https://vulncheck.com/xdb/5a7c8f3319f2||https://vulncheck.com/xdb/5a7c8f3319f2 , https://vulncheck.com/xdb/ab1b8c027b00||https://vulncheck.com/xdb/ab1b8c027b00
CVE-2022-26143 Mitel MiCollab, MiVoice Business Express 03/25/2022 0.64770 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26143
CVE-2015-0666 Cisco Prime Data Center Network Manager (DCNM) 03/25/2022 0.71752 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-0666
CVE-2018-8373 Microsoft Internet Explorer Scripting Engine 03/25/2022 0.73833 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8373
CVE-2019-0903 Microsoft Graphics Device Interface (GDI) 03/25/2022 0.50678 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0903
CVE-2017-6316 Citrix NetScaler SD-WAN Enterprise, CloudBridge Virtual WAN, and XenMobile Server 03/25/2022 0.88432 9.8 https://viz.greynoise.io/tag/citrix-netscaler-command-injection-cve-2017-6316-attempt||https://viz.greynoise.io/tag/citrix-netscaler-command-injection-cve-2017-6316-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6316
CVE-2009-2055 Cisco IOS XR 03/25/2022 0.01238 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-2055
CVE-2016-0752 Rails Ruby on Rails 03/25/2022 0.92598 7.5 https://viz.greynoise.io/tag/ruby-on-rails-dynamic-render-rce-attempt||https://viz.greynoise.io/tag/ruby-on-rails-dynamic-render-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0752
CVE-2018-0125 Cisco VPN Routers 03/25/2022 0.73093 9.8 https://viz.greynoise.io/tag/cisco-rv132w-134w-password-disclosure-attempt||https://viz.greynoise.io/tag/cisco-rv132w-134w-password-disclosure-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0125
CVE-2019-11043 PHP FastCGI Process Manager (FPM) 03/25/2022 0.94105 8.7 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11043 https://vulncheck.com/xdb/ce4ae09a0ce3||https://vulncheck.com/xdb/ce4ae09a0ce3 , https://vulncheck.com/xdb/3b95194461e6||https://vulncheck.com/xdb/3b95194461e6 , https://vulncheck.com/xdb/9493124c9054||https://vulncheck.com/xdb/9493124c9054 , https://vulncheck.com/xdb/5fa11c5956d1||https://vulncheck.com/xdb/5fa11c5956d1 , https://vulncheck.com/xdb/1de02e031a87||https://vulncheck.com/xdb/1de02e031a87 , https://vulncheck.com/xdb/7661c1eea5ee||https://vulncheck.com/xdb/7661c1eea5ee , https://vulncheck.com/xdb/b77e1a4b74e5||https://vulncheck.com/xdb/b77e1a4b74e5 , https://vulncheck.com/xdb/71b7cfe27514||https://vulncheck.com/xdb/71b7cfe27514 , https://vulncheck.com/xdb/5d7564d7c174||https://vulncheck.com/xdb/5d7564d7c174 , https://vulncheck.com/xdb/3430044ed268||https://vulncheck.com/xdb/3430044ed268 , https://vulncheck.com/xdb/51adef4c9756||https://vulncheck.com/xdb/51adef4c9756 , https://vulncheck.com/xdb/91fc59b00456||https://vulncheck.com/xdb/91fc59b00456 , https://vulncheck.com/xdb/095460149708||https://vulncheck.com/xdb/095460149708 , https://vulncheck.com/xdb/78cf4dd16e8c||https://vulncheck.com/xdb/78cf4dd16e8c , https://vulncheck.com/xdb/20a6f27a3edd||https://vulncheck.com/xdb/20a6f27a3edd , https://vulncheck.com/xdb/17d9321b8fd7||https://vulncheck.com/xdb/17d9321b8fd7
CVE-2020-25223 Sophos SG UTM 03/25/2022 0.94415 9.8 https://viz.greynoise.io/tag/sophos-sg-utm-remote-code-execution-attempt||https://viz.greynoise.io/tag/sophos-sg-utm-remote-code-execution-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-25223 https://vulncheck.com/xdb/5519d3775225
CVE-2016-4171 Adobe Flash Player 03/25/2022 0.26006 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4171
CVE-2019-12991 Citrix SD-WAN and NetScaler 03/25/2022 0.86370 8.8 https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt||https://viz.greynoise.io/tag/citrix-sd-wan-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-12991
CVE-2010-2861 Adobe ColdFusion 03/25/2022 0.94299 9.8 https://viz.greynoise.io/tag/adobe-coldfusion-lfi-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-lfi-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-2861
CVE-2015-3035 TP-Link Multiple Archer Devices 03/25/2022 0.93178 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-3035
CVE-2019-2616 Oracle BI Publisher (Formerly XML Publisher) 03/25/2022 0.94361 7.2 https://viz.greynoise.io/tag/oracle-business-intelligence-and-xml-publisher-xxe-attempt||https://viz.greynoise.io/tag/oracle-business-intelligence-and-xml-publisher-xxe-attempt 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-2616
CVE-2021-42237 Sitecore XP 03/25/2022 0.94374 9.8 https://viz.greynoise.io/tag/sitecore-rce-attempt||https://viz.greynoise.io/tag/sitecore-rce-attempt , https://viz.greynoise.io/tag/sitecore-rce-check||https://viz.greynoise.io/tag/sitecore-rce-check 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42237 https://vulncheck.com/xdb/22ffe954e444||https://vulncheck.com/xdb/22ffe954e444 , https://vulncheck.com/xdb/5a60cedb515f||https://vulncheck.com/xdb/5a60cedb515f
CVE-2012-1823 PHP PHP 03/25/2022 0.94386 9.8 https://viz.greynoise.io/tag/php-cgi-remote-code-execution-attempt||https://viz.greynoise.io/tag/php-cgi-remote-code-execution-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1823 https://vulncheck.com/xdb/67d4003e8705||https://vulncheck.com/xdb/67d4003e8705 , https://vulncheck.com/xdb/bc79679e68c9||https://vulncheck.com/xdb/bc79679e68c9
CVE-2018-1273 VMware Tanzu Spring Data Commons 03/25/2022 0.94208 9.8 https://viz.greynoise.io/tag/spring-data-commons-rce-attempt||https://viz.greynoise.io/tag/spring-data-commons-rce-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-1273 https://vulncheck.com/xdb/d764935a0636||https://vulncheck.com/xdb/d764935a0636 , https://vulncheck.com/xdb/9406cebce0df||https://vulncheck.com/xdb/9406cebce0df , https://vulncheck.com/xdb/7813a73559db||https://vulncheck.com/xdb/7813a73559db
CVE-2020-2506 QNAP Systems Helpdesk 03/25/2022 0.29202 7.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-2506
CVE-2018-14839 LG N1A1 NAS 03/25/2022 0.91511 9.8 3 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2018-14839
CVE-2020-1956 Apache Kylin 03/25/2022 0.93749 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1956 https://vulncheck.com/xdb/b9bdde208ba1
CVE-2014-0130 Rails Ruby on Rails 03/25/2022 0.36438 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0130
CVE-2022-21999 Microsoft Windows 03/25/2022 0.69042 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-21999 https://vulncheck.com/xdb/609ca9e59da3
CVE-2014-6324 Microsoft Kerberos Key Distribution Center (KDC) 03/25/2022 0.89299 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-6324
CVE-2017-6334 NETGEAR DGN2200 Devices 03/25/2022 0.91073 8.8 https://viz.greynoise.io/tag/netgear-dgn2200-dnslookup-rce-attempt||https://viz.greynoise.io/tag/netgear-dgn2200-dnslookup-rce-attempt 0 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2017-6334
CVE-2005-2773 Hewlett Packard (HP) OpenView Network Node Manager 03/25/2022 0.91070 9.8 https://viz.greynoise.io/tag/hp-openview-network-manager-rce-attempt||https://viz.greynoise.io/tag/hp-openview-network-manager-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2005-2773
CVE-2017-0146 Microsoft Windows 03/25/2022 0.93882 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0146
CVE-2016-7892 Adobe Flash Player 03/25/2022 0.18919 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7892
CVE-2013-5223 D-Link DSL-2760U 03/25/2022 0.35461 5.4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-5223
CVE-2018-6961 VMware SD-WAN Edge 03/25/2022 0.92029 8.1 https://viz.greynoise.io/tag/vmware-sd-wan-rce-attempt||https://viz.greynoise.io/tag/vmware-sd-wan-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-6961 https://vulncheck.com/xdb/f3adc82ac1f7||https://vulncheck.com/xdb/f3adc82ac1f7 , https://vulncheck.com/xdb/eeb1766c5086||https://vulncheck.com/xdb/eeb1766c5086
CVE-2015-1427 Elastic Elasticsearch 03/25/2022 0.93773 9.8 https://viz.greynoise.io/tag/elasticsearch-rce-attempt||https://viz.greynoise.io/tag/elasticsearch-rce-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1427 https://vulncheck.com/xdb/3dcf28bea839||https://vulncheck.com/xdb/3dcf28bea839 , https://vulncheck.com/xdb/7c460955b63d||https://vulncheck.com/xdb/7c460955b63d
CVE-2019-10068 Kentico Xperience 03/25/2022 0.94068 9.8 https://viz.greynoise.io/tag/kentico-cms-remote-code-execution-attempt||https://viz.greynoise.io/tag/kentico-cms-remote-code-execution-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-10068
CVE-2014-6332 Microsoft Windows 03/25/2022 0.94069 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-6332
CVE-2010-3035 Cisco IOS XR 03/25/2022 0.05752 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-3035
CVE-2015-1187 D-Link and TRENDnet Multiple Devices 03/25/2022 0.78160 9.8 https://viz.greynoise.io/tag/d-link-ncc-command-injection-attempt||https://viz.greynoise.io/tag/d-link-ncc-command-injection-attempt 0 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2015-1187
CVE-2010-4344 Exim Exim 03/25/2022 0.57471 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-4344
CVE-2017-12615 Apache Tomcat 03/25/2022 0.94360 8.1 https://viz.greynoise.io/tag/tomcat-backdoor-use-cve-2017-12615-attempt||https://viz.greynoise.io/tag/tomcat-backdoor-use-cve-2017-12615-attempt , https://viz.greynoise.io/tag/tomcat-backdoor-upload-cve-2017-12615-attempt||https://viz.greynoise.io/tag/tomcat-backdoor-upload-cve-2017-12615-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12615 https://vulncheck.com/xdb/814d0fdfdaf9||https://vulncheck.com/xdb/814d0fdfdaf9 , https://vulncheck.com/xdb/08d6bfd35adc||https://vulncheck.com/xdb/08d6bfd35adc , https://vulncheck.com/xdb/1f8fb8c68353||https://vulncheck.com/xdb/1f8fb8c68353 , https://vulncheck.com/xdb/8d7305eb7051||https://vulncheck.com/xdb/8d7305eb7051 , https://vulncheck.com/xdb/70d9deaae392||https://vulncheck.com/xdb/70d9deaae392 , https://vulncheck.com/xdb/5a1624c6df1b||https://vulncheck.com/xdb/5a1624c6df1b , https://vulncheck.com/xdb/fbbcc0b93b98||https://vulncheck.com/xdb/fbbcc0b93b98 , https://vulncheck.com/xdb/6889df0c7813||https://vulncheck.com/xdb/6889df0c7813
CVE-2018-0147 Cisco Secure Access Control System (ACS) 03/25/2022 0.19921 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0147
CVE-2013-4810 Hewlett Packard (HP) ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management 03/25/2022 0.87275 9.8 https://viz.greynoise.io/tag/jboss-rce-attempt||https://viz.greynoise.io/tag/jboss-rce-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-4810
CVE-2019-1003030 Jenkins Matrix Project Plugin 03/25/2022 0.92834 9.9 https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt||https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1003030 https://vulncheck.com/xdb/81d54204d708
CVE-2020-9377 D-Link DIR-610 Devices 03/25/2022 0.78450 8.8 0 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-9377
CVE-2018-8414 Microsoft Windows 03/25/2022 0.88510 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8414 https://vulncheck.com/xdb/275a9314d8be
CVE-2014-3120 Elastic Elasticsearch 03/25/2022 0.79814 8.1 https://viz.greynoise.io/tag/elasticsearch-rce-attempt||https://viz.greynoise.io/tag/elasticsearch-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-3120 https://vulncheck.com/xdb/d53ab847ab08||https://vulncheck.com/xdb/d53ab847ab08 , https://vulncheck.com/xdb/3bd602f1502c||https://vulncheck.com/xdb/3bd602f1502c
CVE-2015-4068 Arcserve Unified Data Protection (UDP) 03/25/2022 0.83197 9.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-4068
CVE-2016-11021 D-Link DCS-930L Devices 03/25/2022 0.90446 7.2 https://viz.greynoise.io/tag/d-link-dcs-930l-rce-attempt||https://viz.greynoise.io/tag/d-link-dcs-930l-rce-attempt 0 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2016-11021
CVE-2017-3881 Cisco IOS and IOS XE 03/25/2022 0.94083 9.8 https://viz.greynoise.io/tag/cisco-ios-cluster-management-protocol-cve-2017-3881-attempt||https://viz.greynoise.io/tag/cisco-ios-cluster-management-protocol-cve-2017-3881-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-3881 https://vulncheck.com/xdb/9ace50346f8d||https://vulncheck.com/xdb/9ace50346f8d , https://vulncheck.com/xdb/2f0df2465dbf||https://vulncheck.com/xdb/2f0df2465dbf , https://vulncheck.com/xdb/ff56c466c983||https://vulncheck.com/xdb/ff56c466c983 , https://vulncheck.com/xdb/7e17d20488ba||https://vulncheck.com/xdb/7e17d20488ba , https://vulncheck.com/xdb/793e00067c6b||https://vulncheck.com/xdb/793e00067c6b
CVE-2020-7247 OpenBSD OpenSMTPD 03/25/2022 0.94073 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-7247 https://vulncheck.com/xdb/47eec17beab4||https://vulncheck.com/xdb/47eec17beab4 , https://vulncheck.com/xdb/dfc825b4e351||https://vulncheck.com/xdb/dfc825b4e351 , https://vulncheck.com/xdb/bf9da7b38b61||https://vulncheck.com/xdb/bf9da7b38b61 , https://vulncheck.com/xdb/e74dfea19420||https://vulncheck.com/xdb/e74dfea19420 , https://vulncheck.com/xdb/15de84180d62||https://vulncheck.com/xdb/15de84180d62 , https://vulncheck.com/xdb/bb8cd406d461||https://vulncheck.com/xdb/bb8cd406d461 , https://vulncheck.com/xdb/84f50ceb9674||https://vulncheck.com/xdb/84f50ceb9674 , https://vulncheck.com/xdb/aaf43d820afe||https://vulncheck.com/xdb/aaf43d820afe
CVE-2019-1322 Microsoft Windows 03/15/2022 0.38187 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1322 https://vulncheck.com/xdb/c150d99e80b3
CVE-2018-8120 Microsoft Win32k 03/15/2022 0.94149 7.0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8120 https://vulncheck.com/xdb/ca4b6aa025dc||https://vulncheck.com/xdb/ca4b6aa025dc , https://vulncheck.com/xdb/f2178e73bf7f||https://vulncheck.com/xdb/f2178e73bf7f , https://vulncheck.com/xdb/068cb0753a02||https://vulncheck.com/xdb/068cb0753a02 , https://vulncheck.com/xdb/744e1fb3b1f7||https://vulncheck.com/xdb/744e1fb3b1f7 , https://vulncheck.com/xdb/5882ac72e8c6||https://vulncheck.com/xdb/5882ac72e8c6 , https://vulncheck.com/xdb/48d436ff8d49||https://vulncheck.com/xdb/48d436ff8d49 , https://vulncheck.com/xdb/34760786116d||https://vulncheck.com/xdb/34760786116d , https://vulncheck.com/xdb/01f9d12f366f||https://vulncheck.com/xdb/01f9d12f366f
CVE-2017-0101 Microsoft Windows 03/15/2022 0.61930 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0101 https://vulncheck.com/xdb/d56031625002
CVE-2019-1129 Microsoft Windows 03/15/2022 0.08868 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1129
CVE-2019-0543 Microsoft Windows 03/15/2022 0.03524 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0543
CVE-2019-1064 Microsoft Windows 03/15/2022 0.15538 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1064 https://vulncheck.com/xdb/fc46b3dba1ae||https://vulncheck.com/xdb/fc46b3dba1ae , https://vulncheck.com/xdb/63dee87b89a7||https://vulncheck.com/xdb/63dee87b89a7 , https://vulncheck.com/xdb/2606dfc2804f||https://vulncheck.com/xdb/2606dfc2804f
CVE-2015-2546 Microsoft Win32k 03/15/2022 0.37248 8.2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2546 https://vulncheck.com/xdb/b8a752f0f633||https://vulncheck.com/xdb/b8a752f0f633 , https://vulncheck.com/xdb/529df0e03a85||https://vulncheck.com/xdb/529df0e03a85
CVE-2019-0841 Microsoft Windows 03/15/2022 0.86081 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0841 https://vulncheck.com/xdb/e4ad3aaee5dd
CVE-2019-1253 Microsoft Windows 03/15/2022 0.19565 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1253 https://vulncheck.com/xdb/cc8bc5f73283||https://vulncheck.com/xdb/cc8bc5f73283 , https://vulncheck.com/xdb/8413d1b8bafe||https://vulncheck.com/xdb/8413d1b8bafe , https://vulncheck.com/xdb/be673a8a105e||https://vulncheck.com/xdb/be673a8a105e
CVE-2016-3309 Microsoft Windows 03/15/2022 0.47724 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3309 https://vulncheck.com/xdb/faa8734c5358
CVE-2019-1069 Microsoft Task Scheduler 03/15/2022 0.31692 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1069
CVE-2019-1315 Microsoft Windows 03/15/2022 0.06219 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1315
CVE-2019-1132 Microsoft Win32k 03/15/2022 0.29255 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1132 https://vulncheck.com/xdb/082c37327649||https://vulncheck.com/xdb/082c37327649 , https://vulncheck.com/xdb/ba437fb9f5df||https://vulncheck.com/xdb/ba437fb9f5df , https://vulncheck.com/xdb/4425b42bd367||https://vulncheck.com/xdb/4425b42bd367
CVE-2019-1405 Microsoft Windows 03/15/2022 0.59969 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1405 https://vulncheck.com/xdb/927583cfabe6
CVE-2020-5135 SonicWall SonicOS 03/15/2022 0.49503 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-5135
CVE-2013-0629 Adobe ColdFusion 03/07/2022 0.80964 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0629
CVE-2022-26486 Mozilla Firefox 03/07/2022 0.01240 9.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26486
CVE-2020-8218 Pulse Secure Pulse Connect Secure 03/07/2022 0.91071 7.2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8218 https://vulncheck.com/xdb/5617ca2523fa
CVE-2019-11581 Atlassian Jira Server and Data Center 03/07/2022 0.94377 9.8 https://viz.greynoise.io/tag/jira-scanner||https://viz.greynoise.io/tag/jira-scanner 3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11581 https://vulncheck.com/xdb/70249cb58be5||https://vulncheck.com/xdb/70249cb58be5 , https://vulncheck.com/xdb/550a7fd360d0||https://vulncheck.com/xdb/550a7fd360d0 , https://vulncheck.com/xdb/525e274bc1e4||https://vulncheck.com/xdb/525e274bc1e4 , https://vulncheck.com/xdb/2065a52f9faa||https://vulncheck.com/xdb/2065a52f9faa
CVE-2021-21973 VMware vCenter Server and Cloud Foundation 03/07/2022 0.89919 5.3 https://viz.greynoise.io/tag/vmware-vcenter-cve-2021-21973-ssrf-attempt||https://viz.greynoise.io/tag/vmware-vcenter-cve-2021-21973-ssrf-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21973 https://vulncheck.com/xdb/81cfa5eed191
CVE-2013-0625 Adobe ColdFusion 03/07/2022 0.86560 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0625
CVE-2017-6077 NETGEAR Wireless Router DGN2200 03/07/2022 0.89761 9.8 https://viz.greynoise.io/tag/netgear-dgn2200-ping-rce-attempt||https://viz.greynoise.io/tag/netgear-dgn2200-ping-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6077
CVE-2009-3960 Adobe BlazeDS 03/07/2022 0.89585 6.5 https://viz.greynoise.io/tag/adobe-xml-external-entity-injection-attempt||https://viz.greynoise.io/tag/adobe-xml-external-entity-injection-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-3960
CVE-2016-6277 NETGEAR Multiple Routers 03/07/2022 0.94328 8.8 https://viz.greynoise.io/tag/netgear-command-injection-attempt||https://viz.greynoise.io/tag/netgear-command-injection-attempt 72 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2016-6277
CVE-2013-0631 Adobe ColdFusion 03/07/2022 0.78752 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0631
CVE-2022-26485 Mozilla Firefox 03/07/2022 0.04450 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-26485 https://vulncheck.com/xdb/23f11992b642
CVE-2015-3043 Adobe Flash Player 03/03/2022 0.85155 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-3043
CVE-2018-0159 Cisco IOS Software and Cisco IOS XE Software 03/03/2022 0.06176 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0159
CVE-2011-3544 Oracle Java SE JDK and JRE 03/03/2022 0.93005 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-3544
CVE-2017-12319 Cisco IOS XE Software 03/03/2022 0.01269 5.9 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12319
CVE-2010-0232 Microsoft Windows 03/03/2022 0.73257 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-0232 https://vulncheck.com/xdb/74da309f4d8d
CVE-2017-0001 Microsoft Graphics Device Interface (GDI) 03/03/2022 0.12861 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0001
CVE-2015-1642 Microsoft Office 03/03/2022 0.64711 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1642
CVE-2018-0158 Cisco IOS Software and Cisco IOS XE Software 03/03/2022 0.15930 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0158
CVE-2018-0155 Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches 03/03/2022 0.15317 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0155
CVE-2017-12240 Cisco IOS and IOS XE Software 03/03/2022 0.19962 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12240
CVE-2018-0156 Cisco IOS Software and Cisco IOS XE Software 03/03/2022 0.16461 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0156
CVE-2017-6738 Cisco IOS and IOS XE Software 03/03/2022 0.08509 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6738
CVE-2017-6740 Cisco IOS and IOS XE Software 03/03/2022 0.13038 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6740
CVE-2016-8562 Siemens SIMATIC CP 03/03/2022 0.14581 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-8562
CVE-2017-6744 Cisco IOS software 03/03/2022 0.12939 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6744
CVE-2015-4902 Oracle Java SE 03/03/2022 0.06707 5.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-4902
CVE-2018-0154 Cisco IOS Software 03/03/2022 0.10850 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0154
CVE-2018-0151 Cisco IOS and IOS XE Software 03/03/2022 0.09812 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0151
CVE-2018-0172 Cisco IOS and IOS XE Software 03/03/2022 0.05957 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0172
CVE-2020-1938 Apache Tomcat 03/03/2022 0.94469 9.8 https://viz.greynoise.io/tag/ghostcat-scanner||https://viz.greynoise.io/tag/ghostcat-scanner FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1938 https://vulncheck.com/xdb/e20dc1f808b8||https://vulncheck.com/xdb/e20dc1f808b8 , https://vulncheck.com/xdb/88a7c7ad43aa||https://vulncheck.com/xdb/88a7c7ad43aa , https://vulncheck.com/xdb/5af6d84a4f6d||https://vulncheck.com/xdb/5af6d84a4f6d , https://vulncheck.com/xdb/d5a0b7acb17c||https://vulncheck.com/xdb/d5a0b7acb17c , https://vulncheck.com/xdb/3ae53715fb1d||https://vulncheck.com/xdb/3ae53715fb1d , https://vulncheck.com/xdb/3d964bdfa9c1||https://vulncheck.com/xdb/3d964bdfa9c1 , https://vulncheck.com/xdb/12e3fe9de5f4||https://vulncheck.com/xdb/12e3fe9de5f4 , https://vulncheck.com/xdb/fa4d894fa7ee||https://vulncheck.com/xdb/fa4d894fa7ee , https://vulncheck.com/xdb/b2fb8d964e13||https://vulncheck.com/xdb/b2fb8d964e13 , https://vulncheck.com/xdb/bfdfc9be53fb||https://vulncheck.com/xdb/bfdfc9be53fb , https://vulncheck.com/xdb/8d0f432c9695||https://vulncheck.com/xdb/8d0f432c9695 , https://vulncheck.com/xdb/55578bb704d8||https://vulncheck.com/xdb/55578bb704d8 , https://vulncheck.com/xdb/95c0929acd12||https://vulncheck.com/xdb/95c0929acd12 , https://vulncheck.com/xdb/7e97ae83b853||https://vulncheck.com/xdb/7e97ae83b853 , https://vulncheck.com/xdb/556229dec09a||https://vulncheck.com/xdb/556229dec09a , https://vulncheck.com/xdb/f69eb1a05f7d||https://vulncheck.com/xdb/f69eb1a05f7d , https://vulncheck.com/xdb/d0c6a25f782c||https://vulncheck.com/xdb/d0c6a25f782c , https://vulncheck.com/xdb/6c2db5dec526||https://vulncheck.com/xdb/6c2db5dec526 , https://vulncheck.com/xdb/396912473adb||https://vulncheck.com/xdb/396912473adb , https://vulncheck.com/xdb/2b72da94f9cb||https://vulncheck.com/xdb/2b72da94f9cb , https://vulncheck.com/xdb/f17ae55010e2||https://vulncheck.com/xdb/f17ae55010e2 , https://vulncheck.com/xdb/0abdb0ef5835||https://vulncheck.com/xdb/0abdb0ef5835
CVE-2008-3431 Oracle VirtualBox 03/03/2022 0.04798 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2008-3431
CVE-2012-1723 Oracle Java SE 03/03/2022 0.94083 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1723 https://vulncheck.com/xdb/83ff19c4dc8c
CVE-2022-20699 Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers 03/03/2022 0.89924 10.0 https://viz.greynoise.io/tag/cisco-rv-router-rce-attempt||https://viz.greynoise.io/tag/cisco-rv-router-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20699 https://vulncheck.com/xdb/dc5a39831d19||https://vulncheck.com/xdb/dc5a39831d19 , https://vulncheck.com/xdb/768c813deaad||https://vulncheck.com/xdb/768c813deaad , https://vulncheck.com/xdb/7acf52ba8e46||https://vulncheck.com/xdb/7acf52ba8e46 , https://vulncheck.com/xdb/8bf31770e81a||https://vulncheck.com/xdb/8bf31770e81a
CVE-2010-3333 Microsoft Office 03/03/2022 0.93964 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-3333 https://vulncheck.com/xdb/b335e249d55f
CVE-2013-0632 Adobe ColdFusion 03/03/2022 0.92249 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0632
CVE-2016-1019 Adobe Flash Player 03/03/2022 0.80878 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-1019
CVE-2019-1652 Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers 03/03/2022 0.89207 7.2 https://viz.greynoise.io/tag/cisco-rv320-authenticated-rce-cve-2019-1652-attempt||https://viz.greynoise.io/tag/cisco-rv320-authenticated-rce-cve-2019-1652-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1652 https://vulncheck.com/xdb/06e9512e7e39
CVE-2017-6736 Cisco IOS and IOS XE Software 03/03/2022 0.86397 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6736
CVE-2022-20708 Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers 03/03/2022 0.18023 10.0 https://viz.greynoise.io/tag/cisco-small-business-rv-series-router-rce-cve-2022-20708-attempt||https://viz.greynoise.io/tag/cisco-small-business-rv-series-router-rce-cve-2022-20708-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20708
CVE-2019-16928 Exim Exim Internet Mailer 03/03/2022 0.88588 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-16928
CVE-2014-4114 Microsoft Windows 03/03/2022 0.92188 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4114
CVE-2018-8581 Microsoft Exchange Server 03/03/2022 0.90830 7.4 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8581 https://vulncheck.com/xdb/d7f23b749ff9||https://vulncheck.com/xdb/d7f23b749ff9 , https://vulncheck.com/xdb/7730cd30a582||https://vulncheck.com/xdb/7730cd30a582 , https://vulncheck.com/xdb/dba145cf3cba||https://vulncheck.com/xdb/dba145cf3cba , https://vulncheck.com/xdb/3d3434d62f82||https://vulncheck.com/xdb/3d3434d62f82 , https://vulncheck.com/xdb/276c34c7f74f||https://vulncheck.com/xdb/276c34c7f74f
CVE-2018-0161 Cisco IOS Software 03/03/2022 0.02517 6.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0161
CVE-2017-11292 Adobe Flash Player 03/03/2022 0.10801 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-11292
CVE-2017-12235 Cisco IOS software 03/03/2022 0.07628 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12235
CVE-2013-0641 Adobe Reader 03/03/2022 0.89391 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0641
CVE-2017-12233 Cisco IOS software 03/03/2022 0.10011 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12233
CVE-2017-12231 Cisco IOS software 03/03/2022 0.10850 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12231
CVE-2015-7645 Adobe Flash Player 03/03/2022 0.84843 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-7645
CVE-2020-11899 Treck TCP/IP stack IPv6 03/03/2022 0.40204 5.4 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11899
CVE-2017-6743 Cisco IOS and IOS XE Software 03/03/2022 0.09066 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6743
CVE-2016-7855 Adobe Flash Player 03/03/2022 0.38931 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7855
CVE-2016-5195 Linux Kernel 03/03/2022 0.94181 7.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-5195 https://vulncheck.com/xdb/6b7028face39||https://vulncheck.com/xdb/6b7028face39 , https://vulncheck.com/xdb/a87c371b3f3f||https://vulncheck.com/xdb/a87c371b3f3f , https://vulncheck.com/xdb/91934bafa64f||https://vulncheck.com/xdb/91934bafa64f , https://vulncheck.com/xdb/72416db5c445||https://vulncheck.com/xdb/72416db5c445 , https://vulncheck.com/xdb/3259770b0ff4||https://vulncheck.com/xdb/3259770b0ff4 , https://vulncheck.com/xdb/9fe4e31741bf||https://vulncheck.com/xdb/9fe4e31741bf , https://vulncheck.com/xdb/bbc108f0e2d3||https://vulncheck.com/xdb/bbc108f0e2d3 , https://vulncheck.com/xdb/26759f64e421||https://vulncheck.com/xdb/26759f64e421 , https://vulncheck.com/xdb/9125928f7603||https://vulncheck.com/xdb/9125928f7603 , https://vulncheck.com/xdb/2f99e74166ae||https://vulncheck.com/xdb/2f99e74166ae , https://vulncheck.com/xdb/770693b60910||https://vulncheck.com/xdb/770693b60910 , https://vulncheck.com/xdb/cecbca9ee49f||https://vulncheck.com/xdb/cecbca9ee49f , https://vulncheck.com/xdb/26aa72694109||https://vulncheck.com/xdb/26aa72694109 , https://vulncheck.com/xdb/f2204b41dd21||https://vulncheck.com/xdb/f2204b41dd21 , https://vulncheck.com/xdb/d1c17c081d03||https://vulncheck.com/xdb/d1c17c081d03 , https://vulncheck.com/xdb/3c59fbbe4941||https://vulncheck.com/xdb/3c59fbbe4941 , https://vulncheck.com/xdb/25a7d419158e||https://vulncheck.com/xdb/25a7d419158e , https://vulncheck.com/xdb/18b29d667585||https://vulncheck.com/xdb/18b29d667585 , https://vulncheck.com/xdb/01d749b64ad1||https://vulncheck.com/xdb/01d749b64ad1 , https://vulncheck.com/xdb/277a1d4bf8a2||https://vulncheck.com/xdb/277a1d4bf8a2 , https://vulncheck.com/xdb/8caaebd2c120||https://vulncheck.com/xdb/8caaebd2c120 , https://vulncheck.com/xdb/77f940bbe0a4||https://vulncheck.com/xdb/77f940bbe0a4 , https://vulncheck.com/xdb/4d43856ec877||https://vulncheck.com/xdb/4d43856ec877 , https://vulncheck.com/xdb/b05a18448174||https://vulncheck.com/xdb/b05a18448174 , https://vulncheck.com/xdb/0eca479a0f12||https://vulncheck.com/xdb/0eca479a0f12 , https://vulncheck.com/xdb/421bc3afa1a0||https://vulncheck.com/xdb/421bc3afa1a0 , https://vulncheck.com/xdb/10e422584e38||https://vulncheck.com/xdb/10e422584e38 , https://vulncheck.com/xdb/a84cc3ab3f48||https://vulncheck.com/xdb/a84cc3ab3f48 , https://vulncheck.com/xdb/c702394e39a9||https://vulncheck.com/xdb/c702394e39a9 , https://vulncheck.com/xdb/db0cfa39ee2e||https://vulncheck.com/xdb/db0cfa39ee2e , https://vulncheck.com/xdb/4275f34a5224||https://vulncheck.com/xdb/4275f34a5224 , https://vulncheck.com/xdb/56a0d9175e82||https://vulncheck.com/xdb/56a0d9175e82 , https://vulncheck.com/xdb/9ab30651140c||https://vulncheck.com/xdb/9ab30651140c , https://vulncheck.com/xdb/a73a45d1e2d2||https://vulncheck.com/xdb/a73a45d1e2d2 , https://vulncheck.com/xdb/31a0aa69cf4c||https://vulncheck.com/xdb/31a0aa69cf4c , https://vulncheck.com/xdb/5c3c3322474d||https://vulncheck.com/xdb/5c3c3322474d , https://vulncheck.com/xdb/94c11c970613||https://vulncheck.com/xdb/94c11c970613 , https://vulncheck.com/xdb/b81caecd21a0||https://vulncheck.com/xdb/b81caecd21a0 , https://vulncheck.com/xdb/52f1724c803a||https://vulncheck.com/xdb/52f1724c803a , https://vulncheck.com/xdb/bbdb7a7979da||https://vulncheck.com/xdb/bbdb7a7979da
CVE-2018-0180 Cisco IOS Software 03/03/2022 0.02047 5.9 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0180
CVE-2017-12238 Cisco Catalyst 6800 Series Switches 03/03/2022 0.00216 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12238
CVE-2015-1701 Microsoft Win32k 03/03/2022 0.90769 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1701 https://vulncheck.com/xdb/eb4a799b8329||https://vulncheck.com/xdb/eb4a799b8329 , https://vulncheck.com/xdb/ee1abcca5405||https://vulncheck.com/xdb/ee1abcca5405 , https://vulncheck.com/xdb/6505b117b7db||https://vulncheck.com/xdb/6505b117b7db
CVE-2015-2424 Microsoft PowerPoint 03/03/2022 0.68248 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2424
CVE-2017-6737 Cisco IOS and IOS XE Software 03/03/2022 0.08509 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6737
CVE-2017-6739 Cisco IOS and IOS XE Software 03/03/2022 0.08509 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6739
CVE-2012-4681 Oracle Java SE 03/03/2022 0.94140 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-4681 https://vulncheck.com/xdb/488e09b7437c||https://vulncheck.com/xdb/488e09b7437c , https://vulncheck.com/xdb/b7ad75c598ae||https://vulncheck.com/xdb/b7ad75c598ae
CVE-2013-3346 Adobe Reader and Acrobat 03/03/2022 0.89499 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3346
CVE-2009-1123 Microsoft Windows 03/03/2022 0.04402 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-1123
CVE-2022-20701 Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers 03/03/2022 0.05630 10.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20701
CVE-2004-0210 Microsoft Windows 03/03/2022 0.06330 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2004-0210
CVE-2015-2387 Microsoft ATM Font Driver 03/03/2022 0.30009 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2387 https://vulncheck.com/xdb/eae6da526a3c
CVE-2002-0367 Microsoft Windows 03/03/2022 0.01396 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2002-0367
CVE-2010-0188 Adobe Reader and Acrobat 03/03/2022 0.92469 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-0188
CVE-2022-20700 Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers 03/03/2022 0.38098 10.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20700
CVE-2019-1297 Microsoft Excel 03/03/2022 0.56776 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1297
CVE-2008-2992 Adobe Acrobat and Reader 03/03/2022 0.93377 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2008-2992
CVE-2021-41379 Microsoft Windows 03/03/2022 0.04764 5.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-41379 https://vulncheck.com/xdb/7fc0e1d60191
CVE-2009-3129 Microsoft Excel 03/03/2022 0.89010 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2009-3129
CVE-2014-0496 Adobe Reader and Acrobat 03/03/2022 0.71650 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-0496
CVE-2012-1856 Microsoft Office 03/03/2022 0.92441 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1856
CVE-2018-0167 Cisco IOS, XR, and XE Software 03/03/2022 0.01893 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0167
CVE-2011-0611 Adobe Flash Player 03/03/2022 0.93047 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-0611
CVE-2017-8540 Microsoft Malware Protection Engine 03/03/2022 0.88632 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8540
CVE-2013-3897 Microsoft Internet Explorer 03/03/2022 0.88790 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3897
CVE-2017-12232 Cisco IOS software 03/03/2022 0.01583 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12232
CVE-2018-0179 Cisco IOS Software 03/03/2022 0.02393 5.9 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0179
CVE-2015-2545 Microsoft Office 03/03/2022 0.93252 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2545
CVE-2018-0173 Cisco IOS and IOS XE Software 03/03/2022 0.09766 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0173
CVE-2016-0099 Microsoft Windows 03/03/2022 0.90662 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0099 https://vulncheck.com/xdb/5ee1591742d9||https://vulncheck.com/xdb/5ee1591742d9 , https://vulncheck.com/xdb/aa836ed9f079||https://vulncheck.com/xdb/aa836ed9f079
CVE-2015-2590 Oracle Java SE 03/03/2022 0.68232 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-2590
CVE-2011-1889 Microsoft Forefront Threat Management Gateway (TMG) 03/03/2022 0.87382 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2011-1889
CVE-2017-11826 Microsoft Office 03/03/2022 0.89654 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-11826 https://vulncheck.com/xdb/cc970cbd36e2||https://vulncheck.com/xdb/cc970cbd36e2 , https://vulncheck.com/xdb/97f6aa4aa057||https://vulncheck.com/xdb/97f6aa4aa057
CVE-2016-7262 Microsoft Excel 03/03/2022 0.85201 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7262
CVE-2017-0261 Microsoft Office 03/03/2022 0.93027 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0261 https://vulncheck.com/xdb/a2b315af6768||https://vulncheck.com/xdb/a2b315af6768 , https://vulncheck.com/xdb/60f2bb90aa34||https://vulncheck.com/xdb/60f2bb90aa34
CVE-2017-12237 Cisco IOS and IOS XE Software 03/03/2022 0.08583 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12237
CVE-2016-4117 Adobe Flash Player 03/03/2022 0.92322 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4117
CVE-2015-5119 Adobe Flash Player 03/03/2022 0.93227 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-5119 https://vulncheck.com/xdb/5f97b5ae8b1d||https://vulncheck.com/xdb/5f97b5ae8b1d , https://vulncheck.com/xdb/74176149f723||https://vulncheck.com/xdb/74176149f723
CVE-2013-1347 Microsoft Internet Explorer 03/03/2022 0.90320 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-1347
CVE-2012-0507 Oracle Java SE 03/03/2022 0.93749 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0507
CVE-2013-1675 Mozilla Firefox 03/03/2022 0.02078 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-1675
CVE-2017-6627 Cisco IOS and IOS XE Software 03/03/2022 0.10886 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6627
CVE-2017-6663 Cisco IOS and IOS XE Software 03/03/2022 0.01099 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6663
CVE-2013-5065 Microsoft Windows 03/03/2022 0.59684 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-5065
CVE-2013-0640 Adobe Reader and Acrobat 03/03/2022 0.92564 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-0640
CVE-2018-8298 ChakraCore ChakraCore scripting engine 03/03/2022 0.89009 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8298
CVE-2018-0174 Cisco IOS XE Software 03/03/2022 0.05665 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0174
CVE-2016-7193 Microsoft Office 03/03/2022 0.78411 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7193
CVE-2012-1535 Adobe Flash Player 03/03/2022 0.92300 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-1535
CVE-2018-0175 Cisco IOS, XR, and XE Software 03/03/2022 0.02538 8.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0175
CVE-2017-12234 Cisco IOS software 03/03/2022 0.10011 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12234
CVE-2022-20703 Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers 03/03/2022 0.03599 10.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-20703
CVE-2022-24682 Synacor Zimbra Collaborate Suite (ZCS) 02/25/2022 0.77845 6.1 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-24682
CVE-2017-0222 Microsoft Internet Explorer 02/25/2022 0.55657 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0222
CVE-2014-6352 Microsoft Windows 02/25/2022 0.90891 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-6352
CVE-2017-8570 Microsoft Office 02/25/2022 0.94247 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8570 https://vulncheck.com/xdb/9fca9180d993||https://vulncheck.com/xdb/9fca9180d993 , https://vulncheck.com/xdb/6a21e4ebd2ad||https://vulncheck.com/xdb/6a21e4ebd2ad , https://vulncheck.com/xdb/60997abfb067||https://vulncheck.com/xdb/60997abfb067 , https://vulncheck.com/xdb/95241070fcc3||https://vulncheck.com/xdb/95241070fcc3 , https://vulncheck.com/xdb/5dbb4686472b||https://vulncheck.com/xdb/5dbb4686472b , https://vulncheck.com/xdb/08f7e45a3d54||https://vulncheck.com/xdb/08f7e45a3d54 , https://vulncheck.com/xdb/e86755a689d5||https://vulncheck.com/xdb/e86755a689d5 , https://vulncheck.com/xdb/aba696432d78||https://vulncheck.com/xdb/aba696432d78 , https://vulncheck.com/xdb/7d0692e4071c||https://vulncheck.com/xdb/7d0692e4071c
CVE-2022-23131 Zabbix Frontend 02/22/2022 0.94344 9.1 https://viz.greynoise.io/tag/zabbix-saml-sso-authentication-bypass-attempt||https://viz.greynoise.io/tag/zabbix-saml-sso-authentication-bypass-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-23131 https://vulncheck.com/xdb/57651461a50b||https://vulncheck.com/xdb/57651461a50b , https://vulncheck.com/xdb/e46f3b30212f||https://vulncheck.com/xdb/e46f3b30212f , https://vulncheck.com/xdb/099f2ba1828a||https://vulncheck.com/xdb/099f2ba1828a , https://vulncheck.com/xdb/6bf41d728409||https://vulncheck.com/xdb/6bf41d728409 , https://vulncheck.com/xdb/4fc1fafc24ec||https://vulncheck.com/xdb/4fc1fafc24ec , https://vulncheck.com/xdb/0eca8abcd488||https://vulncheck.com/xdb/0eca8abcd488 , https://vulncheck.com/xdb/f0dbb969817b||https://vulncheck.com/xdb/f0dbb969817b , https://vulncheck.com/xdb/87a03dbcb4d4||https://vulncheck.com/xdb/87a03dbcb4d4 , https://vulncheck.com/xdb/4bcdfe77a9b2||https://vulncheck.com/xdb/4bcdfe77a9b2 , https://vulncheck.com/xdb/63bde8d02b8f||https://vulncheck.com/xdb/63bde8d02b8f , https://vulncheck.com/xdb/9edf8d0fe243||https://vulncheck.com/xdb/9edf8d0fe243 , https://vulncheck.com/xdb/a91a49f498d6||https://vulncheck.com/xdb/a91a49f498d6 , https://vulncheck.com/xdb/004f3023163c||https://vulncheck.com/xdb/004f3023163c
CVE-2022-23134 Zabbix Frontend 02/22/2022 0.91580 3.7 https://viz.greynoise.io/tag/zabbix-setup-php-authentication-bypass-attempt||https://viz.greynoise.io/tag/zabbix-setup-php-authentication-bypass-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-23134 https://vulncheck.com/xdb/ed8b1935dc35
CVE-2019-0752 Microsoft Internet Explorer 02/15/2022 0.91963 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0752 https://vulncheck.com/xdb/0959a1e968fc
CVE-2022-24086 Adobe Commerce and Magento Open Source 02/15/2022 0.90759 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-24086 https://vulncheck.com/xdb/7d60b3d01025||https://vulncheck.com/xdb/7d60b3d01025 , https://vulncheck.com/xdb/44b62a8bb94b||https://vulncheck.com/xdb/44b62a8bb94b , https://vulncheck.com/xdb/b307483bd289||https://vulncheck.com/xdb/b307483bd289 , https://vulncheck.com/xdb/a001349657ca||https://vulncheck.com/xdb/a001349657ca
CVE-2013-3906 Microsoft Graphics Component 02/15/2022 0.92857 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3906
CVE-2022-0609 Google Chromium Animation 02/15/2022 0.59709 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-0609
CVE-2018-8174 Microsoft Windows 02/15/2022 0.94283 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8174 https://vulncheck.com/xdb/b0607b49648f||https://vulncheck.com/xdb/b0607b49648f , https://vulncheck.com/xdb/77827f4282bf||https://vulncheck.com/xdb/77827f4282bf , https://vulncheck.com/xdb/2799542f34cf||https://vulncheck.com/xdb/2799542f34cf , https://vulncheck.com/xdb/4a0ac8d91b55||https://vulncheck.com/xdb/4a0ac8d91b55 , https://vulncheck.com/xdb/e1a613e9e771||https://vulncheck.com/xdb/e1a613e9e771 , https://vulncheck.com/xdb/a9ca59449e4a||https://vulncheck.com/xdb/a9ca59449e4a , https://vulncheck.com/xdb/803f22a963ca||https://vulncheck.com/xdb/803f22a963ca , https://vulncheck.com/xdb/90e91d5d93e3||https://vulncheck.com/xdb/90e91d5d93e3
CVE-2017-9841 PHPUnit PHPUnit 02/15/2022 0.94406 9.8 https://viz.greynoise.io/tag/phpunit-rce-attempt||https://viz.greynoise.io/tag/phpunit-rce-attempt , https://viz.greynoise.io/tag/phpunit-rce-attempt||https://viz.greynoise.io/tag/phpunit-rce-attempt 90 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-9841 https://vulncheck.com/xdb/2e43500dd68a||https://vulncheck.com/xdb/2e43500dd68a , https://vulncheck.com/xdb/487df0327bce||https://vulncheck.com/xdb/487df0327bce , https://vulncheck.com/xdb/8e4c8dfc7380||https://vulncheck.com/xdb/8e4c8dfc7380 , https://vulncheck.com/xdb/2f94822ef64a||https://vulncheck.com/xdb/2f94822ef64a , https://vulncheck.com/xdb/f2a50a4ad68f||https://vulncheck.com/xdb/f2a50a4ad68f , https://vulncheck.com/xdb/6435c08ede60||https://vulncheck.com/xdb/6435c08ede60 , https://vulncheck.com/xdb/f2c6ac384408||https://vulncheck.com/xdb/f2c6ac384408 , https://vulncheck.com/xdb/0ca48238fb60||https://vulncheck.com/xdb/0ca48238fb60 , https://vulncheck.com/xdb/7d5cdaa33e78||https://vulncheck.com/xdb/7d5cdaa33e78 , https://vulncheck.com/xdb/7a39231796b7||https://vulncheck.com/xdb/7a39231796b7
CVE-2014-1761 Microsoft Word 02/15/2022 0.92827 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-1761
CVE-2018-15982 Adobe Flash Player 02/15/2022 0.93341 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-15982 https://vulncheck.com/xdb/93acce2e6c91||https://vulncheck.com/xdb/93acce2e6c91 , https://vulncheck.com/xdb/5506775f16d6||https://vulncheck.com/xdb/5506775f16d6 , https://vulncheck.com/xdb/a23523174921||https://vulncheck.com/xdb/a23523174921 , https://vulncheck.com/xdb/99b3d4ffd491||https://vulncheck.com/xdb/99b3d4ffd491 , https://vulncheck.com/xdb/dbe63aaa31cf||https://vulncheck.com/xdb/dbe63aaa31cf
CVE-2018-20250 RARLAB WinRAR 02/15/2022 0.93223 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-20250 https://vulncheck.com/xdb/0c53977a59e6||https://vulncheck.com/xdb/0c53977a59e6 , https://vulncheck.com/xdb/7567f96bd245||https://vulncheck.com/xdb/7567f96bd245 , https://vulncheck.com/xdb/e67f95be5194||https://vulncheck.com/xdb/e67f95be5194 , https://vulncheck.com/xdb/265189697577||https://vulncheck.com/xdb/265189697577 , https://vulncheck.com/xdb/87be983eabdb||https://vulncheck.com/xdb/87be983eabdb , https://vulncheck.com/xdb/eae7eb1d7404||https://vulncheck.com/xdb/eae7eb1d7404 , https://vulncheck.com/xdb/62e3db5ba632||https://vulncheck.com/xdb/62e3db5ba632 , https://vulncheck.com/xdb/8781e0635d5a||https://vulncheck.com/xdb/8781e0635d5a , https://vulncheck.com/xdb/0e24e0f3c860||https://vulncheck.com/xdb/0e24e0f3c860 , https://vulncheck.com/xdb/577747b6d2f6||https://vulncheck.com/xdb/577747b6d2f6 , https://vulncheck.com/xdb/89f8948e60fb||https://vulncheck.com/xdb/89f8948e60fb , https://vulncheck.com/xdb/07d3492b35b0||https://vulncheck.com/xdb/07d3492b35b0 , https://vulncheck.com/xdb/1c893692c804||https://vulncheck.com/xdb/1c893692c804 , https://vulncheck.com/xdb/769a10397402||https://vulncheck.com/xdb/769a10397402 , https://vulncheck.com/xdb/4cf24d124675||https://vulncheck.com/xdb/4cf24d124675 , https://vulncheck.com/xdb/2f088777b403||https://vulncheck.com/xdb/2f088777b403 , https://vulncheck.com/xdb/f92a55a02a71||https://vulncheck.com/xdb/f92a55a02a71
CVE-2022-22620 Apple iOS, iPadOS, and macOS 02/11/2022 0.03877 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22620 https://vulncheck.com/xdb/7c5d41b7c5bd||https://vulncheck.com/xdb/7c5d41b7c5bd , https://vulncheck.com/xdb/577f4e8d7d38||https://vulncheck.com/xdb/577f4e8d7d38
CVE-2015-1130 Apple OS X 02/10/2022 0.26042 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1130 https://vulncheck.com/xdb/0014762ccc68||https://vulncheck.com/xdb/0014762ccc68 , https://vulncheck.com/xdb/afd1ccbf6e8d||https://vulncheck.com/xdb/afd1ccbf6e8d
CVE-2020-0796 Microsoft SMBv3 02/10/2022 0.94419 10.0 https://viz.greynoise.io/tag/smbghost-vuln-check||https://viz.greynoise.io/tag/smbghost-vuln-check TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0796 https://vulncheck.com/xdb/f8f7a66ca404||https://vulncheck.com/xdb/f8f7a66ca404 , https://vulncheck.com/xdb/132b45db5c90||https://vulncheck.com/xdb/132b45db5c90 , https://vulncheck.com/xdb/fff5ddf87547||https://vulncheck.com/xdb/fff5ddf87547 , https://vulncheck.com/xdb/df0832d0144e||https://vulncheck.com/xdb/df0832d0144e , https://vulncheck.com/xdb/0edf8728bb5f||https://vulncheck.com/xdb/0edf8728bb5f , https://vulncheck.com/xdb/216af6a16e50||https://vulncheck.com/xdb/216af6a16e50 , https://vulncheck.com/xdb/ff75d491e221||https://vulncheck.com/xdb/ff75d491e221 , https://vulncheck.com/xdb/d44cedf42a97||https://vulncheck.com/xdb/d44cedf42a97 , https://vulncheck.com/xdb/c61e689a70b5||https://vulncheck.com/xdb/c61e689a70b5 , https://vulncheck.com/xdb/33e62c3dd628||https://vulncheck.com/xdb/33e62c3dd628 , https://vulncheck.com/xdb/db287bfd1300||https://vulncheck.com/xdb/db287bfd1300 , https://vulncheck.com/xdb/cf4d2847f48a||https://vulncheck.com/xdb/cf4d2847f48a , https://vulncheck.com/xdb/1fe25bc46b28||https://vulncheck.com/xdb/1fe25bc46b28 , https://vulncheck.com/xdb/35944ecc6741||https://vulncheck.com/xdb/35944ecc6741 , https://vulncheck.com/xdb/48181658a679||https://vulncheck.com/xdb/48181658a679 , https://vulncheck.com/xdb/189b546ce23d||https://vulncheck.com/xdb/189b546ce23d , https://vulncheck.com/xdb/2a4b6e1593eb||https://vulncheck.com/xdb/2a4b6e1593eb , https://vulncheck.com/xdb/14a46f453670||https://vulncheck.com/xdb/14a46f453670 , https://vulncheck.com/xdb/0dcd49541f47||https://vulncheck.com/xdb/0dcd49541f47 , https://vulncheck.com/xdb/484b2a81c82e||https://vulncheck.com/xdb/484b2a81c82e , https://vulncheck.com/xdb/4e6bc5ec8634||https://vulncheck.com/xdb/4e6bc5ec8634 , https://vulncheck.com/xdb/1bd0e82ed8ee||https://vulncheck.com/xdb/1bd0e82ed8ee , https://vulncheck.com/xdb/5f4027f27dae||https://vulncheck.com/xdb/5f4027f27dae , https://vulncheck.com/xdb/1f736df77952||https://vulncheck.com/xdb/1f736df77952 , https://vulncheck.com/xdb/9f1dbe33c767||https://vulncheck.com/xdb/9f1dbe33c767 , https://vulncheck.com/xdb/405831a8e860||https://vulncheck.com/xdb/405831a8e860 , https://vulncheck.com/xdb/9e0eebcc0239||https://vulncheck.com/xdb/9e0eebcc0239 , https://vulncheck.com/xdb/234a8c77ec20||https://vulncheck.com/xdb/234a8c77ec20 , https://vulncheck.com/xdb/002285bd34cf||https://vulncheck.com/xdb/002285bd34cf , https://vulncheck.com/xdb/5f415b7a9395||https://vulncheck.com/xdb/5f415b7a9395 , https://vulncheck.com/xdb/c349096df32e||https://vulncheck.com/xdb/c349096df32e , https://vulncheck.com/xdb/d7d5d53f4bea||https://vulncheck.com/xdb/d7d5d53f4bea , https://vulncheck.com/xdb/1433f57a34a7||https://vulncheck.com/xdb/1433f57a34a7 , https://vulncheck.com/xdb/a788d7636e90||https://vulncheck.com/xdb/a788d7636e90 , https://vulncheck.com/xdb/1e6f8ca038f7||https://vulncheck.com/xdb/1e6f8ca038f7 , https://vulncheck.com/xdb/c489f75bf99d||https://vulncheck.com/xdb/c489f75bf99d , https://vulncheck.com/xdb/6d070666358a||https://vulncheck.com/xdb/6d070666358a , https://vulncheck.com/xdb/19e081f7a0e0||https://vulncheck.com/xdb/19e081f7a0e0 , https://vulncheck.com/xdb/d69aadafc43a||https://vulncheck.com/xdb/d69aadafc43a , https://vulncheck.com/xdb/424a6065b5a6||https://vulncheck.com/xdb/424a6065b5a6 , https://vulncheck.com/xdb/a08cd7c0ec40||https://vulncheck.com/xdb/a08cd7c0ec40 , https://vulncheck.com/xdb/059158002b34||https://vulncheck.com/xdb/059158002b34 , https://vulncheck.com/xdb/ac5de3e67dd5||https://vulncheck.com/xdb/ac5de3e67dd5 , https://vulncheck.com/xdb/28ef5a320ff6||https://vulncheck.com/xdb/28ef5a320ff6 , https://vulncheck.com/xdb/f25ef6c781a3||https://vulncheck.com/xdb/f25ef6c781a3 , https://vulncheck.com/xdb/04badb202b58||https://vulncheck.com/xdb/04badb202b58 , https://vulncheck.com/xdb/673033cc1f2d||https://vulncheck.com/xdb/673033cc1f2d , https://vulncheck.com/xdb/0783c8074cff||https://vulncheck.com/xdb/0783c8074cff , https://vulncheck.com/xdb/17f7ca6e1bfa||https://vulncheck.com/xdb/17f7ca6e1bfa , https://vulncheck.com/xdb/42d4e59819e1||https://vulncheck.com/xdb/42d4e59819e1 , https://vulncheck.com/xdb/33fb0416877c||https://vulncheck.com/xdb/33fb0416877c , https://vulncheck.com/xdb/f1c35a49bda4||https://vulncheck.com/xdb/f1c35a49bda4 , https://vulncheck.com/xdb/b8b6072526a3||https://vulncheck.com/xdb/b8b6072526a3 , https://vulncheck.com/xdb/935c9e284cc4||https://vulncheck.com/xdb/935c9e284cc4
CVE-2017-0144 Microsoft SMBv1 02/10/2022 0.94323 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0144 https://vulncheck.com/xdb/72e1c61d88d7||https://vulncheck.com/xdb/72e1c61d88d7 , https://vulncheck.com/xdb/ad1d794cf666||https://vulncheck.com/xdb/ad1d794cf666
CVE-2015-2051 D-Link DIR-645 Router 02/10/2022 0.90922 9.8 106 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2015-2051
CVE-2017-9791 Apache Struts 1 02/10/2022 0.94263 9.8 https://viz.greynoise.io/tag/apache-struts-2-rce-attempt||https://viz.greynoise.io/tag/apache-struts-2-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-9791 https://vulncheck.com/xdb/8b1dd6d0c703||https://vulncheck.com/xdb/8b1dd6d0c703 , https://vulncheck.com/xdb/bacc4a0c75f1||https://vulncheck.com/xdb/bacc4a0c75f1 , https://vulncheck.com/xdb/2fe7d1498974||https://vulncheck.com/xdb/2fe7d1498974
CVE-2014-4404 Apple OS X 02/10/2022 0.53334 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-4404
CVE-2017-8464 Microsoft Windows 02/10/2022 0.93542 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8464 https://vulncheck.com/xdb/4680b98695eb||https://vulncheck.com/xdb/4680b98695eb , https://vulncheck.com/xdb/40020c9d725b||https://vulncheck.com/xdb/40020c9d725b , https://vulncheck.com/xdb/6bd690a6cb72||https://vulncheck.com/xdb/6bd690a6cb72
CVE-2016-3088 Apache ActiveMQ 02/10/2022 0.94290 9.8 https://viz.greynoise.io/tag/apache-activemq-worm-attempt||https://viz.greynoise.io/tag/apache-activemq-worm-attempt 4 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3088 https://vulncheck.com/xdb/b4d788f18d78||https://vulncheck.com/xdb/b4d788f18d78 , https://vulncheck.com/xdb/bc5d77bfbacc||https://vulncheck.com/xdb/bc5d77bfbacc , https://vulncheck.com/xdb/a7cca355deef||https://vulncheck.com/xdb/a7cca355deef , https://vulncheck.com/xdb/91570066cf0f||https://vulncheck.com/xdb/91570066cf0f , https://vulncheck.com/xdb/96c75f71a2ee||https://vulncheck.com/xdb/96c75f71a2ee , https://vulncheck.com/xdb/5475b9b03dcc||https://vulncheck.com/xdb/5475b9b03dcc , https://vulncheck.com/xdb/90020a901ec3||https://vulncheck.com/xdb/90020a901ec3
CVE-2017-0263 Microsoft Win32k 02/10/2022 0.17937 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0263
CVE-2015-1635 Microsoft HTTP.sys 02/10/2022 0.94310 9.8 https://viz.greynoise.io/tag/ms15-034-dos-attempt||https://viz.greynoise.io/tag/ms15-034-dos-attempt , https://viz.greynoise.io/tag/ms15-034-vulnerability-check||https://viz.greynoise.io/tag/ms15-034-vulnerability-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1635 https://vulncheck.com/xdb/f333a38f931a||https://vulncheck.com/xdb/f333a38f931a , https://vulncheck.com/xdb/4d00daf97977||https://vulncheck.com/xdb/4d00daf97977 , https://vulncheck.com/xdb/693e42549523||https://vulncheck.com/xdb/693e42549523 , https://vulncheck.com/xdb/58a3b1e81ee2||https://vulncheck.com/xdb/58a3b1e81ee2 , https://vulncheck.com/xdb/2d56398584ad||https://vulncheck.com/xdb/2d56398584ad , https://vulncheck.com/xdb/df55a69b1021||https://vulncheck.com/xdb/df55a69b1021 , https://vulncheck.com/xdb/215deead4210||https://vulncheck.com/xdb/215deead4210 , https://vulncheck.com/xdb/bd16f7896930||https://vulncheck.com/xdb/bd16f7896930 , https://vulncheck.com/xdb/55628ec20b97||https://vulncheck.com/xdb/55628ec20b97 , https://vulncheck.com/xdb/7690005e3e24||https://vulncheck.com/xdb/7690005e3e24 , https://vulncheck.com/xdb/640f8e881740||https://vulncheck.com/xdb/640f8e881740
CVE-2017-0262 Microsoft Office 02/10/2022 0.64739 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0262
CVE-2017-0145 Microsoft SMBv1 02/10/2022 0.93501 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0145
CVE-2021-36934 Microsoft Windows 02/10/2022 0.90397 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-36934 https://vulncheck.com/xdb/96e9eacb05d6||https://vulncheck.com/xdb/96e9eacb05d6 , https://vulncheck.com/xdb/50f81231aee5||https://vulncheck.com/xdb/50f81231aee5 , https://vulncheck.com/xdb/ed07468efcaa||https://vulncheck.com/xdb/ed07468efcaa , https://vulncheck.com/xdb/9be67e72e04a||https://vulncheck.com/xdb/9be67e72e04a , https://vulncheck.com/xdb/591431919857||https://vulncheck.com/xdb/591431919857 , https://vulncheck.com/xdb/b8a3eb621c11||https://vulncheck.com/xdb/b8a3eb621c11 , https://vulncheck.com/xdb/a07f876412e5||https://vulncheck.com/xdb/a07f876412e5 , https://vulncheck.com/xdb/4ec8f950a8af||https://vulncheck.com/xdb/4ec8f950a8af , https://vulncheck.com/xdb/078d6f06bd90||https://vulncheck.com/xdb/078d6f06bd90 , https://vulncheck.com/xdb/f37385744f45||https://vulncheck.com/xdb/f37385744f45 , https://vulncheck.com/xdb/0dfa67c40229||https://vulncheck.com/xdb/0dfa67c40229 , https://vulncheck.com/xdb/123ee9082813||https://vulncheck.com/xdb/123ee9082813 , https://vulncheck.com/xdb/7a9d2a3f2520||https://vulncheck.com/xdb/7a9d2a3f2520 , https://vulncheck.com/xdb/545fd96d1ad3||https://vulncheck.com/xdb/545fd96d1ad3 , https://vulncheck.com/xdb/7e94de290340||https://vulncheck.com/xdb/7e94de290340 , https://vulncheck.com/xdb/f943b266eccd||https://vulncheck.com/xdb/f943b266eccd , https://vulncheck.com/xdb/2a12cca9cfb0||https://vulncheck.com/xdb/2a12cca9cfb0 , https://vulncheck.com/xdb/9f954d278217||https://vulncheck.com/xdb/9f954d278217 , https://vulncheck.com/xdb/3995834c206a||https://vulncheck.com/xdb/3995834c206a , https://vulncheck.com/xdb/9a45af3ec16c||https://vulncheck.com/xdb/9a45af3ec16c , https://vulncheck.com/xdb/80999bdcfa69||https://vulncheck.com/xdb/80999bdcfa69
CVE-2018-1000861 Jenkins Jenkins Stapler Web Framework 02/10/2022 0.94487 9.8 https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt||https://viz.greynoise.io/tag/jenkins-remote-command-injection-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-1000861 https://vulncheck.com/xdb/0fa5309130e4||https://vulncheck.com/xdb/0fa5309130e4 , https://vulncheck.com/xdb/456a6baaa89d||https://vulncheck.com/xdb/456a6baaa89d
CVE-2017-10271 Oracle WebLogic Server 02/10/2022 0.94439 7.5 https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2017-10271-rce-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-10271 https://vulncheck.com/xdb/09caa396fa9d||https://vulncheck.com/xdb/09caa396fa9d , https://vulncheck.com/xdb/5876caaffa74||https://vulncheck.com/xdb/5876caaffa74 , https://vulncheck.com/xdb/b1d32de02744||https://vulncheck.com/xdb/b1d32de02744 , https://vulncheck.com/xdb/45527e228cbc||https://vulncheck.com/xdb/45527e228cbc , https://vulncheck.com/xdb/84b051e655c3||https://vulncheck.com/xdb/84b051e655c3 , https://vulncheck.com/xdb/ceea1ee6f89d||https://vulncheck.com/xdb/ceea1ee6f89d , https://vulncheck.com/xdb/79b07cfac599||https://vulncheck.com/xdb/79b07cfac599 , https://vulncheck.com/xdb/5db29476379f||https://vulncheck.com/xdb/5db29476379f , https://vulncheck.com/xdb/07ffaabdd9b4||https://vulncheck.com/xdb/07ffaabdd9b4 , https://vulncheck.com/xdb/439d9489666c||https://vulncheck.com/xdb/439d9489666c , https://vulncheck.com/xdb/14ab6f8b9982||https://vulncheck.com/xdb/14ab6f8b9982 , https://vulncheck.com/xdb/227b6343c39a||https://vulncheck.com/xdb/227b6343c39a , https://vulncheck.com/xdb/748e47609e78||https://vulncheck.com/xdb/748e47609e78 , https://vulncheck.com/xdb/d4ef87756956||https://vulncheck.com/xdb/d4ef87756956 , https://vulncheck.com/xdb/d09b1e7f97cc||https://vulncheck.com/xdb/d09b1e7f97cc , https://vulncheck.com/xdb/3f317861c109||https://vulncheck.com/xdb/3f317861c109 , https://vulncheck.com/xdb/560237e691a7||https://vulncheck.com/xdb/560237e691a7 , https://vulncheck.com/xdb/e9e5a0e896a8||https://vulncheck.com/xdb/e9e5a0e896a8 , https://vulncheck.com/xdb/81bc72dbea42||https://vulncheck.com/xdb/81bc72dbea42 , https://vulncheck.com/xdb/5d3fcd41baa9||https://vulncheck.com/xdb/5d3fcd41baa9
CVE-2022-21882 Microsoft Win32k 02/04/2022 0.89101 7.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-21882 https://vulncheck.com/xdb/178edfa6e2a9||https://vulncheck.com/xdb/178edfa6e2a9 , https://vulncheck.com/xdb/daa024c59e63||https://vulncheck.com/xdb/daa024c59e63 , https://vulncheck.com/xdb/0df71d9bfe29||https://vulncheck.com/xdb/0df71d9bfe29 , https://vulncheck.com/xdb/5494ab88126e||https://vulncheck.com/xdb/5494ab88126e , https://vulncheck.com/xdb/9bd0de5ceacd||https://vulncheck.com/xdb/9bd0de5ceacd , https://vulncheck.com/xdb/8b1663fa985c||https://vulncheck.com/xdb/8b1663fa985c
CVE-2014-7169 GNU Bourne-Again Shell (Bash) 01/28/2022 0.88955 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-7169 https://vulncheck.com/xdb/4198cdfc661f||https://vulncheck.com/xdb/4198cdfc661f , https://vulncheck.com/xdb/a74476a1777f||https://vulncheck.com/xdb/a74476a1777f
CVE-2014-6271 GNU Bourne-Again Shell (Bash) 01/28/2022 0.94220 9.8 https://viz.greynoise.io/tag/qnap-nas-worm-attempt||https://viz.greynoise.io/tag/qnap-nas-worm-attempt , https://viz.greynoise.io/tag/shell-shock-cve-2014-6271-attempt||https://viz.greynoise.io/tag/shell-shock-cve-2014-6271-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-6271 https://vulncheck.com/xdb/8d2b021f02a5||https://vulncheck.com/xdb/8d2b021f02a5 , https://vulncheck.com/xdb/7f347ea4e4c6||https://vulncheck.com/xdb/7f347ea4e4c6 , https://vulncheck.com/xdb/9550fc6e89ed||https://vulncheck.com/xdb/9550fc6e89ed , https://vulncheck.com/xdb/6af12f28ca11||https://vulncheck.com/xdb/6af12f28ca11 , https://vulncheck.com/xdb/b572ab83cdb5||https://vulncheck.com/xdb/b572ab83cdb5 , https://vulncheck.com/xdb/b6fa067a48a7||https://vulncheck.com/xdb/b6fa067a48a7 , https://vulncheck.com/xdb/e8cd174acc84||https://vulncheck.com/xdb/e8cd174acc84 , https://vulncheck.com/xdb/eb9720b691f3||https://vulncheck.com/xdb/eb9720b691f3 , https://vulncheck.com/xdb/990c93705921||https://vulncheck.com/xdb/990c93705921 , https://vulncheck.com/xdb/fbb4b4bb3ced||https://vulncheck.com/xdb/fbb4b4bb3ced , https://vulncheck.com/xdb/2ffa4dfd961a||https://vulncheck.com/xdb/2ffa4dfd961a , https://vulncheck.com/xdb/7deee0fd9dee||https://vulncheck.com/xdb/7deee0fd9dee , https://vulncheck.com/xdb/0c87a5624456||https://vulncheck.com/xdb/0c87a5624456 , https://vulncheck.com/xdb/771d67861982||https://vulncheck.com/xdb/771d67861982 , https://vulncheck.com/xdb/1b466fc06fc0||https://vulncheck.com/xdb/1b466fc06fc0 , https://vulncheck.com/xdb/18c86f55b23d||https://vulncheck.com/xdb/18c86f55b23d , https://vulncheck.com/xdb/37913b9c97af||https://vulncheck.com/xdb/37913b9c97af , https://vulncheck.com/xdb/87352658799b||https://vulncheck.com/xdb/87352658799b , https://vulncheck.com/xdb/4b6744519444||https://vulncheck.com/xdb/4b6744519444 , https://vulncheck.com/xdb/8cb6b0e4bfd9||https://vulncheck.com/xdb/8cb6b0e4bfd9 , https://vulncheck.com/xdb/1b15435d492f||https://vulncheck.com/xdb/1b15435d492f , https://vulncheck.com/xdb/ea7dfb5a79c0||https://vulncheck.com/xdb/ea7dfb5a79c0 , https://vulncheck.com/xdb/fa1741b5fe55||https://vulncheck.com/xdb/fa1741b5fe55 , https://vulncheck.com/xdb/a69624ba8529||https://vulncheck.com/xdb/a69624ba8529 , https://vulncheck.com/xdb/89cf85aa3c3d||https://vulncheck.com/xdb/89cf85aa3c3d , https://vulncheck.com/xdb/1d5c31767173||https://vulncheck.com/xdb/1d5c31767173 , https://vulncheck.com/xdb/462fc384771e||https://vulncheck.com/xdb/462fc384771e , https://vulncheck.com/xdb/b4b5de984e30||https://vulncheck.com/xdb/b4b5de984e30 , https://vulncheck.com/xdb/daaa4adc42e7||https://vulncheck.com/xdb/daaa4adc42e7 , https://vulncheck.com/xdb/177e5ecfe706||https://vulncheck.com/xdb/177e5ecfe706 , https://vulncheck.com/xdb/91302a8a527c||https://vulncheck.com/xdb/91302a8a527c , https://vulncheck.com/xdb/137b7b5051c2||https://vulncheck.com/xdb/137b7b5051c2 , https://vulncheck.com/xdb/e57812c06caf||https://vulncheck.com/xdb/e57812c06caf , https://vulncheck.com/xdb/f04bc714ad93||https://vulncheck.com/xdb/f04bc714ad93 , https://vulncheck.com/xdb/3af8913bb29e||https://vulncheck.com/xdb/3af8913bb29e
CVE-2017-5689 Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability 01/28/2022 0.94315 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-5689 https://vulncheck.com/xdb/063f844548ff||https://vulncheck.com/xdb/063f844548ff , https://vulncheck.com/xdb/8f2f831b16a0||https://vulncheck.com/xdb/8f2f831b16a0 , https://vulncheck.com/xdb/6d5963dde233||https://vulncheck.com/xdb/6d5963dde233
CVE-2020-0787 Microsoft Windows 01/28/2022 0.57305 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0787 https://vulncheck.com/xdb/e80bf2969f59||https://vulncheck.com/xdb/e80bf2969f59 , https://vulncheck.com/xdb/d9c5b437e166||https://vulncheck.com/xdb/d9c5b437e166 , https://vulncheck.com/xdb/8e30ee28c46e||https://vulncheck.com/xdb/8e30ee28c46e , https://vulncheck.com/xdb/be286a8966d1||https://vulncheck.com/xdb/be286a8966d1 , https://vulncheck.com/xdb/483730acb6d9||https://vulncheck.com/xdb/483730acb6d9 , https://vulncheck.com/xdb/a117029b544b||https://vulncheck.com/xdb/a117029b544b , https://vulncheck.com/xdb/f5fe94ac04b2||https://vulncheck.com/xdb/f5fe94ac04b2 , https://vulncheck.com/xdb/fd492c871d51||https://vulncheck.com/xdb/fd492c871d51 , https://vulncheck.com/xdb/1ab4e5f57a90||https://vulncheck.com/xdb/1ab4e5f57a90
CVE-2021-20038 SonicWall SMA 100 Appliances 01/28/2022 0.94311 9.8 https://viz.greynoise.io/tag/sonicwall-sma-appliance-rce-attempt||https://viz.greynoise.io/tag/sonicwall-sma-appliance-rce-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20038 https://vulncheck.com/xdb/b47634bfd8e8
CVE-2014-1776 Microsoft Internet Explorer 01/28/2022 0.72488 9.8 FALSE FALSE FALSE https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776
CVE-2020-5722 Grandstream UCM6200 01/28/2022 0.90907 9.8 https://viz.greynoise.io/tag/grandstream-rce-vuln-check||https://viz.greynoise.io/tag/grandstream-rce-vuln-check , https://viz.greynoise.io/tag/grandstream-ucm62xx-rce-attempt||https://viz.greynoise.io/tag/grandstream-ucm62xx-rce-attempt 0 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-5722
CVE-2022-22587 Apple iOS and macOS 01/28/2022 0.00483 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2022-22587
CVE-2021-35247 SolarWinds Serv-U 01/21/2022 0.04983 4.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-35247
CVE-2006-1547 Apache Struts 1 01/21/2022 0.13670 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2006-1547
CVE-2018-8453 Microsoft Win32k 01/21/2022 0.84016 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8453 https://vulncheck.com/xdb/b083a48f7b97||https://vulncheck.com/xdb/b083a48f7b97 , https://vulncheck.com/xdb/8605f8dc5ea1||https://vulncheck.com/xdb/8605f8dc5ea1 , https://vulncheck.com/xdb/f209185692c9||https://vulncheck.com/xdb/f209185692c9
CVE-2012-0391 Apache Struts 2 01/21/2022 0.91293 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0391
CVE-2020-13927 Apache Airflow's Experimental API 01/18/2022 0.94183 9.8 https://viz.greynoise.io/tag/apache-airflow-experimental-api-access-check||https://viz.greynoise.io/tag/apache-airflow-experimental-api-access-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-13927
CVE-2021-25296 Nagios Nagios XI 01/18/2022 0.93482 8.8 https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-25296
CVE-2020-14864 Oracle Intelligence Enterprise Edition 01/18/2022 0.94009 7.5 https://viz.greynoise.io/tag/oracle-business-intelligence-local-file-inclusion-attempt||https://viz.greynoise.io/tag/oracle-business-intelligence-local-file-inclusion-attempt 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-14864
CVE-2021-25298 Nagios Nagios XI 01/18/2022 0.77096 8.8 https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-25298
CVE-2021-21975 VMware vRealize Operations Manager API 01/18/2022 0.94416 7.5 https://viz.greynoise.io/tag/vmware-vrealize-operations-ssrf-attempt||https://viz.greynoise.io/tag/vmware-vrealize-operations-ssrf-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21975 https://vulncheck.com/xdb/302c3f6e7bc3||https://vulncheck.com/xdb/302c3f6e7bc3 , https://vulncheck.com/xdb/458b60ea0b7c||https://vulncheck.com/xdb/458b60ea0b7c , https://vulncheck.com/xdb/ad7a54ca06a2||https://vulncheck.com/xdb/ad7a54ca06a2 , https://vulncheck.com/xdb/ae756f15b69d||https://vulncheck.com/xdb/ae756f15b69d , https://vulncheck.com/xdb/d999871da31f||https://vulncheck.com/xdb/d999871da31f , https://vulncheck.com/xdb/dd0990807e10||https://vulncheck.com/xdb/dd0990807e10 , https://vulncheck.com/xdb/5d186346d129||https://vulncheck.com/xdb/5d186346d129 , https://vulncheck.com/xdb/ea8505e383e2||https://vulncheck.com/xdb/ea8505e383e2
CVE-2021-40870 Aviatrix Aviatrix Controller 01/18/2022 0.94260 9.8 https://viz.greynoise.io/tag/aviatrix-controller-rce-attempt||https://viz.greynoise.io/tag/aviatrix-controller-rce-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40870 https://vulncheck.com/xdb/3bbd03015ca5||https://vulncheck.com/xdb/3bbd03015ca5 , https://vulncheck.com/xdb/7c329c1f9967||https://vulncheck.com/xdb/7c329c1f9967 , https://vulncheck.com/xdb/564210dea7a0||https://vulncheck.com/xdb/564210dea7a0 , https://vulncheck.com/xdb/cfa0cafc528d||https://vulncheck.com/xdb/cfa0cafc528d
CVE-2021-22991 F5 BIG-IP Traffic Management Microkernel 01/18/2022 0.70784 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22991
CVE-2021-32648 October CMS October CMS 01/18/2022 0.72666 8.2 https://viz.greynoise.io/tag/october-cms-password-reset-scanner||https://viz.greynoise.io/tag/october-cms-password-reset-scanner FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-32648 https://vulncheck.com/xdb/9efd406c8865
CVE-2021-21315 Npm package System Information Library for Node.JS 01/18/2022 0.93835 7.1 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21315 https://vulncheck.com/xdb/b335b010d8f4||https://vulncheck.com/xdb/b335b010d8f4 , https://vulncheck.com/xdb/82d28479bdcb||https://vulncheck.com/xdb/82d28479bdcb , https://vulncheck.com/xdb/103f055d687b||https://vulncheck.com/xdb/103f055d687b
CVE-2021-25297 Nagios Nagios XI 01/18/2022 0.51009 8.8 https://viz.greynoise.io/tag/nagios-xi-rce-attempt||https://viz.greynoise.io/tag/nagios-xi-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-25297
CVE-2021-33766 Microsoft Exchange Server 01/18/2022 0.91528 7.3 https://viz.greynoise.io/tag/exchange-auth-bypass-attempt||https://viz.greynoise.io/tag/exchange-auth-bypass-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-33766 https://vulncheck.com/xdb/7413bcfade93||https://vulncheck.com/xdb/7413bcfade93 , https://vulncheck.com/xdb/22cbf4a05a8d||https://vulncheck.com/xdb/22cbf4a05a8d
CVE-2020-13671 Drupal Drupal core 01/18/2022 0.04323 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-13671
CVE-2020-11978 Apache Airflow 01/18/2022 0.94269 8.8 https://viz.greynoise.io/tag/apache-airflow-example-dag-rce-attempt||https://viz.greynoise.io/tag/apache-airflow-example-dag-rce-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11978 https://vulncheck.com/xdb/73630c81bc79||https://vulncheck.com/xdb/73630c81bc79 , https://vulncheck.com/xdb/b834c5124a3e||https://vulncheck.com/xdb/b834c5124a3e
CVE-2020-6572 Google Chrome Media 01/10/2022 0.20360 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6572
CVE-2013-3900 Microsoft WinVerifyTrust function 01/10/2022 0.79965 5.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2013-3900 https://vulncheck.com/xdb/a5d3448726f4
CVE-2021-22017 VMware vCenter Server 01/10/2022 0.79163 5.3 https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check , https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22017
CVE-2021-36260 Hikvision Security cameras web server 01/10/2022 0.94436 9.8 https://viz.greynoise.io/tag/hikvision-ip-camera-rce-attempt||https://viz.greynoise.io/tag/hikvision-ip-camera-rce-attempt 3 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-36260 https://vulncheck.com/xdb/3b4ddeccb73c||https://vulncheck.com/xdb/3b4ddeccb73c , https://vulncheck.com/xdb/fb357a667b00||https://vulncheck.com/xdb/fb357a667b00 , https://vulncheck.com/xdb/571b3021541a||https://vulncheck.com/xdb/571b3021541a , https://vulncheck.com/xdb/92d32617ecdc||https://vulncheck.com/xdb/92d32617ecdc , https://vulncheck.com/xdb/6e02def98dc1||https://vulncheck.com/xdb/6e02def98dc1 , https://vulncheck.com/xdb/3d6450b00d2f||https://vulncheck.com/xdb/3d6450b00d2f , https://vulncheck.com/xdb/36b538d97c5f||https://vulncheck.com/xdb/36b538d97c5f , https://vulncheck.com/xdb/fde64918a78d||https://vulncheck.com/xdb/fde64918a78d , https://vulncheck.com/xdb/ebbc2b573edd||https://vulncheck.com/xdb/ebbc2b573edd , https://vulncheck.com/xdb/c7787c78e609||https://vulncheck.com/xdb/c7787c78e609 , https://vulncheck.com/xdb/9622e9da156e||https://vulncheck.com/xdb/9622e9da156e , https://vulncheck.com/xdb/b03efde8723d||https://vulncheck.com/xdb/b03efde8723d , https://vulncheck.com/xdb/df0fc9bf195c||https://vulncheck.com/xdb/df0fc9bf195c , https://vulncheck.com/xdb/bff72b5d73fa||https://vulncheck.com/xdb/bff72b5d73fa
CVE-2015-7450 IBM WebSphere Application Server and Server Hypervisor Edition 01/10/2022 0.94050 9.8 https://viz.greynoise.io/tag/ibm-websphere-remote-code-execution-attempt||https://viz.greynoise.io/tag/ibm-websphere-remote-code-execution-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-7450 https://vulncheck.com/xdb/322395a3fefa
CVE-2019-10149 Exim Mail Transfer Agent (MTA) 01/10/2022 0.93927 9.0 https://viz.greynoise.io/tag/exim-rce-attempt||https://viz.greynoise.io/tag/exim-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-10149 https://vulncheck.com/xdb/eeb36c51b81d||https://vulncheck.com/xdb/eeb36c51b81d , https://vulncheck.com/xdb/12238eca37ff||https://vulncheck.com/xdb/12238eca37ff , https://vulncheck.com/xdb/ca604e67a881||https://vulncheck.com/xdb/ca604e67a881 , https://vulncheck.com/xdb/2e73af25d4a9||https://vulncheck.com/xdb/2e73af25d4a9 , https://vulncheck.com/xdb/ca73aedc1e14||https://vulncheck.com/xdb/ca73aedc1e14 , https://vulncheck.com/xdb/0e9dcf2ac58c||https://vulncheck.com/xdb/0e9dcf2ac58c , https://vulncheck.com/xdb/49992cce5b1c||https://vulncheck.com/xdb/49992cce5b1c , https://vulncheck.com/xdb/ee883571c18e||https://vulncheck.com/xdb/ee883571c18e , https://vulncheck.com/xdb/1a1f3a4ff3c8||https://vulncheck.com/xdb/1a1f3a4ff3c8 , https://vulncheck.com/xdb/16dc2d42770c||https://vulncheck.com/xdb/16dc2d42770c , https://vulncheck.com/xdb/20346f31ab54||https://vulncheck.com/xdb/20346f31ab54
CVE-2019-1458 Microsoft Win32k 01/10/2022 0.92947 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1458 https://vulncheck.com/xdb/4ee4350d2747||https://vulncheck.com/xdb/4ee4350d2747 , https://vulncheck.com/xdb/a26d41dd78ca||https://vulncheck.com/xdb/a26d41dd78ca , https://vulncheck.com/xdb/72337ebb34f1||https://vulncheck.com/xdb/72337ebb34f1
CVE-2019-9670 Synacor Zimbra Collaboration Suite (ZCS) 01/10/2022 0.94430 9.8 https://viz.greynoise.io/tag/zimbra-collaboration-suite-xxe-attempt||https://viz.greynoise.io/tag/zimbra-collaboration-suite-xxe-attempt 5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-9670 https://vulncheck.com/xdb/f96906b5bf5d||https://vulncheck.com/xdb/f96906b5bf5d , https://vulncheck.com/xdb/5a57070a2e55||https://vulncheck.com/xdb/5a57070a2e55 , https://vulncheck.com/xdb/39e7f55e74cc||https://vulncheck.com/xdb/39e7f55e74cc , https://vulncheck.com/xdb/e273f1dc391e||https://vulncheck.com/xdb/e273f1dc391e , https://vulncheck.com/xdb/ff28b3d82e69||https://vulncheck.com/xdb/ff28b3d82e69
CVE-2018-13383 Fortinet FortiOS and FortiProxy 01/10/2022 0.01116 4.3 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-13383
CVE-2021-27860 FatPipe WARP, IPVPN, and MPVPN software 01/10/2022 0.42124 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27860
CVE-2019-2725 Oracle WebLogic Server 01/10/2022 0.94470 7.5 https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-scanner||https://viz.greynoise.io/tag/oracle-weblogic-cve-2019-2725-scanner 4 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-2725 https://vulncheck.com/xdb/717e8523f747||https://vulncheck.com/xdb/717e8523f747 , https://vulncheck.com/xdb/71278e8e69eb||https://vulncheck.com/xdb/71278e8e69eb , https://vulncheck.com/xdb/561ad5895b63||https://vulncheck.com/xdb/561ad5895b63 , https://vulncheck.com/xdb/ebedc9f5eb85||https://vulncheck.com/xdb/ebedc9f5eb85 , https://vulncheck.com/xdb/5888723944a0||https://vulncheck.com/xdb/5888723944a0 , https://vulncheck.com/xdb/4aff13e21cd5||https://vulncheck.com/xdb/4aff13e21cd5 , https://vulncheck.com/xdb/5f7ca038e0a6||https://vulncheck.com/xdb/5f7ca038e0a6 , https://vulncheck.com/xdb/596e707e613e||https://vulncheck.com/xdb/596e707e613e , https://vulncheck.com/xdb/2957146db3b3||https://vulncheck.com/xdb/2957146db3b3 , https://vulncheck.com/xdb/78cfc32167c4||https://vulncheck.com/xdb/78cfc32167c4 , https://vulncheck.com/xdb/99f9740a5a03||https://vulncheck.com/xdb/99f9740a5a03 , https://vulncheck.com/xdb/50cca2cb6c66||https://vulncheck.com/xdb/50cca2cb6c66 , https://vulncheck.com/xdb/927806a24931||https://vulncheck.com/xdb/927806a24931 , https://vulncheck.com/xdb/1e4c0da55540||https://vulncheck.com/xdb/1e4c0da55540
CVE-2019-1579 Palo Alto Networks PAN-OS 01/10/2022 0.92678 8.1 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1579 https://vulncheck.com/xdb/85c8b6324594||https://vulncheck.com/xdb/85c8b6324594 , https://vulncheck.com/xdb/67ee89857898||https://vulncheck.com/xdb/67ee89857898
CVE-2017-1000486 Primetek Primefaces Application 01/10/2022 0.94042 9.8 https://viz.greynoise.io/tag/primetek-primefaces-remote-code-execution-attempt||https://viz.greynoise.io/tag/primetek-primefaces-remote-code-execution-attempt 3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-1000486 https://vulncheck.com/xdb/ffc4627a2dd9||https://vulncheck.com/xdb/ffc4627a2dd9 , https://vulncheck.com/xdb/f6b53a975b3f||https://vulncheck.com/xdb/f6b53a975b3f , https://vulncheck.com/xdb/dfc63da61fc3||https://vulncheck.com/xdb/dfc63da61fc3 , https://vulncheck.com/xdb/c1c0a0a16204||https://vulncheck.com/xdb/c1c0a0a16204 , https://vulncheck.com/xdb/4642f57dc130||https://vulncheck.com/xdb/4642f57dc130 , https://vulncheck.com/xdb/b6e923cbdccc||https://vulncheck.com/xdb/b6e923cbdccc
CVE-2019-7609 Elastic Kibana 01/10/2022 0.94448 10.0 https://viz.greynoise.io/tag/kibana-timelion-api-check||https://viz.greynoise.io/tag/kibana-timelion-api-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7609 https://vulncheck.com/xdb/99729775468d||https://vulncheck.com/xdb/99729775468d , https://vulncheck.com/xdb/1c48e403c9e9||https://vulncheck.com/xdb/1c48e403c9e9 , https://vulncheck.com/xdb/c711254ccffc||https://vulncheck.com/xdb/c711254ccffc , https://vulncheck.com/xdb/b2f2b26f8c21||https://vulncheck.com/xdb/b2f2b26f8c21 , https://vulncheck.com/xdb/31a2493d581c||https://vulncheck.com/xdb/31a2493d581c , https://vulncheck.com/xdb/47c366ae2f29||https://vulncheck.com/xdb/47c366ae2f29 , https://vulncheck.com/xdb/baa23d069da5||https://vulncheck.com/xdb/baa23d069da5 , https://vulncheck.com/xdb/1293a1a85b89||https://vulncheck.com/xdb/1293a1a85b89 , https://vulncheck.com/xdb/72f85a29c165||https://vulncheck.com/xdb/72f85a29c165 , https://vulncheck.com/xdb/b89478e4dff2||https://vulncheck.com/xdb/b89478e4dff2
CVE-2018-13382 Fortinet FortiOS and FortiProxy 01/10/2022 0.86675 9.1 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-13382 https://vulncheck.com/xdb/bac14e8d2f95||https://vulncheck.com/xdb/bac14e8d2f95 , https://vulncheck.com/xdb/9e3c1ae78338||https://vulncheck.com/xdb/9e3c1ae78338 , https://vulncheck.com/xdb/032ed957d9fa||https://vulncheck.com/xdb/032ed957d9fa
CVE-2021-43890 Microsoft Windows 12/15/2021 0.14934 7.1 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-43890
CVE-2021-4102 Google Chromium V8 12/15/2021 0.05265 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-4102
CVE-2017-17562 Embedthis GoAhead 12/10/2021 0.94053 8.1 https://viz.greynoise.io/tag/embedthis-goahead-cve-2017-17562-rce-attempt||https://viz.greynoise.io/tag/embedthis-goahead-cve-2017-17562-rce-attempt 0 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2017-17562 https://vulncheck.com/xdb/b9ed9b17c839||https://vulncheck.com/xdb/b9ed9b17c839 , https://vulncheck.com/xdb/0ada689082df||https://vulncheck.com/xdb/0ada689082df , https://vulncheck.com/xdb/1c9b08ce66c0||https://vulncheck.com/xdb/1c9b08ce66c0 , https://vulncheck.com/xdb/39de3deda1bb||https://vulncheck.com/xdb/39de3deda1bb
CVE-2020-8816 Pi-hole AdminLTE 12/10/2021 0.91018 9.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8816 https://vulncheck.com/xdb/d538eb462f37||https://vulncheck.com/xdb/d538eb462f37 , https://vulncheck.com/xdb/2ea27aaa590f||https://vulncheck.com/xdb/2ea27aaa590f , https://vulncheck.com/xdb/b5bf7ad01990||https://vulncheck.com/xdb/b5bf7ad01990
CVE-2019-10758 MongoDB mongo-express 12/10/2021 0.94361 9.9 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-10758 https://vulncheck.com/xdb/463bdb6b5b20||https://vulncheck.com/xdb/463bdb6b5b20 , https://vulncheck.com/xdb/b7262551c538||https://vulncheck.com/xdb/b7262551c538
CVE-2021-44168 Fortinet FortiOS 12/10/2021 0.01136 3.3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-44168 https://vulncheck.com/xdb/f4dc4ce29d25
CVE-2021-44515 Zoho Desktop Central 12/10/2021 0.94311 9.8 https://viz.greynoise.io/tag/zoho-manageengine-desktop-central-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-desktop-central-rce-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-44515
CVE-2020-17463 Fuel CMS Fuel CMS 12/10/2021 0.11837 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-17463
CVE-2019-0193 Apache Solr 12/10/2021 0.93525 7.2 https://viz.greynoise.io/tag/apache-solr-rce-attempt||https://viz.greynoise.io/tag/apache-solr-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0193 https://vulncheck.com/xdb/f9730ca2bcd0||https://vulncheck.com/xdb/f9730ca2bcd0 , https://vulncheck.com/xdb/ccec007287ba||https://vulncheck.com/xdb/ccec007287ba , https://vulncheck.com/xdb/0ff186cb197f||https://vulncheck.com/xdb/0ff186cb197f , https://vulncheck.com/xdb/c6f3730bd8f0||https://vulncheck.com/xdb/c6f3730bd8f0 , https://vulncheck.com/xdb/9ca69682db00||https://vulncheck.com/xdb/9ca69682db00
CVE-2010-1871 Red Hat JBoss Seam 2 12/10/2021 0.93853 8.8 https://viz.greynoise.io/tag/jboss-seam-rce-attempt||https://viz.greynoise.io/tag/jboss-seam-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-1871
CVE-2019-7238 Sonatype Nexus Repository Manager 12/10/2021 0.94184 9.8 https://viz.greynoise.io/tag/nexus-rce-attempt||https://viz.greynoise.io/tag/nexus-rce-attempt , https://viz.greynoise.io/tag/nexus-rce-vuln-check||https://viz.greynoise.io/tag/nexus-rce-vuln-check 4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7238 https://vulncheck.com/xdb/4da5a08d9ad8||https://vulncheck.com/xdb/4da5a08d9ad8 , https://vulncheck.com/xdb/ea23cc246706||https://vulncheck.com/xdb/ea23cc246706 , https://vulncheck.com/xdb/3edc0bb5ba96||https://vulncheck.com/xdb/3edc0bb5ba96 , https://vulncheck.com/xdb/3190c1277623||https://vulncheck.com/xdb/3190c1277623 , https://vulncheck.com/xdb/b3a349f42d18||https://vulncheck.com/xdb/b3a349f42d18
CVE-2019-13272 Linux Kernel 12/10/2021 0.75438 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-13272 https://vulncheck.com/xdb/a750816d33ab||https://vulncheck.com/xdb/a750816d33ab , https://vulncheck.com/xdb/ed71c71d1008||https://vulncheck.com/xdb/ed71c71d1008 , https://vulncheck.com/xdb/4cdc3b31592d||https://vulncheck.com/xdb/4cdc3b31592d , https://vulncheck.com/xdb/5581a09e1c77||https://vulncheck.com/xdb/5581a09e1c77 , https://vulncheck.com/xdb/72cbc61fa5c1||https://vulncheck.com/xdb/72cbc61fa5c1 , https://vulncheck.com/xdb/7500952732c6||https://vulncheck.com/xdb/7500952732c6 , https://vulncheck.com/xdb/95bb9eeffab4||https://vulncheck.com/xdb/95bb9eeffab4 , https://vulncheck.com/xdb/94bf994e3e35||https://vulncheck.com/xdb/94bf994e3e35 , https://vulncheck.com/xdb/1df2059c8c67||https://vulncheck.com/xdb/1df2059c8c67 , https://vulncheck.com/xdb/aebd1e7d7dfe||https://vulncheck.com/xdb/aebd1e7d7dfe
CVE-2021-44228 Apache Log4j2 12/10/2021 0.94358 10.0 https://viz.greynoise.io/tag/apache-log4j-rce-attempt||https://viz.greynoise.io/tag/apache-log4j-rce-attempt 12 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-44228 https://vulncheck.com/xdb/dba45441fe51||https://vulncheck.com/xdb/dba45441fe51 , https://vulncheck.com/xdb/a29851f816e5||https://vulncheck.com/xdb/a29851f816e5 , https://vulncheck.com/xdb/54a722d3152a||https://vulncheck.com/xdb/54a722d3152a , https://vulncheck.com/xdb/1f6ed84ff8ce||https://vulncheck.com/xdb/1f6ed84ff8ce , https://vulncheck.com/xdb/c29640a5f3eb||https://vulncheck.com/xdb/c29640a5f3eb , https://vulncheck.com/xdb/d33dca9d017b||https://vulncheck.com/xdb/d33dca9d017b , https://vulncheck.com/xdb/979783a8957b||https://vulncheck.com/xdb/979783a8957b , https://vulncheck.com/xdb/56c1c3c26112||https://vulncheck.com/xdb/56c1c3c26112 , https://vulncheck.com/xdb/5c6c4e68c806||https://vulncheck.com/xdb/5c6c4e68c806 , https://vulncheck.com/xdb/c9cb2e8864a3||https://vulncheck.com/xdb/c9cb2e8864a3 , https://vulncheck.com/xdb/88e63ac32997||https://vulncheck.com/xdb/88e63ac32997 , https://vulncheck.com/xdb/3a9ab83bcad0||https://vulncheck.com/xdb/3a9ab83bcad0 , https://vulncheck.com/xdb/c057d8038a5a||https://vulncheck.com/xdb/c057d8038a5a , https://vulncheck.com/xdb/97d627f4b9ba||https://vulncheck.com/xdb/97d627f4b9ba , https://vulncheck.com/xdb/21a43cd9e827||https://vulncheck.com/xdb/21a43cd9e827 , https://vulncheck.com/xdb/c2e335ff1a21||https://vulncheck.com/xdb/c2e335ff1a21 , https://vulncheck.com/xdb/4620cd5b1d60||https://vulncheck.com/xdb/4620cd5b1d60 , https://vulncheck.com/xdb/d8f0374c0fb9||https://vulncheck.com/xdb/d8f0374c0fb9 , https://vulncheck.com/xdb/5cf83af550fe||https://vulncheck.com/xdb/5cf83af550fe , https://vulncheck.com/xdb/891de99c4645||https://vulncheck.com/xdb/891de99c4645 , https://vulncheck.com/xdb/fb07ce8d99af||https://vulncheck.com/xdb/fb07ce8d99af , https://vulncheck.com/xdb/591512073cfa||https://vulncheck.com/xdb/591512073cfa , https://vulncheck.com/xdb/acf764964e3d||https://vulncheck.com/xdb/acf764964e3d , https://vulncheck.com/xdb/7d9d51922da4||https://vulncheck.com/xdb/7d9d51922da4 , https://vulncheck.com/xdb/3c41edcbcaf2||https://vulncheck.com/xdb/3c41edcbcaf2 , https://vulncheck.com/xdb/a19435132a43||https://vulncheck.com/xdb/a19435132a43 , https://vulncheck.com/xdb/97fe40642663||https://vulncheck.com/xdb/97fe40642663 , https://vulncheck.com/xdb/c0e60d5638ed||https://vulncheck.com/xdb/c0e60d5638ed , https://vulncheck.com/xdb/326e6538c620||https://vulncheck.com/xdb/326e6538c620 , https://vulncheck.com/xdb/7527d4f5f2a0||https://vulncheck.com/xdb/7527d4f5f2a0 , https://vulncheck.com/xdb/c63aff84cb37||https://vulncheck.com/xdb/c63aff84cb37 , https://vulncheck.com/xdb/2da304372505||https://vulncheck.com/xdb/2da304372505 , https://vulncheck.com/xdb/d372d3b26376||https://vulncheck.com/xdb/d372d3b26376 , https://vulncheck.com/xdb/f57f14ebef6c||https://vulncheck.com/xdb/f57f14ebef6c , https://vulncheck.com/xdb/77ee0efab407||https://vulncheck.com/xdb/77ee0efab407 , https://vulncheck.com/xdb/1f9ebf288986||https://vulncheck.com/xdb/1f9ebf288986 , https://vulncheck.com/xdb/33d1b4584ee8||https://vulncheck.com/xdb/33d1b4584ee8 , https://vulncheck.com/xdb/d8fa91bbd26c||https://vulncheck.com/xdb/d8fa91bbd26c , https://vulncheck.com/xdb/067762c45d29||https://vulncheck.com/xdb/067762c45d29 , https://vulncheck.com/xdb/03e32dfe2489||https://vulncheck.com/xdb/03e32dfe2489 , https://vulncheck.com/xdb/f161ac09099f||https://vulncheck.com/xdb/f161ac09099f , https://vulncheck.com/xdb/841758b2d4f4||https://vulncheck.com/xdb/841758b2d4f4 , https://vulncheck.com/xdb/78f6e0136a54||https://vulncheck.com/xdb/78f6e0136a54 , https://vulncheck.com/xdb/3b6093e72b93||https://vulncheck.com/xdb/3b6093e72b93 , https://vulncheck.com/xdb/a0ead52c9280||https://vulncheck.com/xdb/a0ead52c9280 , https://vulncheck.com/xdb/bb0d040b4903||https://vulncheck.com/xdb/bb0d040b4903 , https://vulncheck.com/xdb/fed04c94a2dc||https://vulncheck.com/xdb/fed04c94a2dc , https://vulncheck.com/xdb/586ef33d6a3a||https://vulncheck.com/xdb/586ef33d6a3a , https://vulncheck.com/xdb/ba3e7e5b416c||https://vulncheck.com/xdb/ba3e7e5b416c , https://vulncheck.com/xdb/a313ecfd69ac||https://vulncheck.com/xdb/a313ecfd69ac , https://vulncheck.com/xdb/a6af622ffa8b||https://vulncheck.com/xdb/a6af622ffa8b , https://vulncheck.com/xdb/3d55c6b2d5fb||https://vulncheck.com/xdb/3d55c6b2d5fb , https://vulncheck.com/xdb/620853d6da36||https://vulncheck.com/xdb/620853d6da36 , https://vulncheck.com/xdb/2ae20daa876f||https://vulncheck.com/xdb/2ae20daa876f , https://vulncheck.com/xdb/bc6bb6bf5116||https://vulncheck.com/xdb/bc6bb6bf5116 , https://vulncheck.com/xdb/9516d10f9dc1||https://vulncheck.com/xdb/9516d10f9dc1 , https://vulncheck.com/xdb/1f35dbf46c65||https://vulncheck.com/xdb/1f35dbf46c65 , https://vulncheck.com/xdb/d3b4139ec745||https://vulncheck.com/xdb/d3b4139ec745 , https://vulncheck.com/xdb/193cf7c8c810||https://vulncheck.com/xdb/193cf7c8c810 , https://vulncheck.com/xdb/60c07310e663||https://vulncheck.com/xdb/60c07310e663 , https://vulncheck.com/xdb/c555ac264c6e||https://vulncheck.com/xdb/c555ac264c6e , https://vulncheck.com/xdb/a57024d99795||https://vulncheck.com/xdb/a57024d99795 , https://vulncheck.com/xdb/94dd05cb788b||https://vulncheck.com/xdb/94dd05cb788b
CVE-2017-12149 Red Hat JBoss Application Server 12/10/2021 0.94313 9.8 https://viz.greynoise.io/tag/jboss-application-server-rce-attempt||https://viz.greynoise.io/tag/jboss-application-server-rce-attempt , https://viz.greynoise.io/tag/jboss-application-server-cve-2017-12149-check||https://viz.greynoise.io/tag/jboss-application-server-cve-2017-12149-check 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-12149 https://vulncheck.com/xdb/62b031b6de05||https://vulncheck.com/xdb/62b031b6de05 , https://vulncheck.com/xdb/e9c9ec72c858||https://vulncheck.com/xdb/e9c9ec72c858 , https://vulncheck.com/xdb/df44860bdefc||https://vulncheck.com/xdb/df44860bdefc , https://vulncheck.com/xdb/6f98930c129d||https://vulncheck.com/xdb/6f98930c129d , https://vulncheck.com/xdb/0f8c52cba95a||https://vulncheck.com/xdb/0f8c52cba95a , https://vulncheck.com/xdb/048f545b0177||https://vulncheck.com/xdb/048f545b0177 , https://vulncheck.com/xdb/a775feeaa5fd||https://vulncheck.com/xdb/a775feeaa5fd , https://vulncheck.com/xdb/b37a3f028f09||https://vulncheck.com/xdb/b37a3f028f09 , https://vulncheck.com/xdb/93fd63db9635||https://vulncheck.com/xdb/93fd63db9635 , https://vulncheck.com/xdb/9291e025d38e||https://vulncheck.com/xdb/9291e025d38e , https://vulncheck.com/xdb/4f659f46be37||https://vulncheck.com/xdb/4f659f46be37 , https://vulncheck.com/xdb/d9f3bd9b80b5||https://vulncheck.com/xdb/d9f3bd9b80b5 , https://vulncheck.com/xdb/288d8baf4ead||https://vulncheck.com/xdb/288d8baf4ead , https://vulncheck.com/xdb/07509b590e3a||https://vulncheck.com/xdb/07509b590e3a , https://vulncheck.com/xdb/b933736f9e33||https://vulncheck.com/xdb/b933736f9e33
CVE-2021-35394 Realtek Jungle Software Development Kit (SDK) 12/10/2021 0.94335 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-35394
CVE-2018-14847 MikroTik RouterOS 12/01/2021 0.92843 9.1 https://viz.greynoise.io/tag/mikrotik-worm-rce-attempt||https://viz.greynoise.io/tag/mikrotik-worm-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-14847 https://vulncheck.com/xdb/128e7317908a||https://vulncheck.com/xdb/128e7317908a , https://vulncheck.com/xdb/81478e4d3f7c||https://vulncheck.com/xdb/81478e4d3f7c , https://vulncheck.com/xdb/64a0a764b901||https://vulncheck.com/xdb/64a0a764b901 , https://vulncheck.com/xdb/73631394b47a||https://vulncheck.com/xdb/73631394b47a , https://vulncheck.com/xdb/3a5dba2e76ad||https://vulncheck.com/xdb/3a5dba2e76ad , https://vulncheck.com/xdb/3d8ffb2a755a||https://vulncheck.com/xdb/3d8ffb2a755a , https://vulncheck.com/xdb/5ae17ea456eb||https://vulncheck.com/xdb/5ae17ea456eb , https://vulncheck.com/xdb/b611d9ebb286||https://vulncheck.com/xdb/b611d9ebb286 , https://vulncheck.com/xdb/02375d13c888||https://vulncheck.com/xdb/02375d13c888 , https://vulncheck.com/xdb/895d08413809||https://vulncheck.com/xdb/895d08413809 , https://vulncheck.com/xdb/6e85f1153945||https://vulncheck.com/xdb/6e85f1153945 , https://vulncheck.com/xdb/c9e4be4e4345||https://vulncheck.com/xdb/c9e4be4e4345 , https://vulncheck.com/xdb/ca877293c1a3||https://vulncheck.com/xdb/ca877293c1a3 , https://vulncheck.com/xdb/792af1f0da8f||https://vulncheck.com/xdb/792af1f0da8f , https://vulncheck.com/xdb/572a58ec0205||https://vulncheck.com/xdb/572a58ec0205 , https://vulncheck.com/xdb/6083a1b3aeeb||https://vulncheck.com/xdb/6083a1b3aeeb , https://vulncheck.com/xdb/50f4e94eddfd||https://vulncheck.com/xdb/50f4e94eddfd , https://vulncheck.com/xdb/8317dffde425||https://vulncheck.com/xdb/8317dffde425
CVE-2021-40438 Apache Apache 12/01/2021 0.94432 9.0 https://viz.greynoise.io/tag/apache-http-server-mod-proxy-ssrf-attempt||https://viz.greynoise.io/tag/apache-http-server-mod-proxy-ssrf-attempt 1 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40438 https://vulncheck.com/xdb/4961483e1a12||https://vulncheck.com/xdb/4961483e1a12 , https://vulncheck.com/xdb/fa2660f09705||https://vulncheck.com/xdb/fa2660f09705 , https://vulncheck.com/xdb/c2c694adbe9e||https://vulncheck.com/xdb/c2c694adbe9e , https://vulncheck.com/xdb/e06f4c13b530||https://vulncheck.com/xdb/e06f4c13b530
CVE-2020-11261 Qualcomm Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 12/01/2021 0.00286 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11261
CVE-2021-37415 Zoho ManageEngine ServiceDesk Plus (SDP) 12/01/2021 0.89357 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-37415
CVE-2021-44077 Zoho ManageEngine ServiceDesk Plus (SDP) / SupportCenter Plus 12/01/2021 0.94174 9.8 https://viz.greynoise.io/tag/zoho-manageengine-servicedesk-plus-msiexec-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-servicedesk-plus-msiexec-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-44077 https://vulncheck.com/xdb/ac0bb8719a41||https://vulncheck.com/xdb/ac0bb8719a41 , https://vulncheck.com/xdb/8f06ee8f835e||https://vulncheck.com/xdb/8f06ee8f835e
CVE-2021-42292 Microsoft Office 11/17/2021 0.17906 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42292
CVE-2021-40449 Microsoft Windows 11/17/2021 0.84576 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40449 https://vulncheck.com/xdb/581985ad426e||https://vulncheck.com/xdb/581985ad426e , https://vulncheck.com/xdb/1d1392710a3c||https://vulncheck.com/xdb/1d1392710a3c , https://vulncheck.com/xdb/32687d6a60ea||https://vulncheck.com/xdb/32687d6a60ea , https://vulncheck.com/xdb/dccb5f085c09||https://vulncheck.com/xdb/dccb5f085c09 , https://vulncheck.com/xdb/0361271769af||https://vulncheck.com/xdb/0361271769af , https://vulncheck.com/xdb/313e377808dd||https://vulncheck.com/xdb/313e377808dd , https://vulncheck.com/xdb/34af326d80a1||https://vulncheck.com/xdb/34af326d80a1 , https://vulncheck.com/xdb/97c8caf60062||https://vulncheck.com/xdb/97c8caf60062 , https://vulncheck.com/xdb/83a3a8086e22||https://vulncheck.com/xdb/83a3a8086e22
CVE-2021-22204 Perl Exiftool 11/17/2021 0.93188 6.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22204 https://vulncheck.com/xdb/c7f016c6ff9c||https://vulncheck.com/xdb/c7f016c6ff9c , https://vulncheck.com/xdb/c1c6e7d5d1dc||https://vulncheck.com/xdb/c1c6e7d5d1dc , https://vulncheck.com/xdb/228b3b833130||https://vulncheck.com/xdb/228b3b833130 , https://vulncheck.com/xdb/2e739ce176b6||https://vulncheck.com/xdb/2e739ce176b6 , https://vulncheck.com/xdb/9c966b28d48a||https://vulncheck.com/xdb/9c966b28d48a , https://vulncheck.com/xdb/195f85ead56c||https://vulncheck.com/xdb/195f85ead56c , https://vulncheck.com/xdb/c1144f28258f||https://vulncheck.com/xdb/c1144f28258f , https://vulncheck.com/xdb/72105893a08a||https://vulncheck.com/xdb/72105893a08a , https://vulncheck.com/xdb/793a0410f319||https://vulncheck.com/xdb/793a0410f319 , https://vulncheck.com/xdb/0e17974417e2||https://vulncheck.com/xdb/0e17974417e2 , https://vulncheck.com/xdb/0c2c0a7d6b52||https://vulncheck.com/xdb/0c2c0a7d6b52
CVE-2021-42321 Microsoft Exchange 11/17/2021 0.93507 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42321 https://vulncheck.com/xdb/a0c967a6a2a7||https://vulncheck.com/xdb/a0c967a6a2a7 , https://vulncheck.com/xdb/ccd1d085c51d||https://vulncheck.com/xdb/ccd1d085c51d , https://vulncheck.com/xdb/4887f2112df9||https://vulncheck.com/xdb/4887f2112df9
CVE-2021-34448 Microsoft Windows 11/03/2021 0.02807 6.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-34448
CVE-2018-6789 Exim Exim 11/03/2021 0.84925 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-6789 https://vulncheck.com/xdb/fdfb46b03625||https://vulncheck.com/xdb/fdfb46b03625 , https://vulncheck.com/xdb/9513d11d58b1||https://vulncheck.com/xdb/9513d11d58b1 , https://vulncheck.com/xdb/648ffe0af5ad||https://vulncheck.com/xdb/648ffe0af5ad , https://vulncheck.com/xdb/59557009b138||https://vulncheck.com/xdb/59557009b138
CVE-2019-9978 WordPress Social Warfare Plugin 11/03/2021 0.88916 6.1 https://viz.greynoise.io/tag/wordpress-social-warfare-stored-xss-attempt||https://viz.greynoise.io/tag/wordpress-social-warfare-stored-xss-attempt 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-9978 https://vulncheck.com/xdb/4f8c76c78bce||https://vulncheck.com/xdb/4f8c76c78bce , https://vulncheck.com/xdb/e62bb9f01805||https://vulncheck.com/xdb/e62bb9f01805 , https://vulncheck.com/xdb/89a9def6ffed||https://vulncheck.com/xdb/89a9def6ffed , https://vulncheck.com/xdb/b1aa6ec20c75||https://vulncheck.com/xdb/b1aa6ec20c75 , https://vulncheck.com/xdb/797f3f17dcb3||https://vulncheck.com/xdb/797f3f17dcb3 , https://vulncheck.com/xdb/5b8f3f707d29||https://vulncheck.com/xdb/5b8f3f707d29 , https://vulncheck.com/xdb/4c5c4c61dda3||https://vulncheck.com/xdb/4c5c4c61dda3 , https://vulncheck.com/xdb/5fa69ee6d630||https://vulncheck.com/xdb/5fa69ee6d630 , https://vulncheck.com/xdb/7621c2e4cc97||https://vulncheck.com/xdb/7621c2e4cc97
CVE-2017-5638 Apache Struts 11/03/2021 0.94267 9.8 https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-worm-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-worm-attempt , https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2017-5638-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-5638 https://vulncheck.com/xdb/24ab649cd1da||https://vulncheck.com/xdb/24ab649cd1da , https://vulncheck.com/xdb/9eeabd073ffe||https://vulncheck.com/xdb/9eeabd073ffe , https://vulncheck.com/xdb/af94773df67e||https://vulncheck.com/xdb/af94773df67e , https://vulncheck.com/xdb/7609b3e7cb98||https://vulncheck.com/xdb/7609b3e7cb98 , https://vulncheck.com/xdb/f47a53762ef3||https://vulncheck.com/xdb/f47a53762ef3 , https://vulncheck.com/xdb/fb291c123615||https://vulncheck.com/xdb/fb291c123615 , https://vulncheck.com/xdb/1992a6b42411||https://vulncheck.com/xdb/1992a6b42411 , https://vulncheck.com/xdb/9b37ededd8ac||https://vulncheck.com/xdb/9b37ededd8ac , https://vulncheck.com/xdb/9c7436629672||https://vulncheck.com/xdb/9c7436629672 , https://vulncheck.com/xdb/fe25757247c8||https://vulncheck.com/xdb/fe25757247c8 , https://vulncheck.com/xdb/a920eeb5ee6a||https://vulncheck.com/xdb/a920eeb5ee6a , https://vulncheck.com/xdb/2372c571d51b||https://vulncheck.com/xdb/2372c571d51b , https://vulncheck.com/xdb/fecafad12e6c||https://vulncheck.com/xdb/fecafad12e6c , https://vulncheck.com/xdb/513b57e55c0f||https://vulncheck.com/xdb/513b57e55c0f , https://vulncheck.com/xdb/dbca6ea08b41||https://vulncheck.com/xdb/dbca6ea08b41 , https://vulncheck.com/xdb/3c19ff65296a||https://vulncheck.com/xdb/3c19ff65296a , https://vulncheck.com/xdb/1e4bb0c90cb0||https://vulncheck.com/xdb/1e4bb0c90cb0 , https://vulncheck.com/xdb/ab1e48aab793||https://vulncheck.com/xdb/ab1e48aab793 , https://vulncheck.com/xdb/bbdb72777ec9||https://vulncheck.com/xdb/bbdb72777ec9 , https://vulncheck.com/xdb/34e73d61d621||https://vulncheck.com/xdb/34e73d61d621 , https://vulncheck.com/xdb/1aeac5628880||https://vulncheck.com/xdb/1aeac5628880 , https://vulncheck.com/xdb/b7fcc6ca47d8||https://vulncheck.com/xdb/b7fcc6ca47d8 , https://vulncheck.com/xdb/337989a2a577||https://vulncheck.com/xdb/337989a2a577 , https://vulncheck.com/xdb/5de84d7d0047||https://vulncheck.com/xdb/5de84d7d0047 , https://vulncheck.com/xdb/92284df22d05||https://vulncheck.com/xdb/92284df22d05 , https://vulncheck.com/xdb/b5c1ab2d5bc5||https://vulncheck.com/xdb/b5c1ab2d5bc5 , https://vulncheck.com/xdb/2ee648e8c5ab||https://vulncheck.com/xdb/2ee648e8c5ab , https://vulncheck.com/xdb/fae964aee837||https://vulncheck.com/xdb/fae964aee837 , https://vulncheck.com/xdb/df60c287f1cd||https://vulncheck.com/xdb/df60c287f1cd , https://vulncheck.com/xdb/20280d4b350b||https://vulncheck.com/xdb/20280d4b350b , https://vulncheck.com/xdb/5773e4ea569b||https://vulncheck.com/xdb/5773e4ea569b , https://vulncheck.com/xdb/b0439ebbc0c0||https://vulncheck.com/xdb/b0439ebbc0c0 , https://vulncheck.com/xdb/961d20815cd2||https://vulncheck.com/xdb/961d20815cd2 , https://vulncheck.com/xdb/5dfed5d68cbc||https://vulncheck.com/xdb/5dfed5d68cbc , https://vulncheck.com/xdb/1b42cf9134f3||https://vulncheck.com/xdb/1b42cf9134f3 , https://vulncheck.com/xdb/5bf0668927e9||https://vulncheck.com/xdb/5bf0668927e9 , https://vulncheck.com/xdb/f0dd214c0a71||https://vulncheck.com/xdb/f0dd214c0a71
CVE-2020-14750 Oracle WebLogic Server 11/03/2021 0.94435 9.8 https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-14750 https://vulncheck.com/xdb/895ba6c2e154||https://vulncheck.com/xdb/895ba6c2e154 , https://vulncheck.com/xdb/8999db0c6380||https://vulncheck.com/xdb/8999db0c6380 , https://vulncheck.com/xdb/631bc40f2bc1||https://vulncheck.com/xdb/631bc40f2bc1
CVE-2021-22502 Micro Focus Operation Bridge Reporter (OBR) 11/03/2021 0.93981 9.8 https://viz.greynoise.io/tag/micro-focus-obr-rce-attempt||https://viz.greynoise.io/tag/micro-focus-obr-rce-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22502
CVE-2021-31201 Microsoft Enhanced Cryptographic Provider 11/03/2021 0.00172 5.2 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31201
CVE-2017-11882 Microsoft Office 11/03/2021 0.94384 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-11882 https://vulncheck.com/xdb/09bbc90e9042||https://vulncheck.com/xdb/09bbc90e9042 , https://vulncheck.com/xdb/1beb5af7f34c||https://vulncheck.com/xdb/1beb5af7f34c , https://vulncheck.com/xdb/884e21913154||https://vulncheck.com/xdb/884e21913154 , https://vulncheck.com/xdb/f1dea32cd138||https://vulncheck.com/xdb/f1dea32cd138 , https://vulncheck.com/xdb/5df312e9ad12||https://vulncheck.com/xdb/5df312e9ad12 , https://vulncheck.com/xdb/b7c60553adc6||https://vulncheck.com/xdb/b7c60553adc6 , https://vulncheck.com/xdb/f3e789735124||https://vulncheck.com/xdb/f3e789735124 , https://vulncheck.com/xdb/29dd95b375f6||https://vulncheck.com/xdb/29dd95b375f6 , https://vulncheck.com/xdb/560639fdbb7b||https://vulncheck.com/xdb/560639fdbb7b , https://vulncheck.com/xdb/a22f4f0b4f81||https://vulncheck.com/xdb/a22f4f0b4f81 , https://vulncheck.com/xdb/7b4a8e276f3c||https://vulncheck.com/xdb/7b4a8e276f3c , https://vulncheck.com/xdb/2c706d9ab4e2||https://vulncheck.com/xdb/2c706d9ab4e2 , https://vulncheck.com/xdb/bd4146cb3e92||https://vulncheck.com/xdb/bd4146cb3e92 , https://vulncheck.com/xdb/f99472e3e149||https://vulncheck.com/xdb/f99472e3e149 , https://vulncheck.com/xdb/1d994aebc6f7||https://vulncheck.com/xdb/1d994aebc6f7 , https://vulncheck.com/xdb/2289a5f14fd6||https://vulncheck.com/xdb/2289a5f14fd6 , https://vulncheck.com/xdb/f148343ee61b||https://vulncheck.com/xdb/f148343ee61b , https://vulncheck.com/xdb/e792aa5f248a||https://vulncheck.com/xdb/e792aa5f248a , https://vulncheck.com/xdb/a5ab3a44d45b||https://vulncheck.com/xdb/a5ab3a44d45b , https://vulncheck.com/xdb/ea0b976f167f||https://vulncheck.com/xdb/ea0b976f167f , https://vulncheck.com/xdb/40468e8cc38a||https://vulncheck.com/xdb/40468e8cc38a , https://vulncheck.com/xdb/94f46950b1a7||https://vulncheck.com/xdb/94f46950b1a7 , https://vulncheck.com/xdb/b33af3e3d9b8||https://vulncheck.com/xdb/b33af3e3d9b8 , https://vulncheck.com/xdb/047b151c3f07||https://vulncheck.com/xdb/047b151c3f07 , https://vulncheck.com/xdb/1ac59b46e457||https://vulncheck.com/xdb/1ac59b46e457 , https://vulncheck.com/xdb/5df1c82ae620||https://vulncheck.com/xdb/5df1c82ae620 , https://vulncheck.com/xdb/ce6706b8e64f||https://vulncheck.com/xdb/ce6706b8e64f , https://vulncheck.com/xdb/a5f8a5153c43||https://vulncheck.com/xdb/a5f8a5153c43 , https://vulncheck.com/xdb/e3d7500258d5||https://vulncheck.com/xdb/e3d7500258d5 , https://vulncheck.com/xdb/e74b79fd3ee0||https://vulncheck.com/xdb/e74b79fd3ee0
CVE-2021-30762 Apple iOS 11/03/2021 0.00097 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30762
CVE-2017-6327 Symantec Symantec Messaging Gateway 11/03/2021 0.85196 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-6327
CVE-2021-34473 Microsoft Exchange Server 11/03/2021 0.94302 9.1 https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-34473 https://vulncheck.com/xdb/1ccb86cf538d||https://vulncheck.com/xdb/1ccb86cf538d , https://vulncheck.com/xdb/02834fa0ca2d||https://vulncheck.com/xdb/02834fa0ca2d , https://vulncheck.com/xdb/08d5fad3f877||https://vulncheck.com/xdb/08d5fad3f877 , https://vulncheck.com/xdb/601ea61e6151||https://vulncheck.com/xdb/601ea61e6151 , https://vulncheck.com/xdb/fb5181ef3b37||https://vulncheck.com/xdb/fb5181ef3b37 , https://vulncheck.com/xdb/e3d11e8fb280||https://vulncheck.com/xdb/e3d11e8fb280 , https://vulncheck.com/xdb/9c56595a8e6c||https://vulncheck.com/xdb/9c56595a8e6c , https://vulncheck.com/xdb/d56981175d63||https://vulncheck.com/xdb/d56981175d63 , https://vulncheck.com/xdb/a8d10fec740c||https://vulncheck.com/xdb/a8d10fec740c , https://vulncheck.com/xdb/578064e03f67||https://vulncheck.com/xdb/578064e03f67
CVE-2017-16651 Roundcube Roundcube Webmail 11/03/2021 0.30531 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-16651 https://vulncheck.com/xdb/c1ac9329385f
CVE-2020-8193 Citrix Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance 11/03/2021 0.94349 6.5 https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-attempt||https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-attempt , https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-vuln-check||https://viz.greynoise.io/tag/citrix-adc-netscaler-auth-bypass-vuln-check 3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8193 https://vulncheck.com/xdb/45094a23fa50||https://vulncheck.com/xdb/45094a23fa50 , https://vulncheck.com/xdb/2f0df8b5e020||https://vulncheck.com/xdb/2f0df8b5e020 , https://vulncheck.com/xdb/81d3716d8fc3||https://vulncheck.com/xdb/81d3716d8fc3 , https://vulncheck.com/xdb/cf51c19c0f4e||https://vulncheck.com/xdb/cf51c19c0f4e
CVE-2021-31755 Tenda AC11 Router 11/03/2021 0.94230 9.8 https://viz.greynoise.io/tag/tenda-ac11-remote-command-execution-attempt||https://viz.greynoise.io/tag/tenda-ac11-remote-command-execution-attempt 2 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-31755
CVE-2021-27104 Accellion FTA 11/03/2021 0.03542 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27104
CVE-2017-0199 Microsoft Office and WordPad 11/03/2021 0.94366 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0199 https://vulncheck.com/xdb/7c99d68f36e5||https://vulncheck.com/xdb/7c99d68f36e5 , https://vulncheck.com/xdb/5b55113c6830||https://vulncheck.com/xdb/5b55113c6830 , https://vulncheck.com/xdb/9ef95e7ea4b5||https://vulncheck.com/xdb/9ef95e7ea4b5 , https://vulncheck.com/xdb/2924f4e487d3||https://vulncheck.com/xdb/2924f4e487d3 , https://vulncheck.com/xdb/532c2574ee56||https://vulncheck.com/xdb/532c2574ee56 , https://vulncheck.com/xdb/6318b2a065f3||https://vulncheck.com/xdb/6318b2a065f3 , https://vulncheck.com/xdb/306bb11d6afe||https://vulncheck.com/xdb/306bb11d6afe , https://vulncheck.com/xdb/ed3b3ae95b69||https://vulncheck.com/xdb/ed3b3ae95b69 , https://vulncheck.com/xdb/0dd660910a33||https://vulncheck.com/xdb/0dd660910a33 , https://vulncheck.com/xdb/970b6cfbc7fb||https://vulncheck.com/xdb/970b6cfbc7fb , https://vulncheck.com/xdb/aacae3861886||https://vulncheck.com/xdb/aacae3861886 , https://vulncheck.com/xdb/945fef08ea28||https://vulncheck.com/xdb/945fef08ea28
CVE-2017-9822 DotNetNuke (DNN) DotNetNuke (DNN) 11/03/2021 0.94348 8.8 https://viz.greynoise.io/tag/dotnetnuke-remote-code-execution-attempt||https://viz.greynoise.io/tag/dotnetnuke-remote-code-execution-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-9822 https://vulncheck.com/xdb/4b5fa5369011
CVE-2021-31199 Microsoft Enhanced Cryptographic Provider 11/03/2021 0.00462 5.2 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31199
CVE-2021-30713 Apple macOS 11/03/2021 0.00155 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30713
CVE-2021-37975 Google Chromium V8 11/03/2021 0.64079 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-37975
CVE-2020-10987 Tenda AC1900 Router AC15 Model 11/03/2021 0.93271 9.8 https://viz.greynoise.io/tag/tenda-ac15-ac1900-rce-attempt||https://viz.greynoise.io/tag/tenda-ac15-ac1900-rce-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10987
CVE-2021-37973 Google Chromium Portals 11/03/2021 0.15636 9.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-37973
CVE-2021-1905 Qualcomm Multiple Chipsets 11/03/2021 0.01130 8.4 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1905
CVE-2021-36742 Trend Micro Apex One, Apex One as a Service, and Worry-Free Business Security 11/03/2021 0.01032 7.8 FALSE FALSE FALSE https://success.trendmicro.com/dcx/s/solution/000287819?language=en_US, https://success.trendmicro.com/dcx/s/solution/000287820?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-36742
CVE-2021-1870 Apple iOS, iPadOS, and macOS 11/03/2021 0.00576 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1870
CVE-2021-35395 Realtek AP-Router SDK 11/03/2021 0.93834 9.8 https://viz.greynoise.io/tag/realtek-jungle-sdk-formwsc-injection-attempt||https://viz.greynoise.io/tag/realtek-jungle-sdk-formwsc-injection-attempt 2 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-35395
CVE-2021-21193 Google Chromium Blink 11/03/2021 0.12582 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21193
CVE-2021-31979 Microsoft Windows 11/03/2021 0.01032 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31979
CVE-2020-16010 Google Chrome for Android UI 11/03/2021 0.22079 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-16010
CVE-2021-30665 Apple Multiple Products 11/03/2021 0.00562 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30665
CVE-2016-9563 SAP NetWeaver 11/03/2021 0.41099 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-9563
CVE-2021-30554 Google Chromium WebGL 11/03/2021 0.24629 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30554
CVE-2020-17530 Apache Struts 11/03/2021 0.94395 9.8 https://viz.greynoise.io/tag/apache-struts-2-uibean-rce-attempt||https://viz.greynoise.io/tag/apache-struts-2-uibean-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-17530 https://vulncheck.com/xdb/5fd88116c567||https://vulncheck.com/xdb/5fd88116c567 , https://vulncheck.com/xdb/dbd52a7e6d06||https://vulncheck.com/xdb/dbd52a7e6d06 , https://vulncheck.com/xdb/e3fa2afdc5f2||https://vulncheck.com/xdb/e3fa2afdc5f2 , https://vulncheck.com/xdb/d5f1da1e2721||https://vulncheck.com/xdb/d5f1da1e2721 , https://vulncheck.com/xdb/de8e0e425aa8||https://vulncheck.com/xdb/de8e0e425aa8 , https://vulncheck.com/xdb/20d585ac92c4||https://vulncheck.com/xdb/20d585ac92c4 , https://vulncheck.com/xdb/2413521dca63||https://vulncheck.com/xdb/2413521dca63 , https://vulncheck.com/xdb/20acac973541||https://vulncheck.com/xdb/20acac973541 , https://vulncheck.com/xdb/bfb08d5ee460||https://vulncheck.com/xdb/bfb08d5ee460 , https://vulncheck.com/xdb/e2133615d248||https://vulncheck.com/xdb/e2133615d248
CVE-2020-0674 Microsoft Internet Explorer 11/03/2021 0.93744 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0674 https://vulncheck.com/xdb/50d2aa2b3f88||https://vulncheck.com/xdb/50d2aa2b3f88 , https://vulncheck.com/xdb/82aed25ddb79||https://vulncheck.com/xdb/82aed25ddb79 , https://vulncheck.com/xdb/e495092c8724||https://vulncheck.com/xdb/e495092c8724
CVE-2019-11539 Ivanti Pulse Connect Secure and Pulse Policy Secure 11/03/2021 0.93897 8.0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11539 https://vulncheck.com/xdb/35b5c0219071
CVE-2021-28550 Adobe Acrobat and Reader 11/03/2021 0.22947 9.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-28550
CVE-2019-1367 Microsoft Internet Explorer 11/03/2021 0.87865 7.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1367
CVE-2021-28310 Microsoft Win32k 11/03/2021 0.30565 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-28310
CVE-2021-1497 Cisco HyperFlex HX 11/03/2021 0.94402 9.8 https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt , https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1497
CVE-2021-27059 Microsoft Office 11/03/2021 0.01615 7.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27059
CVE-2019-5591 Fortinet FortiOS 11/03/2021 0.02431 6.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-5591
CVE-2021-27562 Arm Trusted Firmware 11/03/2021 0.69888 5.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27562
CVE-2018-0798 Microsoft Office 11/03/2021 0.94180 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0798
CVE-2018-11776 Apache Struts 11/03/2021 0.94427 8.1 https://viz.greynoise.io/tag/apache-struts-cve-2018-11776-worm-attempt||https://viz.greynoise.io/tag/apache-struts-cve-2018-11776-worm-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-11776 https://vulncheck.com/xdb/3c27e7312b41||https://vulncheck.com/xdb/3c27e7312b41 , https://vulncheck.com/xdb/3dd317159905||https://vulncheck.com/xdb/3dd317159905 , https://vulncheck.com/xdb/e1d36328bfd4||https://vulncheck.com/xdb/e1d36328bfd4 , https://vulncheck.com/xdb/df6d7ff7d1ec||https://vulncheck.com/xdb/df6d7ff7d1ec , https://vulncheck.com/xdb/80e42f4cab6b||https://vulncheck.com/xdb/80e42f4cab6b , https://vulncheck.com/xdb/7380914b3f92||https://vulncheck.com/xdb/7380914b3f92 , https://vulncheck.com/xdb/9047aecb9a46||https://vulncheck.com/xdb/9047aecb9a46 , https://vulncheck.com/xdb/306db2bfde48||https://vulncheck.com/xdb/306db2bfde48 , https://vulncheck.com/xdb/b26aba013508||https://vulncheck.com/xdb/b26aba013508 , https://vulncheck.com/xdb/8b73fc205202||https://vulncheck.com/xdb/8b73fc205202 , https://vulncheck.com/xdb/1d30c749488d||https://vulncheck.com/xdb/1d30c749488d , https://vulncheck.com/xdb/4ab6e9a43949||https://vulncheck.com/xdb/4ab6e9a43949 , https://vulncheck.com/xdb/db2bd9c38413||https://vulncheck.com/xdb/db2bd9c38413 , https://vulncheck.com/xdb/515a9f223269||https://vulncheck.com/xdb/515a9f223269
CVE-2016-7255 Microsoft Win32k 11/03/2021 0.89359 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-7255 https://vulncheck.com/xdb/1dd5ad8d8734||https://vulncheck.com/xdb/1dd5ad8d8734 , https://vulncheck.com/xdb/1e9766c4be72||https://vulncheck.com/xdb/1e9766c4be72 , https://vulncheck.com/xdb/b365d8ec807c||https://vulncheck.com/xdb/b365d8ec807c , https://vulncheck.com/xdb/f21c23b2b8d5||https://vulncheck.com/xdb/f21c23b2b8d5 , https://vulncheck.com/xdb/ab696903a116||https://vulncheck.com/xdb/ab696903a116
CVE-2021-21017 Adobe Acrobat and Reader 11/03/2021 0.90595 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21017 https://vulncheck.com/xdb/457522b96e6d
CVE-2020-24557 Trend Micro Apex One, OfficeScan, and Worry-Free Business Security 11/03/2021 0.01017 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-24557
CVE-2021-21224 Google Chromium V8 11/03/2021 0.66739 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21224 https://vulncheck.com/xdb/7eba2235c681
CVE-2021-20021 SonicWall SonicWall Email Security 11/03/2021 0.84950 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20021
CVE-2021-31207 Microsoft Exchange Server 11/03/2021 0.93967 6.6 https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31207 https://vulncheck.com/xdb/07bd4d555cdf||https://vulncheck.com/xdb/07bd4d555cdf , https://vulncheck.com/xdb/a3fe043e08b0||https://vulncheck.com/xdb/a3fe043e08b0 , https://vulncheck.com/xdb/1d7dc126a5ac||https://vulncheck.com/xdb/1d7dc126a5ac , https://vulncheck.com/xdb/ab905d9d8707||https://vulncheck.com/xdb/ab905d9d8707 , https://vulncheck.com/xdb/8b4ff5e8b18a||https://vulncheck.com/xdb/8b4ff5e8b18a , https://vulncheck.com/xdb/4741f2b07316||https://vulncheck.com/xdb/4741f2b07316
CVE-2021-40444 Microsoft MSHTML 11/03/2021 0.94291 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40444 https://vulncheck.com/xdb/7e430bace93f||https://vulncheck.com/xdb/7e430bace93f , https://vulncheck.com/xdb/19c332e12d63||https://vulncheck.com/xdb/19c332e12d63 , https://vulncheck.com/xdb/d20aa5c71d42||https://vulncheck.com/xdb/d20aa5c71d42 , https://vulncheck.com/xdb/12be0ac785f6||https://vulncheck.com/xdb/12be0ac785f6 , https://vulncheck.com/xdb/8772ca6900ac||https://vulncheck.com/xdb/8772ca6900ac , https://vulncheck.com/xdb/b0dcf99bb489||https://vulncheck.com/xdb/b0dcf99bb489 , https://vulncheck.com/xdb/df7c894fd424||https://vulncheck.com/xdb/df7c894fd424 , https://vulncheck.com/xdb/7aaf744b4107||https://vulncheck.com/xdb/7aaf744b4107 , https://vulncheck.com/xdb/0314f5542800||https://vulncheck.com/xdb/0314f5542800 , https://vulncheck.com/xdb/0a14a2a0a7d0||https://vulncheck.com/xdb/0a14a2a0a7d0 , https://vulncheck.com/xdb/7ab0ea4d6122||https://vulncheck.com/xdb/7ab0ea4d6122 , https://vulncheck.com/xdb/8898a986e5b4||https://vulncheck.com/xdb/8898a986e5b4 , https://vulncheck.com/xdb/4d7cd714a253||https://vulncheck.com/xdb/4d7cd714a253 , https://vulncheck.com/xdb/8bc0a3fef89c||https://vulncheck.com/xdb/8bc0a3fef89c , https://vulncheck.com/xdb/488dd6b83a3a||https://vulncheck.com/xdb/488dd6b83a3a , https://vulncheck.com/xdb/834486323132||https://vulncheck.com/xdb/834486323132 , https://vulncheck.com/xdb/f40045a34384||https://vulncheck.com/xdb/f40045a34384 , https://vulncheck.com/xdb/82c5f73256d8||https://vulncheck.com/xdb/82c5f73256d8 , https://vulncheck.com/xdb/d5396d15ae8b||https://vulncheck.com/xdb/d5396d15ae8b , https://vulncheck.com/xdb/2b08563b64ee||https://vulncheck.com/xdb/2b08563b64ee
CVE-2020-1054 Microsoft Win32k 11/03/2021 0.80387 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1054 https://vulncheck.com/xdb/4489682b75c5||https://vulncheck.com/xdb/4489682b75c5 , https://vulncheck.com/xdb/12c12764e783||https://vulncheck.com/xdb/12c12764e783 , https://vulncheck.com/xdb/515b78d81889||https://vulncheck.com/xdb/515b78d81889 , https://vulncheck.com/xdb/c99b688a26fb||https://vulncheck.com/xdb/c99b688a26fb , https://vulncheck.com/xdb/665dc3f05a7d||https://vulncheck.com/xdb/665dc3f05a7d
CVE-2021-37976 Google Chromium 11/03/2021 0.11445 6.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-37976
CVE-2018-4939 Adobe ColdFusion 11/03/2021 0.85528 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-4939
CVE-2021-36741 Trend Micro Apex One, Apex One as a Service, and Worry-Free Business Security 11/03/2021 0.00941 8.8 FALSE FALSE FALSE https://success.trendmicro.com/dcx/s/solution/000287819?language=en_US, https://success.trendmicro.com/dcx/s/solution/000287820?language=en_US; https://nvd.nist.gov/vuln/detail/CVE-2021-36741
CVE-2020-11738 WordPress Snap Creek Duplicator Plugin 11/03/2021 0.94304 7.5 https://viz.greynoise.io/tag/wordpress-duplicator-plugin-directory-traversal-attempt||https://viz.greynoise.io/tag/wordpress-duplicator-plugin-directory-traversal-attempt 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11738 https://vulncheck.com/xdb/af1b7e9376f3
CVE-2021-33742 Microsoft Windows 11/03/2021 0.57248 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-33742
CVE-2019-9082 ThinkPHP ThinkPHP 11/03/2021 0.94149 8.8 https://viz.greynoise.io/tag/thinkphp-code-execution-attempt||https://viz.greynoise.io/tag/thinkphp-code-execution-attempt , https://viz.greynoise.io/tag/thinkphp-hydra-php-webshell-upload-attempt||https://viz.greynoise.io/tag/thinkphp-hydra-php-webshell-upload-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-9082
CVE-2021-33739 Microsoft Windows 11/03/2021 0.12897 8.4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-33739 https://vulncheck.com/xdb/afe35658a490||https://vulncheck.com/xdb/afe35658a490 , https://vulncheck.com/xdb/31ac107a9305||https://vulncheck.com/xdb/31ac107a9305
CVE-2018-15811 DotNetNuke (DNN) DotNetNuke (DNN) 11/03/2021 0.76118 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-15811
CVE-2021-26857 Microsoft Exchange Server 11/03/2021 0.06988 7.8 TRUE TRUE FALSE Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26857 https://vulncheck.com/xdb/44004c1ba2b3
CVE-2019-19356 Netis WF2419 Devices 11/03/2021 0.88896 7.5 https://viz.greynoise.io/tag/netis-wf2419-rce-attempt||https://viz.greynoise.io/tag/netis-wf2419-rce-attempt 0 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2019-19356 https://vulncheck.com/xdb/c0731b8ba0cb
CVE-2021-21206 Google Chromium Blink 11/03/2021 0.22657 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21206
CVE-2019-4716 IBM Planning Analytics 11/03/2021 0.76966 10.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-4716
CVE-2019-2215 Android Android Kernel 11/03/2021 0.43886 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-2215 https://vulncheck.com/xdb/94306aabca16||https://vulncheck.com/xdb/94306aabca16 , https://vulncheck.com/xdb/604294a627ba||https://vulncheck.com/xdb/604294a627ba , https://vulncheck.com/xdb/d23821631cf3||https://vulncheck.com/xdb/d23821631cf3 , https://vulncheck.com/xdb/7c2171bd00f8||https://vulncheck.com/xdb/7c2171bd00f8 , https://vulncheck.com/xdb/5a63ca2255f9||https://vulncheck.com/xdb/5a63ca2255f9 , https://vulncheck.com/xdb/7a600a9b57a1||https://vulncheck.com/xdb/7a600a9b57a1 , https://vulncheck.com/xdb/7c94a8838bcd||https://vulncheck.com/xdb/7c94a8838bcd , https://vulncheck.com/xdb/efc0233357b1||https://vulncheck.com/xdb/efc0233357b1 , https://vulncheck.com/xdb/958e996c14b3||https://vulncheck.com/xdb/958e996c14b3 , https://vulncheck.com/xdb/f0574fcd7f48||https://vulncheck.com/xdb/f0574fcd7f48 , https://vulncheck.com/xdb/570fb66ac36f||https://vulncheck.com/xdb/570fb66ac36f , https://vulncheck.com/xdb/703d7ebd8c6a||https://vulncheck.com/xdb/703d7ebd8c6a , https://vulncheck.com/xdb/bb9d6564de2b||https://vulncheck.com/xdb/bb9d6564de2b , https://vulncheck.com/xdb/48c20484fa71||https://vulncheck.com/xdb/48c20484fa71 , https://vulncheck.com/xdb/382de53322b0||https://vulncheck.com/xdb/382de53322b0 , https://vulncheck.com/xdb/2efb36bee06f||https://vulncheck.com/xdb/2efb36bee06f , https://vulncheck.com/xdb/034793af86bc||https://vulncheck.com/xdb/034793af86bc , https://vulncheck.com/xdb/af8a91dc7ae5||https://vulncheck.com/xdb/af8a91dc7ae5 , https://vulncheck.com/xdb/de8c2754f71a||https://vulncheck.com/xdb/de8c2754f71a , https://vulncheck.com/xdb/30246787d03d||https://vulncheck.com/xdb/30246787d03d , https://vulncheck.com/xdb/b769e46ca29c||https://vulncheck.com/xdb/b769e46ca29c , https://vulncheck.com/xdb/8042323a8edc||https://vulncheck.com/xdb/8042323a8edc
CVE-2020-25506 D-Link DNS-320 Device 11/03/2021 0.93863 9.8 https://viz.greynoise.io/tag/d-link-dns-320-rce-attempt||https://viz.greynoise.io/tag/d-link-dns-320-rce-attempt 3 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-25506
CVE-2020-0938 Microsoft Windows 11/03/2021 0.87450 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0938
CVE-2019-16256 SIMalliance Toolbox Browser 11/03/2021 0.42681 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-16256
CVE-2021-1871 Apple iOS, iPadOS, and macOS 11/03/2021 0.00997 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1871
CVE-2019-1215 Microsoft Windows 11/03/2021 0.02688 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1215 https://vulncheck.com/xdb/6bee59f3f26d||https://vulncheck.com/xdb/6bee59f3f26d , https://vulncheck.com/xdb/31037adc71bc||https://vulncheck.com/xdb/31037adc71bc
CVE-2019-0604 Microsoft SharePoint 11/03/2021 0.94392 9.8 https://viz.greynoise.io/tag/sharepoint-rce-attempt||https://viz.greynoise.io/tag/sharepoint-rce-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0604 https://vulncheck.com/xdb/cca6def6980c||https://vulncheck.com/xdb/cca6def6980c , https://vulncheck.com/xdb/b321302986c1||https://vulncheck.com/xdb/b321302986c1
CVE-2020-10199 Sonatype Nexus Repository 11/03/2021 0.94379 8.8 https://viz.greynoise.io/tag/nexus-repository-manager-cve-2020-10199-rce-attempt||https://viz.greynoise.io/tag/nexus-repository-manager-cve-2020-10199-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10199 https://vulncheck.com/xdb/ae19d3a890a2||https://vulncheck.com/xdb/ae19d3a890a2 , https://vulncheck.com/xdb/8f1e150efe66||https://vulncheck.com/xdb/8f1e150efe66 , https://vulncheck.com/xdb/9976ab7ad418||https://vulncheck.com/xdb/9976ab7ad418 , https://vulncheck.com/xdb/048585ad5357||https://vulncheck.com/xdb/048585ad5357 , https://vulncheck.com/xdb/7f2c12104507||https://vulncheck.com/xdb/7f2c12104507 , https://vulncheck.com/xdb/0f9f7c06a94a||https://vulncheck.com/xdb/0f9f7c06a94a
CVE-2019-17558 Apache Solr 11/03/2021 0.94474 7.5 https://viz.greynoise.io/tag/apache-solr-rce-attempt||https://viz.greynoise.io/tag/apache-solr-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-17558 https://vulncheck.com/xdb/6918ed306441||https://vulncheck.com/xdb/6918ed306441 , https://vulncheck.com/xdb/7bb322405f10||https://vulncheck.com/xdb/7bb322405f10
CVE-2019-1214 Microsoft Windows 11/03/2021 0.11690 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1214
CVE-2021-22986 F5 BIG-IP and BIG-IQ Centralized Management 11/03/2021 0.94485 9.8 https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-attempt , https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-cve-2021-22986||https://viz.greynoise.io/tag/f5-big-ip-icontrol-rce-cve-2021-22986 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22986 https://vulncheck.com/xdb/7ef17b2a67c8||https://vulncheck.com/xdb/7ef17b2a67c8 , https://vulncheck.com/xdb/f21108c1266d||https://vulncheck.com/xdb/f21108c1266d , https://vulncheck.com/xdb/d01e8176dce5||https://vulncheck.com/xdb/d01e8176dce5 , https://vulncheck.com/xdb/67d59972edde||https://vulncheck.com/xdb/67d59972edde , https://vulncheck.com/xdb/320fae5d1635||https://vulncheck.com/xdb/320fae5d1635 , https://vulncheck.com/xdb/37d1bc32376a||https://vulncheck.com/xdb/37d1bc32376a , https://vulncheck.com/xdb/c553095b1410||https://vulncheck.com/xdb/c553095b1410 , https://vulncheck.com/xdb/022bf13f255c||https://vulncheck.com/xdb/022bf13f255c , https://vulncheck.com/xdb/d719e86bdadb||https://vulncheck.com/xdb/d719e86bdadb , https://vulncheck.com/xdb/9ee47c54b7bd||https://vulncheck.com/xdb/9ee47c54b7bd , https://vulncheck.com/xdb/c08513ca427b||https://vulncheck.com/xdb/c08513ca427b
CVE-2019-0541 Microsoft MSHTML 11/03/2021 0.84144 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0541
CVE-2020-7961 Liferay Liferay Portal 11/03/2021 0.94412 9.8 https://viz.greynoise.io/tag/liferay-portal-rce-attempt||https://viz.greynoise.io/tag/liferay-portal-rce-attempt , https://viz.greynoise.io/tag/liferay-rce-vuln-check||https://viz.greynoise.io/tag/liferay-rce-vuln-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-7961 https://vulncheck.com/xdb/7a60b00ba043||https://vulncheck.com/xdb/7a60b00ba043 , https://vulncheck.com/xdb/132215df805c||https://vulncheck.com/xdb/132215df805c , https://vulncheck.com/xdb/d888e243ebd9||https://vulncheck.com/xdb/d888e243ebd9 , https://vulncheck.com/xdb/6e87149cbdcd||https://vulncheck.com/xdb/6e87149cbdcd , https://vulncheck.com/xdb/beb61a49daa0||https://vulncheck.com/xdb/beb61a49daa0 , https://vulncheck.com/xdb/5fbe8f7dc4b1||https://vulncheck.com/xdb/5fbe8f7dc4b1 , https://vulncheck.com/xdb/76603fe1d8bb||https://vulncheck.com/xdb/76603fe1d8bb
CVE-2019-0859 Microsoft Win32k 11/03/2021 0.10172 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0859 https://vulncheck.com/xdb/58f716d55f23
CVE-2020-17496 vBulletin vBulletin 11/03/2021 0.94222 9.8 https://viz.greynoise.io/tag/vbulletin-remote-command-execution-attempt||https://viz.greynoise.io/tag/vbulletin-remote-command-execution-attempt 5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-17496 https://vulncheck.com/xdb/a0ff1cf08dad
CVE-2019-0211 Apache HTTP Server 11/03/2021 0.88533 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0211 https://vulncheck.com/xdb/a8a29009807a||https://vulncheck.com/xdb/a8a29009807a , https://vulncheck.com/xdb/dc948a8b0165||https://vulncheck.com/xdb/dc948a8b0165
CVE-2021-21972 VMware vCenter Server 11/03/2021 0.93738 9.8 https://viz.greynoise.io/tag/vmware-vcenter-rce-vuln-check||https://viz.greynoise.io/tag/vmware-vcenter-rce-vuln-check , https://viz.greynoise.io/tag/vmware-vcenter-rce-attempt||https://viz.greynoise.io/tag/vmware-vcenter-rce-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21972 https://vulncheck.com/xdb/a59690df9cb5||https://vulncheck.com/xdb/a59690df9cb5 , https://vulncheck.com/xdb/a94c832dd944||https://vulncheck.com/xdb/a94c832dd944 , https://vulncheck.com/xdb/6b4434a13dfe||https://vulncheck.com/xdb/6b4434a13dfe , https://vulncheck.com/xdb/b31ce24a2fd8||https://vulncheck.com/xdb/b31ce24a2fd8 , https://vulncheck.com/xdb/dc0b46e20f6f||https://vulncheck.com/xdb/dc0b46e20f6f , https://vulncheck.com/xdb/a7861044684b||https://vulncheck.com/xdb/a7861044684b , https://vulncheck.com/xdb/88eb7edb230d||https://vulncheck.com/xdb/88eb7edb230d , https://vulncheck.com/xdb/631d9af3bfb8||https://vulncheck.com/xdb/631d9af3bfb8 , https://vulncheck.com/xdb/024d4588b4c7||https://vulncheck.com/xdb/024d4588b4c7 , https://vulncheck.com/xdb/e4f7d23fc6bc||https://vulncheck.com/xdb/e4f7d23fc6bc , https://vulncheck.com/xdb/4cd8ec4552ae||https://vulncheck.com/xdb/4cd8ec4552ae , https://vulncheck.com/xdb/e3cd0f2b9c4a||https://vulncheck.com/xdb/e3cd0f2b9c4a , https://vulncheck.com/xdb/bef16d85cf6b||https://vulncheck.com/xdb/bef16d85cf6b , https://vulncheck.com/xdb/faddcda29d3c||https://vulncheck.com/xdb/faddcda29d3c , https://vulncheck.com/xdb/f5085330e7bc||https://vulncheck.com/xdb/f5085330e7bc , https://vulncheck.com/xdb/f10f8971b996||https://vulncheck.com/xdb/f10f8971b996 , https://vulncheck.com/xdb/bf096845ad35||https://vulncheck.com/xdb/bf096845ad35 , https://vulncheck.com/xdb/0881bb35ce65||https://vulncheck.com/xdb/0881bb35ce65 , https://vulncheck.com/xdb/e5087c9a9442||https://vulncheck.com/xdb/e5087c9a9442 , https://vulncheck.com/xdb/2d286a01e9d1||https://vulncheck.com/xdb/2d286a01e9d1 , https://vulncheck.com/xdb/fd2fcce15234||https://vulncheck.com/xdb/fd2fcce15234 , https://vulncheck.com/xdb/4dc77b48cf47||https://vulncheck.com/xdb/4dc77b48cf47 , https://vulncheck.com/xdb/93708da6b80f||https://vulncheck.com/xdb/93708da6b80f , https://vulncheck.com/xdb/51d9db6c8498||https://vulncheck.com/xdb/51d9db6c8498 , https://vulncheck.com/xdb/087036e51a0a||https://vulncheck.com/xdb/087036e51a0a
CVE-2020-29557 D-Link DIR-825 R1 Devices 11/03/2021 0.91694 9.8 https://viz.greynoise.io/tag/d-link-dir-825-r1-rce-attempt||https://viz.greynoise.io/tag/d-link-dir-825-r1-rce-attempt 0 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-29557
CVE-2021-21220 Google Chromium V8 11/03/2021 0.92805 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21220
CVE-2020-16013 Google Chromium V8 11/03/2021 0.24031 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-16013
CVE-2020-15999 Google Chrome FreeType 11/03/2021 0.92732 9.6 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-15999 https://vulncheck.com/xdb/8566ea6250e8
CVE-2020-12812 Fortinet FortiOS 11/03/2021 0.49477 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-12812
CVE-2019-18187 Trend Micro OfficeScan 11/03/2021 0.71916 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-18187
CVE-2020-4006 VMware Multiple Products 11/03/2021 0.15441 9.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-4006
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers 11/03/2021 0.94357 7.5 https://viz.greynoise.io/tag/cisco-rv320-325-info-disclosure-attempt||https://viz.greynoise.io/tag/cisco-rv320-325-info-disclosure-attempt 35 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1653 https://vulncheck.com/xdb/73ff38b98985||https://vulncheck.com/xdb/73ff38b98985 , https://vulncheck.com/xdb/7386ddbc6f1b||https://vulncheck.com/xdb/7386ddbc6f1b , https://vulncheck.com/xdb/c2e452190c82||https://vulncheck.com/xdb/c2e452190c82 , https://vulncheck.com/xdb/a874920087d4||https://vulncheck.com/xdb/a874920087d4 , https://vulncheck.com/xdb/246f2bd3fff7||https://vulncheck.com/xdb/246f2bd3fff7
CVE-2021-1732 Microsoft Win32k 11/03/2021 0.90515 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1732 https://vulncheck.com/xdb/56a692bca459||https://vulncheck.com/xdb/56a692bca459 , https://vulncheck.com/xdb/ad30ecfc7a8d||https://vulncheck.com/xdb/ad30ecfc7a8d , https://vulncheck.com/xdb/24031c7c7e8e||https://vulncheck.com/xdb/24031c7c7e8e , https://vulncheck.com/xdb/d37c0a9bd997||https://vulncheck.com/xdb/d37c0a9bd997 , https://vulncheck.com/xdb/61d86c73450a||https://vulncheck.com/xdb/61d86c73450a , https://vulncheck.com/xdb/bd64b5ebe182||https://vulncheck.com/xdb/bd64b5ebe182 , https://vulncheck.com/xdb/aa79b6239935||https://vulncheck.com/xdb/aa79b6239935 , https://vulncheck.com/xdb/f72c131deebb||https://vulncheck.com/xdb/f72c131deebb , https://vulncheck.com/xdb/09740e97aa0d||https://vulncheck.com/xdb/09740e97aa0d , https://vulncheck.com/xdb/de8ed17d1f87||https://vulncheck.com/xdb/de8ed17d1f87 , https://vulncheck.com/xdb/18e0b48f69bd||https://vulncheck.com/xdb/18e0b48f69bd
CVE-2019-1429 Microsoft Internet Explorer 11/03/2021 0.83137 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-1429
CVE-2020-16846 SaltStack Salt 11/03/2021 0.94387 9.8 https://viz.greynoise.io/tag/saltstack-ssh-rce-attempt||https://viz.greynoise.io/tag/saltstack-ssh-rce-attempt 7 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-16846
CVE-2019-11634 Citrix Workspace Application and Receiver for Windows 11/03/2021 0.59561 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11634
CVE-2020-6207 SAP Solution Manager 11/03/2021 0.94274 10.0 https://viz.greynoise.io/tag/sap-solution-manager-rce-attempt||https://viz.greynoise.io/tag/sap-solution-manager-rce-attempt , https://viz.greynoise.io/tag/eem-admin-service-remote-command-execution-attempt||https://viz.greynoise.io/tag/eem-admin-service-remote-command-execution-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6207 https://vulncheck.com/xdb/453413941eab
CVE-2019-0708 Microsoft Remote Desktop Services 11/03/2021 0.94445 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0708 https://vulncheck.com/xdb/0543fd1784c2||https://vulncheck.com/xdb/0543fd1784c2 , https://vulncheck.com/xdb/9b644acc642d||https://vulncheck.com/xdb/9b644acc642d , https://vulncheck.com/xdb/87091cafec0a||https://vulncheck.com/xdb/87091cafec0a , https://vulncheck.com/xdb/d18cbf862a1b||https://vulncheck.com/xdb/d18cbf862a1b , https://vulncheck.com/xdb/a34013074716||https://vulncheck.com/xdb/a34013074716 , https://vulncheck.com/xdb/bf63479c559b||https://vulncheck.com/xdb/bf63479c559b , https://vulncheck.com/xdb/fd998d08aecc||https://vulncheck.com/xdb/fd998d08aecc , https://vulncheck.com/xdb/1959a82c2e55||https://vulncheck.com/xdb/1959a82c2e55 , https://vulncheck.com/xdb/4447344e0e57||https://vulncheck.com/xdb/4447344e0e57 , https://vulncheck.com/xdb/8b5d56b910c5||https://vulncheck.com/xdb/8b5d56b910c5 , https://vulncheck.com/xdb/b78833c5a34c||https://vulncheck.com/xdb/b78833c5a34c , https://vulncheck.com/xdb/f0d631a0e09b||https://vulncheck.com/xdb/f0d631a0e09b , https://vulncheck.com/xdb/54ea167ea153||https://vulncheck.com/xdb/54ea167ea153 , https://vulncheck.com/xdb/681cd783600b||https://vulncheck.com/xdb/681cd783600b , https://vulncheck.com/xdb/d7b3d9b80819||https://vulncheck.com/xdb/d7b3d9b80819 , https://vulncheck.com/xdb/5c1169f4925c||https://vulncheck.com/xdb/5c1169f4925c , https://vulncheck.com/xdb/83dd1b8c1868||https://vulncheck.com/xdb/83dd1b8c1868 , https://vulncheck.com/xdb/387c8e6971fe||https://vulncheck.com/xdb/387c8e6971fe , https://vulncheck.com/xdb/11d36b021267||https://vulncheck.com/xdb/11d36b021267 , https://vulncheck.com/xdb/ab5a3e05eeeb||https://vulncheck.com/xdb/ab5a3e05eeeb , https://vulncheck.com/xdb/212d4dc490b0||https://vulncheck.com/xdb/212d4dc490b0 , https://vulncheck.com/xdb/3003205270ed||https://vulncheck.com/xdb/3003205270ed , https://vulncheck.com/xdb/bb428db8e94d||https://vulncheck.com/xdb/bb428db8e94d , https://vulncheck.com/xdb/2426c24787e9||https://vulncheck.com/xdb/2426c24787e9 , https://vulncheck.com/xdb/c9d000a1a180||https://vulncheck.com/xdb/c9d000a1a180 , https://vulncheck.com/xdb/0a6b5b0cbd12||https://vulncheck.com/xdb/0a6b5b0cbd12 , https://vulncheck.com/xdb/e72fa18ddcc7||https://vulncheck.com/xdb/e72fa18ddcc7 , https://vulncheck.com/xdb/9d68385aa1c1||https://vulncheck.com/xdb/9d68385aa1c1 , https://vulncheck.com/xdb/d607d811c122||https://vulncheck.com/xdb/d607d811c122 , https://vulncheck.com/xdb/9a50cc3bc409||https://vulncheck.com/xdb/9a50cc3bc409 , https://vulncheck.com/xdb/17163e8dffc6||https://vulncheck.com/xdb/17163e8dffc6 , https://vulncheck.com/xdb/92597113b854||https://vulncheck.com/xdb/92597113b854 , https://vulncheck.com/xdb/3785316d7fc5||https://vulncheck.com/xdb/3785316d7fc5 , https://vulncheck.com/xdb/7536b79e5849||https://vulncheck.com/xdb/7536b79e5849 , https://vulncheck.com/xdb/9565e85eb46c||https://vulncheck.com/xdb/9565e85eb46c , https://vulncheck.com/xdb/2116a08dcafd||https://vulncheck.com/xdb/2116a08dcafd , https://vulncheck.com/xdb/d0813d668813||https://vulncheck.com/xdb/d0813d668813 , https://vulncheck.com/xdb/495f5c9a61a0||https://vulncheck.com/xdb/495f5c9a61a0 , https://vulncheck.com/xdb/92468824377e||https://vulncheck.com/xdb/92468824377e , https://vulncheck.com/xdb/181fc435a9f1||https://vulncheck.com/xdb/181fc435a9f1 , https://vulncheck.com/xdb/1bd6e3d7edf2||https://vulncheck.com/xdb/1bd6e3d7edf2 , https://vulncheck.com/xdb/f783965878ba||https://vulncheck.com/xdb/f783965878ba , https://vulncheck.com/xdb/c67a96a54a2f||https://vulncheck.com/xdb/c67a96a54a2f , https://vulncheck.com/xdb/3a02e0152437||https://vulncheck.com/xdb/3a02e0152437 , https://vulncheck.com/xdb/fee7134123f4||https://vulncheck.com/xdb/fee7134123f4 , https://vulncheck.com/xdb/48acdd34a61b||https://vulncheck.com/xdb/48acdd34a61b , https://vulncheck.com/xdb/9523c9b3ece9||https://vulncheck.com/xdb/9523c9b3ece9 , https://vulncheck.com/xdb/b63c341a0817||https://vulncheck.com/xdb/b63c341a0817 , https://vulncheck.com/xdb/b0cd57c5988d||https://vulncheck.com/xdb/b0cd57c5988d
CVE-2021-26855 Microsoft Exchange Server 11/03/2021 0.94366 9.1 https://viz.greynoise.io/tag/proxylogon-ssrf-attempt||https://viz.greynoise.io/tag/proxylogon-ssrf-attempt , https://viz.greynoise.io/tag/proxylogon-ssrf-vuln-check||https://viz.greynoise.io/tag/proxylogon-ssrf-vuln-check 9 TRUE TRUE FALSE Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26855 https://vulncheck.com/xdb/a15ecee3c689||https://vulncheck.com/xdb/a15ecee3c689 , https://vulncheck.com/xdb/83c67e8456f8||https://vulncheck.com/xdb/83c67e8456f8 , https://vulncheck.com/xdb/e988e4b21a5a||https://vulncheck.com/xdb/e988e4b21a5a , https://vulncheck.com/xdb/f0b67c3b0dba||https://vulncheck.com/xdb/f0b67c3b0dba , https://vulncheck.com/xdb/a369a563695a||https://vulncheck.com/xdb/a369a563695a , https://vulncheck.com/xdb/f64e212b9bb9||https://vulncheck.com/xdb/f64e212b9bb9 , https://vulncheck.com/xdb/f4e64f41f675||https://vulncheck.com/xdb/f4e64f41f675 , https://vulncheck.com/xdb/0c24aac0812f||https://vulncheck.com/xdb/0c24aac0812f , https://vulncheck.com/xdb/db86afdc28ec||https://vulncheck.com/xdb/db86afdc28ec , https://vulncheck.com/xdb/e2f6662dc7fa||https://vulncheck.com/xdb/e2f6662dc7fa , https://vulncheck.com/xdb/84f6d976cfa8||https://vulncheck.com/xdb/84f6d976cfa8 , https://vulncheck.com/xdb/41560d8dfafa||https://vulncheck.com/xdb/41560d8dfafa , https://vulncheck.com/xdb/6285ee0370ae||https://vulncheck.com/xdb/6285ee0370ae , https://vulncheck.com/xdb/f1d2fcb25c52||https://vulncheck.com/xdb/f1d2fcb25c52 , https://vulncheck.com/xdb/5a8c766c84ab||https://vulncheck.com/xdb/5a8c766c84ab , https://vulncheck.com/xdb/d311705d5c0f||https://vulncheck.com/xdb/d311705d5c0f , https://vulncheck.com/xdb/28a1acb64734||https://vulncheck.com/xdb/28a1acb64734 , https://vulncheck.com/xdb/94ed869bb771||https://vulncheck.com/xdb/94ed869bb771 , https://vulncheck.com/xdb/2a12da6c6076||https://vulncheck.com/xdb/2a12da6c6076 , https://vulncheck.com/xdb/5c885ac1f498||https://vulncheck.com/xdb/5c885ac1f498 , https://vulncheck.com/xdb/c3f6061e329d||https://vulncheck.com/xdb/c3f6061e329d , https://vulncheck.com/xdb/a0bdc897dbad||https://vulncheck.com/xdb/a0bdc897dbad , https://vulncheck.com/xdb/ee22e208e22e||https://vulncheck.com/xdb/ee22e208e22e , https://vulncheck.com/xdb/8f164084f63f||https://vulncheck.com/xdb/8f164084f63f , https://vulncheck.com/xdb/b21c4b028688||https://vulncheck.com/xdb/b21c4b028688 , https://vulncheck.com/xdb/67248d70edfc||https://vulncheck.com/xdb/67248d70edfc , https://vulncheck.com/xdb/2786587022bf||https://vulncheck.com/xdb/2786587022bf , https://vulncheck.com/xdb/05d9d20036f6||https://vulncheck.com/xdb/05d9d20036f6 , https://vulncheck.com/xdb/d5ace7521e90||https://vulncheck.com/xdb/d5ace7521e90 , https://vulncheck.com/xdb/2036c9063358||https://vulncheck.com/xdb/2036c9063358 , https://vulncheck.com/xdb/2e432cbc1287||https://vulncheck.com/xdb/2e432cbc1287
CVE-2019-0803 Microsoft Win32k 11/03/2021 0.84886 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0803 https://vulncheck.com/xdb/0550a8f285e6||https://vulncheck.com/xdb/0550a8f285e6 , https://vulncheck.com/xdb/c4e15259ee73||https://vulncheck.com/xdb/c4e15259ee73
CVE-2021-38645 Microsoft Open Management Infrastructure (OMI) 11/03/2021 0.31031 7.8 https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38645
CVE-2020-9859 Apple Multiple Products 11/03/2021 0.00295 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-9859
CVE-2021-38647 Microsoft Open Management Infrastructure (OMI) 11/03/2021 0.94342 9.8 https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38647 https://vulncheck.com/xdb/6c71255f0196||https://vulncheck.com/xdb/6c71255f0196 , https://vulncheck.com/xdb/3a2d344c375c||https://vulncheck.com/xdb/3a2d344c375c , https://vulncheck.com/xdb/cb8f32e2832e||https://vulncheck.com/xdb/cb8f32e2832e , https://vulncheck.com/xdb/c836b5cab9c2||https://vulncheck.com/xdb/c836b5cab9c2 , https://vulncheck.com/xdb/e624aab49a0d||https://vulncheck.com/xdb/e624aab49a0d , https://vulncheck.com/xdb/291cc7fcd48c||https://vulncheck.com/xdb/291cc7fcd48c , https://vulncheck.com/xdb/52bbf4b31fd5||https://vulncheck.com/xdb/52bbf4b31fd5 , https://vulncheck.com/xdb/cd201b5957ec||https://vulncheck.com/xdb/cd201b5957ec
CVE-2019-0808 Microsoft Win32k 11/03/2021 0.51367 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0808 https://vulncheck.com/xdb/68416ef5e53e||https://vulncheck.com/xdb/68416ef5e53e , https://vulncheck.com/xdb/c9383a669787||https://vulncheck.com/xdb/c9383a669787 , https://vulncheck.com/xdb/e81f408aa168||https://vulncheck.com/xdb/e81f408aa168 , https://vulncheck.com/xdb/287ede84f631||https://vulncheck.com/xdb/287ede84f631
CVE-2014-1812 Microsoft Windows 11/03/2021 0.74488 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2014-1812
CVE-2020-9818 Apple iOS, iPadOS, and watchOS 11/03/2021 0.00561 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-9818
CVE-2021-22894 Ivanti Pulse Connect Secure 11/03/2021 0.49665 8.8 FALSE FALSE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22894
CVE-2020-8196 Citrix Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance 11/03/2021 0.62974 4.3 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8196
CVE-2020-3452 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 11/03/2021 0.94452 7.5 https://viz.greynoise.io/tag/cisco-asa-arbitrary-file-retrieval-attempt||https://viz.greynoise.io/tag/cisco-asa-arbitrary-file-retrieval-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3452 https://vulncheck.com/xdb/9994be2cbc89||https://vulncheck.com/xdb/9994be2cbc89 , https://vulncheck.com/xdb/12e485c619dd||https://vulncheck.com/xdb/12e485c619dd , https://vulncheck.com/xdb/2a69a67b6102||https://vulncheck.com/xdb/2a69a67b6102 , https://vulncheck.com/xdb/359345081311||https://vulncheck.com/xdb/359345081311 , https://vulncheck.com/xdb/aa17afb12c79||https://vulncheck.com/xdb/aa17afb12c79 , https://vulncheck.com/xdb/14238ed757f7||https://vulncheck.com/xdb/14238ed757f7 , https://vulncheck.com/xdb/ea4e2fe7fa5b||https://vulncheck.com/xdb/ea4e2fe7fa5b , https://vulncheck.com/xdb/38dc36ab63a7||https://vulncheck.com/xdb/38dc36ab63a7 , https://vulncheck.com/xdb/582d43abc71f||https://vulncheck.com/xdb/582d43abc71f , https://vulncheck.com/xdb/cd0659505a89||https://vulncheck.com/xdb/cd0659505a89 , https://vulncheck.com/xdb/c9fadd0b730f||https://vulncheck.com/xdb/c9fadd0b730f , https://vulncheck.com/xdb/2844089d4205||https://vulncheck.com/xdb/2844089d4205 , https://vulncheck.com/xdb/765a6e6e3a97||https://vulncheck.com/xdb/765a6e6e3a97 , https://vulncheck.com/xdb/6b23e00dd9c9||https://vulncheck.com/xdb/6b23e00dd9c9 , https://vulncheck.com/xdb/ce846e08db40||https://vulncheck.com/xdb/ce846e08db40 , https://vulncheck.com/xdb/6f0ce488573d||https://vulncheck.com/xdb/6f0ce488573d , https://vulncheck.com/xdb/9bf142c2d239||https://vulncheck.com/xdb/9bf142c2d239
CVE-2020-17087 Microsoft Windows 11/03/2021 0.15027 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-17087 https://vulncheck.com/xdb/7eed0e9442ec||https://vulncheck.com/xdb/7eed0e9442ec , https://vulncheck.com/xdb/8fe698ce7fbd||https://vulncheck.com/xdb/8fe698ce7fbd
CVE-2021-42013 Apache HTTP Server 11/03/2021 0.94428 9.8 https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt||https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt 77 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42013 https://vulncheck.com/xdb/5e64583b49f2||https://vulncheck.com/xdb/5e64583b49f2 , https://vulncheck.com/xdb/bfc30889d329||https://vulncheck.com/xdb/bfc30889d329 , https://vulncheck.com/xdb/b1d2ff60b684||https://vulncheck.com/xdb/b1d2ff60b684 , https://vulncheck.com/xdb/4bad25e994e2||https://vulncheck.com/xdb/4bad25e994e2 , https://vulncheck.com/xdb/7ff49021c22e||https://vulncheck.com/xdb/7ff49021c22e , https://vulncheck.com/xdb/7f1b705bcf83||https://vulncheck.com/xdb/7f1b705bcf83 , https://vulncheck.com/xdb/5ca2b55d2782||https://vulncheck.com/xdb/5ca2b55d2782 , https://vulncheck.com/xdb/1049bafbb722||https://vulncheck.com/xdb/1049bafbb722 , https://vulncheck.com/xdb/ef11e24302d0||https://vulncheck.com/xdb/ef11e24302d0 , https://vulncheck.com/xdb/56bd1b4d31bb||https://vulncheck.com/xdb/56bd1b4d31bb , https://vulncheck.com/xdb/e543e9003746||https://vulncheck.com/xdb/e543e9003746 , https://vulncheck.com/xdb/6fea2c044e7a||https://vulncheck.com/xdb/6fea2c044e7a , https://vulncheck.com/xdb/80019b8370af||https://vulncheck.com/xdb/80019b8370af , https://vulncheck.com/xdb/c9583159535c||https://vulncheck.com/xdb/c9583159535c , https://vulncheck.com/xdb/93027facc9f9||https://vulncheck.com/xdb/93027facc9f9 , https://vulncheck.com/xdb/05376c442191||https://vulncheck.com/xdb/05376c442191 , https://vulncheck.com/xdb/cc14508a170c||https://vulncheck.com/xdb/cc14508a170c , https://vulncheck.com/xdb/f480a19ee326||https://vulncheck.com/xdb/f480a19ee326 , https://vulncheck.com/xdb/28d7e8231b1f||https://vulncheck.com/xdb/28d7e8231b1f
CVE-2020-6820 Mozilla Firefox and Thunderbird 11/03/2021 0.04405 8.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6820
CVE-2017-7269 Microsoft Internet Information Services (IIS) 11/03/2021 0.94358 9.8 https://viz.greynoise.io/tag/iis-webdav-rce-attempt||https://viz.greynoise.io/tag/iis-webdav-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-7269 https://vulncheck.com/xdb/4e7883d7b859||https://vulncheck.com/xdb/4e7883d7b859 , https://vulncheck.com/xdb/2fe2967c158c||https://vulncheck.com/xdb/2fe2967c158c , https://vulncheck.com/xdb/dfebc9a481ad||https://vulncheck.com/xdb/dfebc9a481ad , https://vulncheck.com/xdb/5c14894b8e0b||https://vulncheck.com/xdb/5c14894b8e0b , https://vulncheck.com/xdb/0048fce3c892||https://vulncheck.com/xdb/0048fce3c892 , https://vulncheck.com/xdb/2c1272e94b39||https://vulncheck.com/xdb/2c1272e94b39 , https://vulncheck.com/xdb/d7e5f1574c94||https://vulncheck.com/xdb/d7e5f1574c94 , https://vulncheck.com/xdb/6eea40a3a674||https://vulncheck.com/xdb/6eea40a3a674 , https://vulncheck.com/xdb/9682afdd91a2||https://vulncheck.com/xdb/9682afdd91a2 , https://vulncheck.com/xdb/f2530a961c06||https://vulncheck.com/xdb/f2530a961c06 , https://vulncheck.com/xdb/63066a0e6113||https://vulncheck.com/xdb/63066a0e6113 , https://vulncheck.com/xdb/8e1eaf4da82d||https://vulncheck.com/xdb/8e1eaf4da82d , https://vulncheck.com/xdb/a36c0cf57665||https://vulncheck.com/xdb/a36c0cf57665 , https://vulncheck.com/xdb/275925d21df7||https://vulncheck.com/xdb/275925d21df7
CVE-2020-5735 Amcrest Cameras and Network Video Recorder (NVR) 11/03/2021 0.48216 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-5735
CVE-2020-5902 F5 BIG-IP 11/03/2021 0.94442 9.8 https://viz.greynoise.io/tag/f5-big-ip-tmui-rce-vuln-check||https://viz.greynoise.io/tag/f5-big-ip-tmui-rce-vuln-check 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-5902 https://vulncheck.com/xdb/1a0d5e33fc45||https://vulncheck.com/xdb/1a0d5e33fc45 , https://vulncheck.com/xdb/84da9e97c9d8||https://vulncheck.com/xdb/84da9e97c9d8 , https://vulncheck.com/xdb/83a6db79a08b||https://vulncheck.com/xdb/83a6db79a08b , https://vulncheck.com/xdb/88f1fcaeb598||https://vulncheck.com/xdb/88f1fcaeb598 , https://vulncheck.com/xdb/215e30ad1ec1||https://vulncheck.com/xdb/215e30ad1ec1 , https://vulncheck.com/xdb/7436903b93b3||https://vulncheck.com/xdb/7436903b93b3 , https://vulncheck.com/xdb/9d229282dfa7||https://vulncheck.com/xdb/9d229282dfa7 , https://vulncheck.com/xdb/56bfabceae4a||https://vulncheck.com/xdb/56bfabceae4a , https://vulncheck.com/xdb/73f9e787074d||https://vulncheck.com/xdb/73f9e787074d , https://vulncheck.com/xdb/8221dd68e259||https://vulncheck.com/xdb/8221dd68e259 , https://vulncheck.com/xdb/5e821a582ff3||https://vulncheck.com/xdb/5e821a582ff3 , https://vulncheck.com/xdb/2f35578b6a4e||https://vulncheck.com/xdb/2f35578b6a4e , https://vulncheck.com/xdb/d13ebff2714e||https://vulncheck.com/xdb/d13ebff2714e , https://vulncheck.com/xdb/86fe209dce52||https://vulncheck.com/xdb/86fe209dce52 , https://vulncheck.com/xdb/3d3c1efc21d6||https://vulncheck.com/xdb/3d3c1efc21d6 , https://vulncheck.com/xdb/49a09a65578f||https://vulncheck.com/xdb/49a09a65578f , https://vulncheck.com/xdb/d6c5c4d13a05||https://vulncheck.com/xdb/d6c5c4d13a05 , https://vulncheck.com/xdb/aaa51d1dde07||https://vulncheck.com/xdb/aaa51d1dde07 , https://vulncheck.com/xdb/f4a6551a3d25||https://vulncheck.com/xdb/f4a6551a3d25 , https://vulncheck.com/xdb/c9200a88cc26||https://vulncheck.com/xdb/c9200a88cc26 , https://vulncheck.com/xdb/9b34669e9e6b||https://vulncheck.com/xdb/9b34669e9e6b , https://vulncheck.com/xdb/cb20275ece2f||https://vulncheck.com/xdb/cb20275ece2f , https://vulncheck.com/xdb/015b4ecd80f4||https://vulncheck.com/xdb/015b4ecd80f4 , https://vulncheck.com/xdb/f74eaaf672bc||https://vulncheck.com/xdb/f74eaaf672bc , https://vulncheck.com/xdb/a8f50138be81||https://vulncheck.com/xdb/a8f50138be81 , https://vulncheck.com/xdb/9fa6bc3af413||https://vulncheck.com/xdb/9fa6bc3af413 , https://vulncheck.com/xdb/ee5ad494cf44||https://vulncheck.com/xdb/ee5ad494cf44 , https://vulncheck.com/xdb/80de95eed85c||https://vulncheck.com/xdb/80de95eed85c , https://vulncheck.com/xdb/d2deaeca3c8d||https://vulncheck.com/xdb/d2deaeca3c8d , https://vulncheck.com/xdb/ad3e875990f5||https://vulncheck.com/xdb/ad3e875990f5 , https://vulncheck.com/xdb/5965f23f2c23||https://vulncheck.com/xdb/5965f23f2c23 , https://vulncheck.com/xdb/5283a75d948b||https://vulncheck.com/xdb/5283a75d948b
CVE-2020-4430 IBM Data Risk Manager 11/03/2021 0.55164 4.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-4430
CVE-2018-13379 Fortinet FortiOS 11/03/2021 0.94454 9.1 https://viz.greynoise.io/tag/fortios-info-disclosure-attempt||https://viz.greynoise.io/tag/fortios-info-disclosure-attempt 16 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-13379 https://vulncheck.com/xdb/3a05ce486979||https://vulncheck.com/xdb/3a05ce486979 , https://vulncheck.com/xdb/8fb0631d9c5b||https://vulncheck.com/xdb/8fb0631d9c5b , https://vulncheck.com/xdb/c0c18041153d||https://vulncheck.com/xdb/c0c18041153d , https://vulncheck.com/xdb/166599b1677b||https://vulncheck.com/xdb/166599b1677b , https://vulncheck.com/xdb/3fddec329111||https://vulncheck.com/xdb/3fddec329111 , https://vulncheck.com/xdb/efee6a4d87ee||https://vulncheck.com/xdb/efee6a4d87ee , https://vulncheck.com/xdb/f3cfffdc4419||https://vulncheck.com/xdb/f3cfffdc4419 , https://vulncheck.com/xdb/beecdbe5f919||https://vulncheck.com/xdb/beecdbe5f919 , https://vulncheck.com/xdb/2a7ceeb9e031||https://vulncheck.com/xdb/2a7ceeb9e031
CVE-2017-9805 Apache Struts 11/03/2021 0.94390 8.1 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-9805 https://vulncheck.com/xdb/e922bd12de1d||https://vulncheck.com/xdb/e922bd12de1d , https://vulncheck.com/xdb/018ad44965dd||https://vulncheck.com/xdb/018ad44965dd , https://vulncheck.com/xdb/1924e716f393||https://vulncheck.com/xdb/1924e716f393 , https://vulncheck.com/xdb/89e15b68ef36||https://vulncheck.com/xdb/89e15b68ef36 , https://vulncheck.com/xdb/1fa5f1889be6||https://vulncheck.com/xdb/1fa5f1889be6 , https://vulncheck.com/xdb/0ea476fd1c98||https://vulncheck.com/xdb/0ea476fd1c98 , https://vulncheck.com/xdb/bd12f850ebbe||https://vulncheck.com/xdb/bd12f850ebbe , https://vulncheck.com/xdb/dc089c9c541c||https://vulncheck.com/xdb/dc089c9c541c , https://vulncheck.com/xdb/6300c647a9ba||https://vulncheck.com/xdb/6300c647a9ba , https://vulncheck.com/xdb/43c0e5c2df29||https://vulncheck.com/xdb/43c0e5c2df29 , https://vulncheck.com/xdb/5d8bf4c938d9||https://vulncheck.com/xdb/5d8bf4c938d9 , https://vulncheck.com/xdb/c82af784f562||https://vulncheck.com/xdb/c82af784f562 , https://vulncheck.com/xdb/c7c9392dc94b||https://vulncheck.com/xdb/c7c9392dc94b , https://vulncheck.com/xdb/78bca3ee80a0||https://vulncheck.com/xdb/78bca3ee80a0
CVE-2021-22899 Ivanti Pulse Connect Secure 11/03/2021 0.44951 8.8 FALSE FALSE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22899
CVE-2020-4427 IBM Data Risk Manager 11/03/2021 0.49175 9.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-4427
CVE-2019-20085 TVT NVMS-1000 11/03/2021 0.93648 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-20085 https://vulncheck.com/xdb/48cf542ed3af||https://vulncheck.com/xdb/48cf542ed3af , https://vulncheck.com/xdb/b69ae39519f9||https://vulncheck.com/xdb/b69ae39519f9 , https://vulncheck.com/xdb/7e163b7e9b71||https://vulncheck.com/xdb/7e163b7e9b71
CVE-2016-3976 SAP NetWeaver 11/03/2021 0.77789 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3976
CVE-2021-22900 Ivanti Pulse Connect Secure 11/03/2021 0.01668 7.2 FALSE FALSE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22900
CVE-2021-42258 BQE BillQuick Web Suite 11/03/2021 0.93901 9.8 https://viz.greynoise.io/tag/billquick-web-suite-sql-injection-attempt||https://viz.greynoise.io/tag/billquick-web-suite-sql-injection-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-42258
CVE-2020-3566 Cisco IOS XR 11/03/2021 0.18957 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3566
CVE-2020-27932 Apple Multiple Products 11/03/2021 0.01976 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-27932
CVE-2019-0863 Microsoft Windows 11/03/2021 0.13544 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0863
CVE-2020-14871 Oracle Solaris and Zettabyte File System (ZFS) 11/03/2021 0.88872 10.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-14871 https://vulncheck.com/xdb/471415817e60||https://vulncheck.com/xdb/471415817e60 , https://vulncheck.com/xdb/5164fb652cf7||https://vulncheck.com/xdb/5164fb652cf7
CVE-2020-8243 Ivanti Pulse Connect Secure 11/03/2021 0.22622 7.2 TRUE FALSE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8243
CVE-2012-0158 Microsoft MSCOMCTL.OCX 11/03/2021 0.94314 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-0158
CVE-2018-0171 Cisco IOS and IOS XE 11/03/2021 0.91351 9.8 https://viz.greynoise.io/tag/cisco-ios-software-smart-install-cve-2018-0171-rce-attempt||https://viz.greynoise.io/tag/cisco-ios-software-smart-install-cve-2018-0171-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0171 https://vulncheck.com/xdb/6d4b443f23fc
CVE-2015-1641 Microsoft Office 11/03/2021 0.93530 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-1641
CVE-2020-8467 Trend Micro Apex One and OfficeScan 11/03/2021 0.07689 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8467
CVE-2021-20090 Arcadyan Buffalo Firmware 11/03/2021 0.94401 9.8 https://viz.greynoise.io/tag/buffalo-router-rce-attempt||https://viz.greynoise.io/tag/buffalo-router-rce-attempt , https://viz.greynoise.io/tag/buffalo-router-rce-check||https://viz.greynoise.io/tag/buffalo-router-rce-check 0 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-20090
CVE-2018-18325 DotNetNuke (DNN) DotNetNuke (DNN) 11/03/2021 0.76118 7.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-18325
CVE-2018-14558 Tenda AC7, AC9, and AC10 Routers 11/03/2021 0.81989 9.8 0 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2018-14558
CVE-2018-2380 SAP Customer Relationship Management (CRM) 11/03/2021 0.45321 6.6 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-2380 https://vulncheck.com/xdb/a7644be4c7b5||https://vulncheck.com/xdb/a7644be4c7b5 , https://vulncheck.com/xdb/fdfc155ac83e||https://vulncheck.com/xdb/fdfc155ac83e
CVE-2021-22893 Ivanti Pulse Connect Secure 11/03/2021 0.93511 10.0 TRUE FALSE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2021-22893
CVE-2020-6819 Mozilla Firefox and Thunderbird 11/03/2021 0.00350 8.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6819
CVE-2020-8515 DrayTek Multiple Vigor Routers 11/03/2021 0.94357 9.8 https://viz.greynoise.io/tag/draytek-rce-attempt||https://viz.greynoise.io/tag/draytek-rce-attempt 3 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-8515 https://vulncheck.com/xdb/ec025a943dc1||https://vulncheck.com/xdb/ec025a943dc1 , https://vulncheck.com/xdb/7f8fd0ec1666||https://vulncheck.com/xdb/7f8fd0ec1666 , https://vulncheck.com/xdb/0f4bef153327||https://vulncheck.com/xdb/0f4bef153327
CVE-2020-3992 VMware ESXi 11/03/2021 0.90757 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3992 https://vulncheck.com/xdb/8d466afc3103||https://vulncheck.com/xdb/8d466afc3103 , https://vulncheck.com/xdb/f152d01f6c20||https://vulncheck.com/xdb/f152d01f6c20 , https://vulncheck.com/xdb/d1ae6f5c4bc7||https://vulncheck.com/xdb/d1ae6f5c4bc7
CVE-2019-11510 Ivanti Pulse Connect Secure 11/03/2021 0.94464 9.9 https://viz.greynoise.io/tag/pulse-secure-vpn-file-disclosure-attempt||https://viz.greynoise.io/tag/pulse-secure-vpn-file-disclosure-attempt 7 TRUE TRUE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2019-11510 https://vulncheck.com/xdb/dc6cb57a366e||https://vulncheck.com/xdb/dc6cb57a366e , https://vulncheck.com/xdb/3d7363fb7873||https://vulncheck.com/xdb/3d7363fb7873 , https://vulncheck.com/xdb/a25cc59141d7||https://vulncheck.com/xdb/a25cc59141d7 , https://vulncheck.com/xdb/2f9e05a2128d||https://vulncheck.com/xdb/2f9e05a2128d , https://vulncheck.com/xdb/480362951743||https://vulncheck.com/xdb/480362951743 , https://vulncheck.com/xdb/50d07a7e420f||https://vulncheck.com/xdb/50d07a7e420f , https://vulncheck.com/xdb/1061b5294e83||https://vulncheck.com/xdb/1061b5294e83 , https://vulncheck.com/xdb/2d6771299af4||https://vulncheck.com/xdb/2d6771299af4 , https://vulncheck.com/xdb/6c8292ec05c6||https://vulncheck.com/xdb/6c8292ec05c6 , https://vulncheck.com/xdb/2f72c6e36a8e||https://vulncheck.com/xdb/2f72c6e36a8e
CVE-2020-1020 Microsoft Windows 11/03/2021 0.87870 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1020 https://vulncheck.com/xdb/07ba1df2e806||https://vulncheck.com/xdb/07ba1df2e806 , https://vulncheck.com/xdb/161b29524907||https://vulncheck.com/xdb/161b29524907
CVE-2021-22205 GitLab Community and Enterprise Editions 11/03/2021 0.94467 10.0 https://viz.greynoise.io/tag/gitlab-ce-rce-attempt||https://viz.greynoise.io/tag/gitlab-ce-rce-attempt 0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22205 https://vulncheck.com/xdb/8e28f16d2f29||https://vulncheck.com/xdb/8e28f16d2f29 , https://vulncheck.com/xdb/4c0b2d5b4974||https://vulncheck.com/xdb/4c0b2d5b4974 , https://vulncheck.com/xdb/82ceb748c97f||https://vulncheck.com/xdb/82ceb748c97f , https://vulncheck.com/xdb/8f0f2fc2bf7a||https://vulncheck.com/xdb/8f0f2fc2bf7a , https://vulncheck.com/xdb/214fae59f95a||https://vulncheck.com/xdb/214fae59f95a , https://vulncheck.com/xdb/7be0e6a85009||https://vulncheck.com/xdb/7be0e6a85009 , https://vulncheck.com/xdb/a7a4a4af582e||https://vulncheck.com/xdb/a7a4a4af582e , https://vulncheck.com/xdb/75d6cfb95543||https://vulncheck.com/xdb/75d6cfb95543 , https://vulncheck.com/xdb/6de3fd36464c||https://vulncheck.com/xdb/6de3fd36464c , https://vulncheck.com/xdb/a225f95f8778||https://vulncheck.com/xdb/a225f95f8778 , https://vulncheck.com/xdb/c38dd496f070||https://vulncheck.com/xdb/c38dd496f070 , https://vulncheck.com/xdb/2c9ecaf997fd||https://vulncheck.com/xdb/2c9ecaf997fd , https://vulncheck.com/xdb/fee8067e489b||https://vulncheck.com/xdb/fee8067e489b , https://vulncheck.com/xdb/1df329ab1571||https://vulncheck.com/xdb/1df329ab1571 , https://vulncheck.com/xdb/f8b573dcb225||https://vulncheck.com/xdb/f8b573dcb225 , https://vulncheck.com/xdb/67ac8dff2a01||https://vulncheck.com/xdb/67ac8dff2a01 , https://vulncheck.com/xdb/c4cbe11e130c||https://vulncheck.com/xdb/c4cbe11e130c , https://vulncheck.com/xdb/4f08d429923e||https://vulncheck.com/xdb/4f08d429923e , https://vulncheck.com/xdb/779a26749ee1||https://vulncheck.com/xdb/779a26749ee1
CVE-2019-15949 Nagios Nagios XI 11/03/2021 0.87190 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-15949 https://vulncheck.com/xdb/eccfb0ae16cd
CVE-2019-16759 vBulletin vBulletin 11/03/2021 0.94429 9.8 https://viz.greynoise.io/tag/vbulletin-5-x-rce-attempt||https://viz.greynoise.io/tag/vbulletin-5-x-rce-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-16759 https://vulncheck.com/xdb/864418406fc2||https://vulncheck.com/xdb/864418406fc2 , https://vulncheck.com/xdb/d853d7e336d8||https://vulncheck.com/xdb/d853d7e336d8 , https://vulncheck.com/xdb/7275122ff481||https://vulncheck.com/xdb/7275122ff481 , https://vulncheck.com/xdb/1947002334c8||https://vulncheck.com/xdb/1947002334c8 , https://vulncheck.com/xdb/60d80aaa798d||https://vulncheck.com/xdb/60d80aaa798d , https://vulncheck.com/xdb/4587d75eac06||https://vulncheck.com/xdb/4587d75eac06 , https://vulncheck.com/xdb/e94e5a578e27||https://vulncheck.com/xdb/e94e5a578e27 , https://vulncheck.com/xdb/5075aca956f4||https://vulncheck.com/xdb/5075aca956f4 , https://vulncheck.com/xdb/7d63cbd8af55||https://vulncheck.com/xdb/7d63cbd8af55 , https://vulncheck.com/xdb/f77f6e256780||https://vulncheck.com/xdb/f77f6e256780
CVE-2020-0069 MediaTek Multiple Chipsets 11/03/2021 0.01722 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0069 https://vulncheck.com/xdb/466ce736a0d4||https://vulncheck.com/xdb/466ce736a0d4 , https://vulncheck.com/xdb/c9d83d8c80bb||https://vulncheck.com/xdb/c9d83d8c80bb , https://vulncheck.com/xdb/9a931c619e3c||https://vulncheck.com/xdb/9a931c619e3c
CVE-2020-11651 SaltStack Salt 11/03/2021 0.94390 9.8 https://viz.greynoise.io/tag/saltstack-scanner||https://viz.greynoise.io/tag/saltstack-scanner FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11651 https://vulncheck.com/xdb/6941178da516||https://vulncheck.com/xdb/6941178da516 , https://vulncheck.com/xdb/f2d4106b8900||https://vulncheck.com/xdb/f2d4106b8900 , https://vulncheck.com/xdb/8e2c5b54e098||https://vulncheck.com/xdb/8e2c5b54e098 , https://vulncheck.com/xdb/ad2b3134eaad||https://vulncheck.com/xdb/ad2b3134eaad , https://vulncheck.com/xdb/51575fb7e19d||https://vulncheck.com/xdb/51575fb7e19d , https://vulncheck.com/xdb/25e4169b7213||https://vulncheck.com/xdb/25e4169b7213 , https://vulncheck.com/xdb/f1a425abf2c5||https://vulncheck.com/xdb/f1a425abf2c5 , https://vulncheck.com/xdb/aaa9b5889efa||https://vulncheck.com/xdb/aaa9b5889efa , https://vulncheck.com/xdb/ed4dc5fcce7f||https://vulncheck.com/xdb/ed4dc5fcce7f , https://vulncheck.com/xdb/731f17c6b531||https://vulncheck.com/xdb/731f17c6b531 , https://vulncheck.com/xdb/9705a4dc0d5d||https://vulncheck.com/xdb/9705a4dc0d5d , https://vulncheck.com/xdb/605b3d9a1c77||https://vulncheck.com/xdb/605b3d9a1c77 , https://vulncheck.com/xdb/126bde061e76||https://vulncheck.com/xdb/126bde061e76
CVE-2021-22005 VMware vCenter Server 11/03/2021 0.94455 9.8 https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-check , https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt||https://viz.greynoise.io/tag/vmware-vcsa-file-upload-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22005 https://vulncheck.com/xdb/9da5675367c8||https://vulncheck.com/xdb/9da5675367c8 , https://vulncheck.com/xdb/893ecfaa7d37||https://vulncheck.com/xdb/893ecfaa7d37 , https://vulncheck.com/xdb/bc4416405b99||https://vulncheck.com/xdb/bc4416405b99 , https://vulncheck.com/xdb/ec495678c2bc||https://vulncheck.com/xdb/ec495678c2bc , https://vulncheck.com/xdb/422d2b1bd22d||https://vulncheck.com/xdb/422d2b1bd22d , https://vulncheck.com/xdb/d369b492a41d||https://vulncheck.com/xdb/d369b492a41d , https://vulncheck.com/xdb/3647939d992b||https://vulncheck.com/xdb/3647939d992b , https://vulncheck.com/xdb/ba93a3b960a8||https://vulncheck.com/xdb/ba93a3b960a8 , https://vulncheck.com/xdb/bfc1743eb154||https://vulncheck.com/xdb/bfc1743eb154
CVE-2020-3580 Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) 11/03/2021 0.93247 6.1 https://viz.greynoise.io/tag/cisco-asa-xss-attempt||https://viz.greynoise.io/tag/cisco-asa-xss-attempt 1 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3580 https://vulncheck.com/xdb/72298381b675||https://vulncheck.com/xdb/72298381b675 , https://vulncheck.com/xdb/30702ae3c60c||https://vulncheck.com/xdb/30702ae3c60c , https://vulncheck.com/xdb/929ab8c7b4bf||https://vulncheck.com/xdb/929ab8c7b4bf , https://vulncheck.com/xdb/d29ebf0afcf2||https://vulncheck.com/xdb/d29ebf0afcf2
CVE-2021-36942 Microsoft Windows 11/03/2021 0.93632 7.5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-36942 https://vulncheck.com/xdb/2387bcbc47ae
CVE-2019-3396 Atlassian Confluence Server and Data Server 11/03/2021 0.94486 9.8 https://viz.greynoise.io/tag/atlassian-confluence-template-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-template-injection-attempt 4 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-3396 https://vulncheck.com/xdb/fb022ff5fe3a||https://vulncheck.com/xdb/fb022ff5fe3a , https://vulncheck.com/xdb/cf39bffa0254||https://vulncheck.com/xdb/cf39bffa0254 , https://vulncheck.com/xdb/f0c5b22fe8f3||https://vulncheck.com/xdb/f0c5b22fe8f3 , https://vulncheck.com/xdb/c0e4abf9eb81||https://vulncheck.com/xdb/c0e4abf9eb81 , https://vulncheck.com/xdb/fb62fcd4b481||https://vulncheck.com/xdb/fb62fcd4b481 , https://vulncheck.com/xdb/7f52c8890f19||https://vulncheck.com/xdb/7f52c8890f19
CVE-2021-38000 Google Chromium Intents 11/03/2021 0.03408 6.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38000
CVE-2021-38648 Microsoft Open Management Infrastructure (OMI) 11/03/2021 0.25851 7.8 https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38648
CVE-2021-35211 SolarWinds Serv-U 11/03/2021 0.94139 9.0 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-35211 https://vulncheck.com/xdb/f28c021f6b0c||https://vulncheck.com/xdb/f28c021f6b0c , https://vulncheck.com/xdb/3df6460c659f||https://vulncheck.com/xdb/3df6460c659f , https://vulncheck.com/xdb/44b493399f2c||https://vulncheck.com/xdb/44b493399f2c
CVE-2020-6287 SAP NetWeaver 11/03/2021 0.94395 10.0 https://viz.greynoise.io/tag/sap-netweaver-application-server-for-java-rce-attempt||https://viz.greynoise.io/tag/sap-netweaver-application-server-for-java-rce-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6287 https://vulncheck.com/xdb/cf2bffbae837||https://vulncheck.com/xdb/cf2bffbae837 , https://vulncheck.com/xdb/85f301721ead||https://vulncheck.com/xdb/85f301721ead , https://vulncheck.com/xdb/dcab3513d95c||https://vulncheck.com/xdb/dcab3513d95c , https://vulncheck.com/xdb/5fd49cf1fa28||https://vulncheck.com/xdb/5fd49cf1fa28 , https://vulncheck.com/xdb/76887e2664e5||https://vulncheck.com/xdb/76887e2664e5 , https://vulncheck.com/xdb/28d90963af15||https://vulncheck.com/xdb/28d90963af15
CVE-2021-31956 Microsoft Windows 11/03/2021 0.85551 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31956 https://vulncheck.com/xdb/ef8974070480||https://vulncheck.com/xdb/ef8974070480 , https://vulncheck.com/xdb/736c14a7215d||https://vulncheck.com/xdb/736c14a7215d , https://vulncheck.com/xdb/189db9bb950f||https://vulncheck.com/xdb/189db9bb950f
CVE-2021-1647 Microsoft Defender 11/03/2021 0.59390 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1647
CVE-2021-30666 Apple iOS 11/03/2021 0.00901 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30666
CVE-2021-1879 Apple iOS, iPadOS, and watchOS 11/03/2021 0.02049 6.1 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1879
CVE-2021-28664 Arm Mali Graphics Processing Unit (GPU) 11/03/2021 0.00264 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-28664
CVE-2021-20016 SonicWall SSLVPN SMA100 11/03/2021 0.80445 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20016
CVE-2021-26858 Microsoft Exchange Server 11/03/2021 0.77893 7.8 TRUE FALSE FALSE Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-26858
CVE-2021-1906 Qualcomm Multiple Chipsets 11/03/2021 0.00136 6.2 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1906
CVE-2021-27102 Accellion FTA 11/03/2021 0.00339 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27102
CVE-2021-22506 Micro Focus Micro Focus Access Manager 11/03/2021 0.37554 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-22506
CVE-2010-5326 SAP NetWeaver 11/03/2021 0.26416 10.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2010-5326
CVE-2021-26411 Microsoft Internet Explorer 11/03/2021 0.89559 8.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-26411
CVE-2016-3718 ImageMagick ImageMagick 11/03/2021 0.87335 5.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3718
CVE-2019-6223 Apple iOS and macOS 11/03/2021 0.00451 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-6223
CVE-2018-8653 Microsoft Internet Explorer 11/03/2021 0.35296 7.5 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-8653
CVE-2021-27101 Accellion FTA 11/03/2021 0.01452 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27101
CVE-2016-0167 Microsoft Win32k 11/03/2021 0.02024 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0167
CVE-2021-30563 Google Chromium V8 11/03/2021 0.08751 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30563
CVE-2015-4852 Oracle WebLogic Server 11/03/2021 0.92306 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2015-4852 https://vulncheck.com/xdb/3b46068ce37d||https://vulncheck.com/xdb/3b46068ce37d , https://vulncheck.com/xdb/d6ab148d5191||https://vulncheck.com/xdb/d6ab148d5191 , https://vulncheck.com/xdb/bae8da7c0ecd||https://vulncheck.com/xdb/bae8da7c0ecd , https://vulncheck.com/xdb/d3997c03feb1||https://vulncheck.com/xdb/d3997c03feb1 , https://vulncheck.com/xdb/8424221cddad||https://vulncheck.com/xdb/8424221cddad
CVE-2021-36948 Microsoft Windows 11/03/2021 0.00129 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-36948
CVE-2017-11774 Microsoft Office 11/03/2021 0.84604 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-11774 https://vulncheck.com/xdb/1cb06cbff067
CVE-2020-0601 Microsoft Windows 11/03/2021 0.93911 8.1 TRUE TRUE FALSE Reference CISA's ED 20-02 (https://www.cisa.gov/news-events/directives/ed-20-02-mitigate-windows-vulnerabilities-january-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-02. https://nvd.nist.gov/vuln/detail/CVE-2020-0601 https://vulncheck.com/xdb/740afa3911a0||https://vulncheck.com/xdb/740afa3911a0 , https://vulncheck.com/xdb/0766cc1abe5d||https://vulncheck.com/xdb/0766cc1abe5d , https://vulncheck.com/xdb/09c5af32c1d7||https://vulncheck.com/xdb/09c5af32c1d7 , https://vulncheck.com/xdb/6abcb18100dc||https://vulncheck.com/xdb/6abcb18100dc , https://vulncheck.com/xdb/6bc84901f00a||https://vulncheck.com/xdb/6bc84901f00a , https://vulncheck.com/xdb/839b9e7e2e93||https://vulncheck.com/xdb/839b9e7e2e93 , https://vulncheck.com/xdb/f3005b474479||https://vulncheck.com/xdb/f3005b474479 , https://vulncheck.com/xdb/496d3fc0b8d0||https://vulncheck.com/xdb/496d3fc0b8d0 , https://vulncheck.com/xdb/cc5ed1f3625f||https://vulncheck.com/xdb/cc5ed1f3625f , https://vulncheck.com/xdb/08bffaffbac2||https://vulncheck.com/xdb/08bffaffbac2 , https://vulncheck.com/xdb/2269fe47fe2f||https://vulncheck.com/xdb/2269fe47fe2f , https://vulncheck.com/xdb/1ab56e688532||https://vulncheck.com/xdb/1ab56e688532
CVE-2016-3715 ImageMagick ImageMagick 11/03/2021 0.89383 5.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3715
CVE-2020-0986 Microsoft Windows 11/03/2021 0.21079 7.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0986
CVE-2020-14883 Oracle WebLogic Server 11/03/2021 0.94437 7.2 https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14750-rce-attempt , https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-14883 https://vulncheck.com/xdb/44c3b7e2464d||https://vulncheck.com/xdb/44c3b7e2464d , https://vulncheck.com/xdb/deddd47ed62a||https://vulncheck.com/xdb/deddd47ed62a , https://vulncheck.com/xdb/0a5d3f5f71c2||https://vulncheck.com/xdb/0a5d3f5f71c2 , https://vulncheck.com/xdb/c5c6975fb276||https://vulncheck.com/xdb/c5c6975fb276
CVE-2020-16017 Google Chrome 11/03/2021 0.21930 9.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-16017
CVE-2020-0968 Microsoft Internet Explorer 11/03/2021 0.43238 7.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0968
CVE-2020-27930 Apple Multiple Products 11/03/2021 0.47457 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-27930 https://vulncheck.com/xdb/ba050b6e89d5
CVE-2018-0296 Cisco Adaptive Security Appliance (ASA) 11/03/2021 0.94436 7.5 1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0296 https://vulncheck.com/xdb/ad80b13bd026||https://vulncheck.com/xdb/ad80b13bd026 , https://vulncheck.com/xdb/02e9e2c8837a||https://vulncheck.com/xdb/02e9e2c8837a , https://vulncheck.com/xdb/766776ee90cd||https://vulncheck.com/xdb/766776ee90cd , https://vulncheck.com/xdb/990d9dcf809d||https://vulncheck.com/xdb/990d9dcf809d
CVE-2020-3118 Cisco IOS XR 11/03/2021 0.00168 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3118
CVE-2020-29583 Zyxel Multiple Products 11/03/2021 0.94211 9.8 https://viz.greynoise.io/tag/zyxel-usg-ssh-backdoor-attempt||https://viz.greynoise.io/tag/zyxel-usg-ssh-backdoor-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-29583 https://vulncheck.com/xdb/13164d2ee525
CVE-2020-3952 VMware vCenter Server 11/03/2021 0.93234 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3952 https://vulncheck.com/xdb/0b7e18965378||https://vulncheck.com/xdb/0b7e18965378 , https://vulncheck.com/xdb/12b54f8ddd08||https://vulncheck.com/xdb/12b54f8ddd08 , https://vulncheck.com/xdb/2dc27965feae||https://vulncheck.com/xdb/2dc27965feae
CVE-2021-30807 Apple Multiple Products 11/03/2021 0.17750 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30807 https://vulncheck.com/xdb/cfe59e0ba463||https://vulncheck.com/xdb/cfe59e0ba463 , https://vulncheck.com/xdb/3f1ddac51672||https://vulncheck.com/xdb/3f1ddac51672 , https://vulncheck.com/xdb/227b555675d3||https://vulncheck.com/xdb/227b555675d3
CVE-2020-3569 Cisco IOS XR 11/03/2021 0.19978 8.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3569
CVE-2021-30633 Google Chromium Indexed DB API 11/03/2021 0.46777 9.6 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30633
CVE-2019-0797 Microsoft Win32k 11/03/2021 0.03027 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-0797
CVE-2021-30116 Kaseya Virtual System/Server Administrator (VSA) 11/03/2021 0.18048 10.0 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30116
CVE-2019-15752 Docker Desktop Community Edition 11/03/2021 0.60846 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-15752
CVE-2021-28663 Arm Mali Graphics Processing Unit (GPU) 11/03/2021 0.07289 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-28663 https://vulncheck.com/xdb/7fe79c6d9e0d
CVE-2019-3398 Atlassian Confluence Server and Data Center 11/03/2021 0.93966 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-3398 https://vulncheck.com/xdb/02ff19858062||https://vulncheck.com/xdb/02ff19858062 , https://vulncheck.com/xdb/0cf9ade08db1||https://vulncheck.com/xdb/0cf9ade08db1
CVE-2021-27085 Microsoft Internet Explorer 11/03/2021 0.04438 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27085
CVE-2019-5544 VMware VMware ESXi and Horizon DaaS 11/03/2021 0.87066 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-5544 https://vulncheck.com/xdb/8a8375ae7774||https://vulncheck.com/xdb/8a8375ae7774 , https://vulncheck.com/xdb/51f10d5e647f||https://vulncheck.com/xdb/51f10d5e647f
CVE-2021-21166 Google Chromium 11/03/2021 0.41931 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21166
CVE-2020-12271 Sophos SFOS 11/03/2021 0.83191 10.0 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-12271
CVE-2021-34523 Microsoft Exchange Server 11/03/2021 0.94149 9.0 https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-check , https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt||https://viz.greynoise.io/tag/exchange-proxyshell-vuln-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-34523 https://vulncheck.com/xdb/20bfc44ad41e||https://vulncheck.com/xdb/20bfc44ad41e , https://vulncheck.com/xdb/10fdd6a575c1||https://vulncheck.com/xdb/10fdd6a575c1 , https://vulncheck.com/xdb/2654f9566e2c||https://vulncheck.com/xdb/2654f9566e2c , https://vulncheck.com/xdb/c0acd90670f6||https://vulncheck.com/xdb/c0acd90670f6 , https://vulncheck.com/xdb/8ef1d6c449bf||https://vulncheck.com/xdb/8ef1d6c449bf , https://vulncheck.com/xdb/c9e3ac579e16||https://vulncheck.com/xdb/c9e3ac579e16 , https://vulncheck.com/xdb/674ca66d77f8||https://vulncheck.com/xdb/674ca66d77f8 , https://vulncheck.com/xdb/a80b26c8261b||https://vulncheck.com/xdb/a80b26c8261b
CVE-2019-18935 Progress Telerik UI for ASP.NET AJAX 11/03/2021 0.93471 9.8 https://viz.greynoise.io/tag/telerik-ui-deserialization-rce-attempt||https://viz.greynoise.io/tag/telerik-ui-deserialization-rce-attempt 5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-18935 https://vulncheck.com/xdb/dd4d5145d7fd||https://vulncheck.com/xdb/dd4d5145d7fd , https://vulncheck.com/xdb/6733f1b67fb2||https://vulncheck.com/xdb/6733f1b67fb2 , https://vulncheck.com/xdb/569e3fec38c8||https://vulncheck.com/xdb/569e3fec38c8 , https://vulncheck.com/xdb/dffdf06b5f8a||https://vulncheck.com/xdb/dffdf06b5f8a , https://vulncheck.com/xdb/48d2eb3dee46||https://vulncheck.com/xdb/48d2eb3dee46 , https://vulncheck.com/xdb/8dc793fec147||https://vulncheck.com/xdb/8dc793fec147 , https://vulncheck.com/xdb/c621c71a9bf3||https://vulncheck.com/xdb/c621c71a9bf3 , https://vulncheck.com/xdb/de3ebe4e8ea8||https://vulncheck.com/xdb/de3ebe4e8ea8
CVE-2021-30632 Google Chromium V8 11/03/2021 0.84245 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30632 https://vulncheck.com/xdb/dd5a92616e09||https://vulncheck.com/xdb/dd5a92616e09 , https://vulncheck.com/xdb/9f7f048bd1a9||https://vulncheck.com/xdb/9f7f048bd1a9 , https://vulncheck.com/xdb/4aa5278c2fd2||https://vulncheck.com/xdb/4aa5278c2fd2
CVE-2021-41773 Apache HTTP Server 11/03/2021 0.94398 7.5 https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt||https://viz.greynoise.io/tag/apache-http-server-path-traversal-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-41773 https://vulncheck.com/xdb/b176f463fd70||https://vulncheck.com/xdb/b176f463fd70 , https://vulncheck.com/xdb/c3290a9c4bc7||https://vulncheck.com/xdb/c3290a9c4bc7 , https://vulncheck.com/xdb/a64e3f6930db||https://vulncheck.com/xdb/a64e3f6930db , https://vulncheck.com/xdb/5e909ea4a3d5||https://vulncheck.com/xdb/5e909ea4a3d5 , https://vulncheck.com/xdb/0876a430eb18||https://vulncheck.com/xdb/0876a430eb18 , https://vulncheck.com/xdb/c7958f390e0c||https://vulncheck.com/xdb/c7958f390e0c , https://vulncheck.com/xdb/f8b4bb1e6c3e||https://vulncheck.com/xdb/f8b4bb1e6c3e , https://vulncheck.com/xdb/01d74e61f225||https://vulncheck.com/xdb/01d74e61f225 , https://vulncheck.com/xdb/416f536ef47f||https://vulncheck.com/xdb/416f536ef47f , https://vulncheck.com/xdb/116dd0497f92||https://vulncheck.com/xdb/116dd0497f92 , https://vulncheck.com/xdb/80d7b284f950||https://vulncheck.com/xdb/80d7b284f950 , https://vulncheck.com/xdb/54be1024b6bc||https://vulncheck.com/xdb/54be1024b6bc , https://vulncheck.com/xdb/7f7042705dd4||https://vulncheck.com/xdb/7f7042705dd4 , https://vulncheck.com/xdb/91cf2dd89533||https://vulncheck.com/xdb/91cf2dd89533 , https://vulncheck.com/xdb/a5f2ac9f054b||https://vulncheck.com/xdb/a5f2ac9f054b , https://vulncheck.com/xdb/f7be65b2ebfc||https://vulncheck.com/xdb/f7be65b2ebfc , https://vulncheck.com/xdb/79a7215a4e02||https://vulncheck.com/xdb/79a7215a4e02 , https://vulncheck.com/xdb/91738f2d976d||https://vulncheck.com/xdb/91738f2d976d , https://vulncheck.com/xdb/c454ef5641d0||https://vulncheck.com/xdb/c454ef5641d0 , https://vulncheck.com/xdb/dde0bdc0bae9||https://vulncheck.com/xdb/dde0bdc0bae9 , https://vulncheck.com/xdb/24d12a4a7fc7||https://vulncheck.com/xdb/24d12a4a7fc7 , https://vulncheck.com/xdb/772d5bced9ba||https://vulncheck.com/xdb/772d5bced9ba , https://vulncheck.com/xdb/151bc6d65f04||https://vulncheck.com/xdb/151bc6d65f04 , https://vulncheck.com/xdb/93df6b255322||https://vulncheck.com/xdb/93df6b255322 , https://vulncheck.com/xdb/58a64b19ebbb||https://vulncheck.com/xdb/58a64b19ebbb , https://vulncheck.com/xdb/e476521c9afa||https://vulncheck.com/xdb/e476521c9afa , https://vulncheck.com/xdb/42e9c7e067d3||https://vulncheck.com/xdb/42e9c7e067d3 , https://vulncheck.com/xdb/1c63893823c9||https://vulncheck.com/xdb/1c63893823c9 , https://vulncheck.com/xdb/c32e5f532570||https://vulncheck.com/xdb/c32e5f532570 , https://vulncheck.com/xdb/f0e7324b9b25||https://vulncheck.com/xdb/f0e7324b9b25 , https://vulncheck.com/xdb/25c6171f0d20||https://vulncheck.com/xdb/25c6171f0d20 , https://vulncheck.com/xdb/c46ab2084dd8||https://vulncheck.com/xdb/c46ab2084dd8 , https://vulncheck.com/xdb/d0086a5bdeec||https://vulncheck.com/xdb/d0086a5bdeec , https://vulncheck.com/xdb/b8ddde495298||https://vulncheck.com/xdb/b8ddde495298 , https://vulncheck.com/xdb/5876e9463bbd||https://vulncheck.com/xdb/5876e9463bbd , https://vulncheck.com/xdb/a6c3bff27ae4||https://vulncheck.com/xdb/a6c3bff27ae4 , https://vulncheck.com/xdb/5cb3eb657c95||https://vulncheck.com/xdb/5cb3eb657c95 , https://vulncheck.com/xdb/af8ec6c8371f||https://vulncheck.com/xdb/af8ec6c8371f , https://vulncheck.com/xdb/7cb588641bcf||https://vulncheck.com/xdb/7cb588641bcf , https://vulncheck.com/xdb/3bbc73bf5a53||https://vulncheck.com/xdb/3bbc73bf5a53 , https://vulncheck.com/xdb/80eefccf1e05||https://vulncheck.com/xdb/80eefccf1e05 , https://vulncheck.com/xdb/4aeca6685d2b||https://vulncheck.com/xdb/4aeca6685d2b , https://vulncheck.com/xdb/4641bb9539f4||https://vulncheck.com/xdb/4641bb9539f4 , https://vulncheck.com/xdb/90b14fb65ee8||https://vulncheck.com/xdb/90b14fb65ee8 , https://vulncheck.com/xdb/7efd496306c2||https://vulncheck.com/xdb/7efd496306c2 , https://vulncheck.com/xdb/8c3d9bc94733||https://vulncheck.com/xdb/8c3d9bc94733 , https://vulncheck.com/xdb/5283f9042bf8||https://vulncheck.com/xdb/5283f9042bf8 , https://vulncheck.com/xdb/78d9ef784392||https://vulncheck.com/xdb/78d9ef784392 , https://vulncheck.com/xdb/0c20fdde6dd8||https://vulncheck.com/xdb/0c20fdde6dd8 , https://vulncheck.com/xdb/0542adb90818||https://vulncheck.com/xdb/0542adb90818 , https://vulncheck.com/xdb/6cf46a065e42||https://vulncheck.com/xdb/6cf46a065e42 , https://vulncheck.com/xdb/f9ab3269f3b5||https://vulncheck.com/xdb/f9ab3269f3b5 , https://vulncheck.com/xdb/d98a494ae032||https://vulncheck.com/xdb/d98a494ae032 , https://vulncheck.com/xdb/3211ee9a55c9||https://vulncheck.com/xdb/3211ee9a55c9 , https://vulncheck.com/xdb/4e2e5e6c7181||https://vulncheck.com/xdb/4e2e5e6c7181 , https://vulncheck.com/xdb/37f7e7cf267d||https://vulncheck.com/xdb/37f7e7cf267d , https://vulncheck.com/xdb/044ea91b2193||https://vulncheck.com/xdb/044ea91b2193 , https://vulncheck.com/xdb/8867c4e1c307||https://vulncheck.com/xdb/8867c4e1c307 , https://vulncheck.com/xdb/94a06b6dd90b||https://vulncheck.com/xdb/94a06b6dd90b , https://vulncheck.com/xdb/19daa216be3e||https://vulncheck.com/xdb/19daa216be3e , https://vulncheck.com/xdb/8818ad910e2f||https://vulncheck.com/xdb/8818ad910e2f , https://vulncheck.com/xdb/bce26bf9a7db||https://vulncheck.com/xdb/bce26bf9a7db , https://vulncheck.com/xdb/96f1c731b1dc||https://vulncheck.com/xdb/96f1c731b1dc , https://vulncheck.com/xdb/7f994d193496||https://vulncheck.com/xdb/7f994d193496 , https://vulncheck.com/xdb/85f36fa22d39||https://vulncheck.com/xdb/85f36fa22d39 , https://vulncheck.com/xdb/a4cf0cfa21f6||https://vulncheck.com/xdb/a4cf0cfa21f6 , https://vulncheck.com/xdb/bb58b7001b1f||https://vulncheck.com/xdb/bb58b7001b1f , https://vulncheck.com/xdb/b598961f144e||https://vulncheck.com/xdb/b598961f144e , https://vulncheck.com/xdb/809430868585||https://vulncheck.com/xdb/809430868585 , https://vulncheck.com/xdb/846a361d532a||https://vulncheck.com/xdb/846a361d532a , https://vulncheck.com/xdb/56fc1e32325a||https://vulncheck.com/xdb/56fc1e32325a , https://vulncheck.com/xdb/e53c96b7f8c4||https://vulncheck.com/xdb/e53c96b7f8c4 , https://vulncheck.com/xdb/d0972a06acee||https://vulncheck.com/xdb/d0972a06acee , https://vulncheck.com/xdb/ff16564070fa||https://vulncheck.com/xdb/ff16564070fa
CVE-2021-27561 Yealink Device Management 11/03/2021 0.94106 9.8 https://viz.greynoise.io/tag/yealink-device-management-rce-attempt||https://viz.greynoise.io/tag/yealink-device-management-rce-attempt 2 FALSE FALSE TRUE https://nvd.nist.gov/vuln/detail/CVE-2021-27561
CVE-2021-1782 Apple Multiple Products 11/03/2021 0.07419 7.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1782 https://vulncheck.com/xdb/5d442d6d99aa
CVE-2020-10148 SolarWinds Orion 11/03/2021 0.94345 9.8 https://viz.greynoise.io/tag/solarwinds-orion-api-authentication-bypass-attempt||https://viz.greynoise.io/tag/solarwinds-orion-api-authentication-bypass-attempt 2 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10148 https://vulncheck.com/xdb/95b8cd641b31||https://vulncheck.com/xdb/95b8cd641b31 , https://vulncheck.com/xdb/90c4b509e3c2||https://vulncheck.com/xdb/90c4b509e3c2
CVE-2021-38649 Microsoft Open Management Infrastructure (OMI) 11/03/2021 0.20227 7.0 https://viz.greynoise.io/tag/azure-omi-rce-attempt||https://viz.greynoise.io/tag/azure-omi-rce-attempt , https://viz.greynoise.io/tag/azure-omi-rce-check||https://viz.greynoise.io/tag/azure-omi-rce-check FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38649
CVE-2021-40539 Zoho ManageEngine 11/03/2021 0.94424 9.8 https://viz.greynoise.io/tag/zoho-manageengine-rce-check||https://viz.greynoise.io/tag/zoho-manageengine-rce-check , https://viz.greynoise.io/tag/zoho-manageengine-rce-attempt||https://viz.greynoise.io/tag/zoho-manageengine-rce-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-40539 https://vulncheck.com/xdb/9c5da6b32721||https://vulncheck.com/xdb/9c5da6b32721 , https://vulncheck.com/xdb/7e476fa6ce71||https://vulncheck.com/xdb/7e476fa6ce71 , https://vulncheck.com/xdb/512a715c6eb9||https://vulncheck.com/xdb/512a715c6eb9 , https://vulncheck.com/xdb/a29bf4bbff47||https://vulncheck.com/xdb/a29bf4bbff47
CVE-2020-25213 WordPress File Manager Plugin 11/03/2021 0.94420 10.0 https://viz.greynoise.io/tag/wordpress-file-manager-plugin-rce-attempt||https://viz.greynoise.io/tag/wordpress-file-manager-plugin-rce-attempt 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-25213 https://vulncheck.com/xdb/989ad429d25b||https://vulncheck.com/xdb/989ad429d25b , https://vulncheck.com/xdb/eaec3e2b975b||https://vulncheck.com/xdb/eaec3e2b975b , https://vulncheck.com/xdb/669397d52e31||https://vulncheck.com/xdb/669397d52e31 , https://vulncheck.com/xdb/39148855248e||https://vulncheck.com/xdb/39148855248e
CVE-2021-1498 Cisco HyperFlex HX 11/03/2021 0.94059 9.8 https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-attempt , https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check||https://viz.greynoise.io/tag/cisco-hyperflex-hx-rce-vuln-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1498
CVE-2021-30858 Apple iOS, iPadOS, and macOS 11/03/2021 0.01026 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30858 https://vulncheck.com/xdb/44738a8de35b||https://vulncheck.com/xdb/44738a8de35b , https://vulncheck.com/xdb/5a806de612f9||https://vulncheck.com/xdb/5a806de612f9
CVE-2020-15505 Ivanti MobileIron Multiple Products 11/03/2021 0.94388 9.8 https://viz.greynoise.io/tag/mobileiron-rce-vuln-check||https://viz.greynoise.io/tag/mobileiron-rce-vuln-check , https://viz.greynoise.io/tag/mobileiron-rce-attempt||https://viz.greynoise.io/tag/mobileiron-rce-attempt 4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-15505 https://vulncheck.com/xdb/45aadad7e394
CVE-2021-30761 Apple iOS 11/03/2021 0.00413 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30761
CVE-2018-15961 Adobe ColdFusion 11/03/2021 0.94396 9.8 https://viz.greynoise.io/tag/adobe-coldfusion-rce-attempt||https://viz.greynoise.io/tag/adobe-coldfusion-rce-attempt 3 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-15961 https://vulncheck.com/xdb/30b10a753cfb||https://vulncheck.com/xdb/30b10a753cfb , https://vulncheck.com/xdb/2064f6e531de||https://vulncheck.com/xdb/2064f6e531de , https://vulncheck.com/xdb/82ee6a663df4||https://vulncheck.com/xdb/82ee6a663df4 , https://vulncheck.com/xdb/4b30bcb1fa25||https://vulncheck.com/xdb/4b30bcb1fa25
CVE-2020-14882 Oracle WebLogic Server 11/03/2021 0.94454 9.8 https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt||https://viz.greynoise.io/tag/oracle-weblogic-cve-2020-14882-rce-attempt 4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-14882 https://vulncheck.com/xdb/ee66647244c0||https://vulncheck.com/xdb/ee66647244c0 , https://vulncheck.com/xdb/ce68066c259e||https://vulncheck.com/xdb/ce68066c259e , https://vulncheck.com/xdb/263de78f8cf4||https://vulncheck.com/xdb/263de78f8cf4 , https://vulncheck.com/xdb/72df0e276603||https://vulncheck.com/xdb/72df0e276603 , https://vulncheck.com/xdb/65ab3b9c2eba||https://vulncheck.com/xdb/65ab3b9c2eba , https://vulncheck.com/xdb/9476c651d5c0||https://vulncheck.com/xdb/9476c651d5c0 , https://vulncheck.com/xdb/1219b099cdb5||https://vulncheck.com/xdb/1219b099cdb5 , https://vulncheck.com/xdb/2539687dc0ee||https://vulncheck.com/xdb/2539687dc0ee , https://vulncheck.com/xdb/0973a77bd68e||https://vulncheck.com/xdb/0973a77bd68e , https://vulncheck.com/xdb/358f9960e478||https://vulncheck.com/xdb/358f9960e478 , https://vulncheck.com/xdb/1bc750482298||https://vulncheck.com/xdb/1bc750482298 , https://vulncheck.com/xdb/5adef887fb7e||https://vulncheck.com/xdb/5adef887fb7e , https://vulncheck.com/xdb/78305831909c||https://vulncheck.com/xdb/78305831909c , https://vulncheck.com/xdb/fb1c79c789bd||https://vulncheck.com/xdb/fb1c79c789bd , https://vulncheck.com/xdb/49e9f36f16d8||https://vulncheck.com/xdb/49e9f36f16d8 , https://vulncheck.com/xdb/91590177ee0d||https://vulncheck.com/xdb/91590177ee0d , https://vulncheck.com/xdb/038d453cd70d||https://vulncheck.com/xdb/038d453cd70d , https://vulncheck.com/xdb/3b3ffa595f0c||https://vulncheck.com/xdb/3b3ffa595f0c , https://vulncheck.com/xdb/a0b529fd1da1||https://vulncheck.com/xdb/a0b529fd1da1 , https://vulncheck.com/xdb/0b1c82ba94b9||https://vulncheck.com/xdb/0b1c82ba94b9 , https://vulncheck.com/xdb/7c45f41c9580||https://vulncheck.com/xdb/7c45f41c9580 , https://vulncheck.com/xdb/d3a3f91fa307||https://vulncheck.com/xdb/d3a3f91fa307 , https://vulncheck.com/xdb/179b4fcf93ef||https://vulncheck.com/xdb/179b4fcf93ef , https://vulncheck.com/xdb/7abe5b874cdf||https://vulncheck.com/xdb/7abe5b874cdf , https://vulncheck.com/xdb/c13d71ba7622||https://vulncheck.com/xdb/c13d71ba7622 , https://vulncheck.com/xdb/7232b7797539||https://vulncheck.com/xdb/7232b7797539 , https://vulncheck.com/xdb/da9f3f6e7e1f||https://vulncheck.com/xdb/da9f3f6e7e1f , https://vulncheck.com/xdb/e962ac877371||https://vulncheck.com/xdb/e962ac877371 , https://vulncheck.com/xdb/c05a01763211||https://vulncheck.com/xdb/c05a01763211 , https://vulncheck.com/xdb/59c38bcb5664||https://vulncheck.com/xdb/59c38bcb5664 , https://vulncheck.com/xdb/8035aa262c64||https://vulncheck.com/xdb/8035aa262c64 , https://vulncheck.com/xdb/b539b7bd0520||https://vulncheck.com/xdb/b539b7bd0520 , https://vulncheck.com/xdb/8270081cbc20||https://vulncheck.com/xdb/8270081cbc20 , https://vulncheck.com/xdb/a13fcf8de8fc||https://vulncheck.com/xdb/a13fcf8de8fc , https://vulncheck.com/xdb/5f6f99d250bd||https://vulncheck.com/xdb/5f6f99d250bd
CVE-2021-30551 Google Chromium V8 11/03/2021 0.76954 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30551 https://vulncheck.com/xdb/82e25211c4d6
CVE-2021-30663 Apple Multiple Products 11/03/2021 0.00215 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30663
CVE-2021-30661 Apple Multiple Products 11/03/2021 0.00218 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30661
CVE-2021-20022 SonicWall SonicWall Email Security 11/03/2021 0.46261 7.2 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20022
CVE-2019-8394 Zoho ManageEngine 11/03/2021 0.87936 6.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-8394
CVE-2021-23874 McAfee McAfee Total Protection (MTP) 11/03/2021 0.00833 8.2 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-23874
CVE-2020-1380 Microsoft Internet Explorer 11/03/2021 0.86305 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1380
CVE-2021-35464 ForgeRock Access Management (AM) 11/03/2021 0.94386 9.8 https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-vuln-check||https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-vuln-check , https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-attempt||https://viz.greynoise.io/tag/forgerock-openam-pre-auth-rce-attempt 2 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-35464 https://vulncheck.com/xdb/aaf393a9e76d||https://vulncheck.com/xdb/aaf393a9e76d , https://vulncheck.com/xdb/19031593f3fb||https://vulncheck.com/xdb/19031593f3fb
CVE-2019-13608 Citrix StoreFront Server 11/03/2021 0.29403 7.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-13608
CVE-2020-0041 Android Android Kernel 11/03/2021 0.22373 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0041 https://vulncheck.com/xdb/c2368cc50b93||https://vulncheck.com/xdb/c2368cc50b93 , https://vulncheck.com/xdb/95ece15b5070||https://vulncheck.com/xdb/95ece15b5070 , https://vulncheck.com/xdb/b8a8ac784158||https://vulncheck.com/xdb/b8a8ac784158
CVE-2020-8644 PlaySMS PlaySMS 11/03/2021 0.93305 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8644 https://vulncheck.com/xdb/7f9ab9f4fabb
CVE-2018-4878 Adobe Flash Player 11/03/2021 0.93326 9.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-4878 https://vulncheck.com/xdb/a06e4b00cea1||https://vulncheck.com/xdb/a06e4b00cea1 , https://vulncheck.com/xdb/b5e2c274615b||https://vulncheck.com/xdb/b5e2c274615b , https://vulncheck.com/xdb/b0c5ef430944||https://vulncheck.com/xdb/b0c5ef430944 , https://vulncheck.com/xdb/e9db4ff1ab08||https://vulncheck.com/xdb/e9db4ff1ab08 , https://vulncheck.com/xdb/75f0db8b4ce5||https://vulncheck.com/xdb/75f0db8b4ce5 , https://vulncheck.com/xdb/e84f85632f4d||https://vulncheck.com/xdb/e84f85632f4d , https://vulncheck.com/xdb/b960fd82858a||https://vulncheck.com/xdb/b960fd82858a , https://vulncheck.com/xdb/89973b88277b||https://vulncheck.com/xdb/89973b88277b
CVE-2020-8655 EyesOfNetwork EyesOfNetwork 11/03/2021 0.84094 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8655 https://vulncheck.com/xdb/743d1c5492ba
CVE-2020-10221 rConfig rConfig 11/03/2021 0.90366 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10221
CVE-2020-6418 Google Chromium V8 11/03/2021 0.84596 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-6418 https://vulncheck.com/xdb/68df06773b3b||https://vulncheck.com/xdb/68df06773b3b , https://vulncheck.com/xdb/f153146b6e74||https://vulncheck.com/xdb/f153146b6e74 , https://vulncheck.com/xdb/09aef40e5781||https://vulncheck.com/xdb/09aef40e5781
CVE-2020-10189 Zoho ManageEngine 11/03/2021 0.94248 9.8 4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10189 https://vulncheck.com/xdb/5eb1a844d5f5
CVE-2020-8195 Citrix Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance 11/03/2021 0.85271 6.5 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8195
CVE-2020-1464 Microsoft Windows 11/03/2021 0.05831 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1464
CVE-2020-1350 Microsoft Windows 11/03/2021 0.93577 10.0 FALSE TRUE FALSE Reference CISA's ED 20-03 (https://www.cisa.gov/news-events/directives/ed-20-03-mitigate-windows-dns-server-remote-code-execution-vulnerability-july-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-03. https://nvd.nist.gov/vuln/detail/CVE-2020-1350 https://vulncheck.com/xdb/352dbf3a9e75||https://vulncheck.com/xdb/352dbf3a9e75 , https://vulncheck.com/xdb/5f894c317342||https://vulncheck.com/xdb/5f894c317342 , https://vulncheck.com/xdb/51b1a2bf598f||https://vulncheck.com/xdb/51b1a2bf598f , https://vulncheck.com/xdb/25e55fac1438||https://vulncheck.com/xdb/25e55fac1438 , https://vulncheck.com/xdb/7caf699a1681||https://vulncheck.com/xdb/7caf699a1681 , https://vulncheck.com/xdb/76424953d73e||https://vulncheck.com/xdb/76424953d73e , https://vulncheck.com/xdb/98fbd62a7f31||https://vulncheck.com/xdb/98fbd62a7f31
CVE-2020-16009 Google Chromium V8 11/03/2021 0.80718 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-16009
CVE-2019-11580 Atlassian Crowd and Crowd Data Center 11/03/2021 0.94406 9.8 https://viz.greynoise.io/tag/atlassian-crowd-remote-code-execution-attempt||https://viz.greynoise.io/tag/atlassian-crowd-remote-code-execution-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-11580 https://vulncheck.com/xdb/acc7c542752b||https://vulncheck.com/xdb/acc7c542752b , https://vulncheck.com/xdb/82ed45a27b08||https://vulncheck.com/xdb/82ed45a27b08 , https://vulncheck.com/xdb/841b26515764||https://vulncheck.com/xdb/841b26515764 , https://vulncheck.com/xdb/c2f1ca456ea3||https://vulncheck.com/xdb/c2f1ca456ea3
CVE-2020-27950 Apple Multiple Products 11/03/2021 0.37741 5.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-27950 https://vulncheck.com/xdb/3f008773d321||https://vulncheck.com/xdb/3f008773d321 , https://vulncheck.com/xdb/f02168cd5ede||https://vulncheck.com/xdb/f02168cd5ede , https://vulncheck.com/xdb/30d794c9b6ce||https://vulncheck.com/xdb/30d794c9b6ce
CVE-2021-30657 Apple macOS 11/03/2021 0.75513 5.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30657 https://vulncheck.com/xdb/5a5cb257b016
CVE-2017-9248 Progress ASP.NET AJAX and Sitefinity 11/03/2021 0.85305 9.8 https://viz.greynoise.io/tag/telerik-ui-information-disclosure-vuln-check||https://viz.greynoise.io/tag/telerik-ui-information-disclosure-vuln-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-9248 https://vulncheck.com/xdb/2e3387e756d8||https://vulncheck.com/xdb/2e3387e756d8 , https://vulncheck.com/xdb/0c5d66215a26||https://vulncheck.com/xdb/0c5d66215a26 , https://vulncheck.com/xdb/369fcaab6d25||https://vulncheck.com/xdb/369fcaab6d25 , https://vulncheck.com/xdb/cbd541a8cca4||https://vulncheck.com/xdb/cbd541a8cca4 , https://vulncheck.com/xdb/77f3f6d6f643||https://vulncheck.com/xdb/77f3f6d6f643 , https://vulncheck.com/xdb/54d9b4e7ea66||https://vulncheck.com/xdb/54d9b4e7ea66 , https://vulncheck.com/xdb/89ae1abf1d84||https://vulncheck.com/xdb/89ae1abf1d84
CVE-2020-1040 Microsoft Hyper-V RemoteFX 11/03/2021 0.00314 9.0 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1040
CVE-2020-4428 IBM Data Risk Manager 11/03/2021 0.48308 9.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-4428
CVE-2020-10181 Sumavision Enhanced Multimedia Router (EMR) 11/03/2021 0.29896 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-10181
CVE-2021-26084 Atlassian Confluence Server and Data Center 11/03/2021 0.94437 9.8 https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-attempt||https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-attempt , https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-vuln-check||https://viz.greynoise.io/tag/atlassian-confluence-server-ognl-injection-vuln-check 5 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-26084 https://vulncheck.com/xdb/93070dc771b1||https://vulncheck.com/xdb/93070dc771b1 , https://vulncheck.com/xdb/5c17feb787aa||https://vulncheck.com/xdb/5c17feb787aa , https://vulncheck.com/xdb/01737250181e||https://vulncheck.com/xdb/01737250181e , https://vulncheck.com/xdb/63829d0fe9e7||https://vulncheck.com/xdb/63829d0fe9e7 , https://vulncheck.com/xdb/631e95d7b76d||https://vulncheck.com/xdb/631e95d7b76d , https://vulncheck.com/xdb/d646562bd095||https://vulncheck.com/xdb/d646562bd095 , https://vulncheck.com/xdb/8be80a290f5d||https://vulncheck.com/xdb/8be80a290f5d , https://vulncheck.com/xdb/2bffe1a2b81e||https://vulncheck.com/xdb/2bffe1a2b81e , https://vulncheck.com/xdb/6a9526ec7989||https://vulncheck.com/xdb/6a9526ec7989 , https://vulncheck.com/xdb/ed3988e8b8c4||https://vulncheck.com/xdb/ed3988e8b8c4 , https://vulncheck.com/xdb/c8f148869b4d||https://vulncheck.com/xdb/c8f148869b4d , https://vulncheck.com/xdb/9ebbdbc964c1||https://vulncheck.com/xdb/9ebbdbc964c1 , https://vulncheck.com/xdb/cc01e52836c0||https://vulncheck.com/xdb/cc01e52836c0 , https://vulncheck.com/xdb/905f9ba1f0cc||https://vulncheck.com/xdb/905f9ba1f0cc , https://vulncheck.com/xdb/68069c40edf2||https://vulncheck.com/xdb/68069c40edf2 , https://vulncheck.com/xdb/a406fe433633||https://vulncheck.com/xdb/a406fe433633 , https://vulncheck.com/xdb/527ea731c62f||https://vulncheck.com/xdb/527ea731c62f , https://vulncheck.com/xdb/9c5a5da647e7||https://vulncheck.com/xdb/9c5a5da647e7 , https://vulncheck.com/xdb/da4f3471f7d5||https://vulncheck.com/xdb/da4f3471f7d5 , https://vulncheck.com/xdb/3e2ccb0c6937||https://vulncheck.com/xdb/3e2ccb0c6937 , https://vulncheck.com/xdb/8b9e22d2ce4a||https://vulncheck.com/xdb/8b9e22d2ce4a , https://vulncheck.com/xdb/fc81f3df4a7f||https://vulncheck.com/xdb/fc81f3df4a7f , https://vulncheck.com/xdb/40de1a55603f||https://vulncheck.com/xdb/40de1a55603f , https://vulncheck.com/xdb/0c50354d6f93||https://vulncheck.com/xdb/0c50354d6f93
CVE-2020-0688 Microsoft Exchange Server 11/03/2021 0.94418 8.8 https://viz.greynoise.io/tag/exchange-memory-corruption-rce-attempt||https://viz.greynoise.io/tag/exchange-memory-corruption-rce-attempt TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0688 https://vulncheck.com/xdb/ac5f11e6a30d||https://vulncheck.com/xdb/ac5f11e6a30d , https://vulncheck.com/xdb/ab48dae2440a||https://vulncheck.com/xdb/ab48dae2440a , https://vulncheck.com/xdb/f58d70470909||https://vulncheck.com/xdb/f58d70470909 , https://vulncheck.com/xdb/96c707bb39f5||https://vulncheck.com/xdb/96c707bb39f5 , https://vulncheck.com/xdb/868234a5c9b7||https://vulncheck.com/xdb/868234a5c9b7 , https://vulncheck.com/xdb/ed6eb904124b||https://vulncheck.com/xdb/ed6eb904124b , https://vulncheck.com/xdb/1fe8a75efd31||https://vulncheck.com/xdb/1fe8a75efd31 , https://vulncheck.com/xdb/42b75e809382||https://vulncheck.com/xdb/42b75e809382 , https://vulncheck.com/xdb/e502b8576da7||https://vulncheck.com/xdb/e502b8576da7 , https://vulncheck.com/xdb/730fc9157ab0||https://vulncheck.com/xdb/730fc9157ab0 , https://vulncheck.com/xdb/c2dc4dbb6f66||https://vulncheck.com/xdb/c2dc4dbb6f66 , https://vulncheck.com/xdb/7f793deb1114||https://vulncheck.com/xdb/7f793deb1114 , https://vulncheck.com/xdb/05c78c55c273||https://vulncheck.com/xdb/05c78c55c273 , https://vulncheck.com/xdb/8a20e8eac65d||https://vulncheck.com/xdb/8a20e8eac65d
CVE-2020-8468 Trend Micro Apex One, OfficeScan and Worry-Free Business Security Agents 11/03/2021 0.04484 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8468
CVE-2020-0683 Microsoft Windows 11/03/2021 0.32718 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0683 https://vulncheck.com/xdb/e62d999afd19||https://vulncheck.com/xdb/e62d999afd19 , https://vulncheck.com/xdb/a3d5574cb924||https://vulncheck.com/xdb/a3d5574cb924 , https://vulncheck.com/xdb/d9a4a6ac4c63||https://vulncheck.com/xdb/d9a4a6ac4c63
CVE-2016-3235 Microsoft Office 11/03/2021 0.85808 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3235
CVE-2021-38003 Google Chromium V8 11/03/2021 0.76400 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-38003 https://vulncheck.com/xdb/1a0b1ef4a809||https://vulncheck.com/xdb/1a0b1ef4a809 , https://vulncheck.com/xdb/72c3951ee77e||https://vulncheck.com/xdb/72c3951ee77e
CVE-2018-20062 ThinkPHP noneCms 11/03/2021 0.94306 9.8 0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-20062 https://vulncheck.com/xdb/b3f4b7a0b588||https://vulncheck.com/xdb/b3f4b7a0b588 , https://vulncheck.com/xdb/5c5fbabe0573||https://vulncheck.com/xdb/5c5fbabe0573
CVE-2021-31955 Microsoft Windows 11/03/2021 0.14639 5.5 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-31955 https://vulncheck.com/xdb/7188402bf1ec
CVE-2016-0185 Microsoft Windows 11/03/2021 0.82752 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-0185
CVE-2021-34527 Microsoft Windows 11/03/2021 0.94265 8.8 TRUE TRUE FALSE Reference CISA's ED 21-04 (https://www.cisa.gov/news-events/directives/ed-21-04-mitigate-windows-print-spooler-service-vulnerability) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-04. https://nvd.nist.gov/vuln/detail/CVE-2021-34527 https://vulncheck.com/xdb/aafd327559cb||https://vulncheck.com/xdb/aafd327559cb , https://vulncheck.com/xdb/0544e277335e||https://vulncheck.com/xdb/0544e277335e , https://vulncheck.com/xdb/94dfa232ad84||https://vulncheck.com/xdb/94dfa232ad84 , https://vulncheck.com/xdb/66146f087766||https://vulncheck.com/xdb/66146f087766 , https://vulncheck.com/xdb/8b8ea9fe1124||https://vulncheck.com/xdb/8b8ea9fe1124 , https://vulncheck.com/xdb/f06e206bb116||https://vulncheck.com/xdb/f06e206bb116 , https://vulncheck.com/xdb/a9a05728c824||https://vulncheck.com/xdb/a9a05728c824 , https://vulncheck.com/xdb/f4a2f262c1e1||https://vulncheck.com/xdb/f4a2f262c1e1 , https://vulncheck.com/xdb/161c77693a74||https://vulncheck.com/xdb/161c77693a74 , https://vulncheck.com/xdb/236b4901d545||https://vulncheck.com/xdb/236b4901d545
CVE-2020-3161 Cisco Cisco IP Phones 11/03/2021 0.80825 9.8 https://viz.greynoise.io/tag/cisco-ip-phones-stack-overflow-cve-2020-3161-attempt||https://viz.greynoise.io/tag/cisco-ip-phones-stack-overflow-cve-2020-3161-attempt FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3161 https://vulncheck.com/xdb/683ddbd88289
CVE-2012-3152 Oracle Fusion Middleware 11/03/2021 0.91310 9.1 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2012-3152
CVE-2020-11652 SaltStack Salt 11/03/2021 0.94200 6.5 https://viz.greynoise.io/tag/saltstack-scanner||https://viz.greynoise.io/tag/saltstack-scanner FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-11652 https://vulncheck.com/xdb/a45373fdc023||https://vulncheck.com/xdb/a45373fdc023 , https://vulncheck.com/xdb/11b5248fe04c||https://vulncheck.com/xdb/11b5248fe04c , https://vulncheck.com/xdb/d9b31f42dc98||https://vulncheck.com/xdb/d9b31f42dc98 , https://vulncheck.com/xdb/d7a39011635d||https://vulncheck.com/xdb/d7a39011635d , https://vulncheck.com/xdb/d28267b60453||https://vulncheck.com/xdb/d28267b60453 , https://vulncheck.com/xdb/5840ac3783ac||https://vulncheck.com/xdb/5840ac3783ac , https://vulncheck.com/xdb/cf1bedb2b8aa||https://vulncheck.com/xdb/cf1bedb2b8aa
CVE-2019-19781 Citrix Application Delivery Controller (ADC), Gateway, and SD-WAN WANOP Appliance 11/03/2021 0.94442 9.8 https://viz.greynoise.io/tag/citrix-netscaler-lfi-attempt||https://viz.greynoise.io/tag/citrix-netscaler-lfi-attempt 8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-19781 https://vulncheck.com/xdb/88021ad0e77b||https://vulncheck.com/xdb/88021ad0e77b , https://vulncheck.com/xdb/103163214ca9||https://vulncheck.com/xdb/103163214ca9 , https://vulncheck.com/xdb/eea607d2d8a4||https://vulncheck.com/xdb/eea607d2d8a4 , https://vulncheck.com/xdb/69c8311e600c||https://vulncheck.com/xdb/69c8311e600c , https://vulncheck.com/xdb/d55aabb8e817||https://vulncheck.com/xdb/d55aabb8e817 , https://vulncheck.com/xdb/d61ce8c7068d||https://vulncheck.com/xdb/d61ce8c7068d , https://vulncheck.com/xdb/224739a35737||https://vulncheck.com/xdb/224739a35737 , https://vulncheck.com/xdb/03c8862d3d11||https://vulncheck.com/xdb/03c8862d3d11 , https://vulncheck.com/xdb/987910f7a39d||https://vulncheck.com/xdb/987910f7a39d , https://vulncheck.com/xdb/1b40df6017f7||https://vulncheck.com/xdb/1b40df6017f7 , https://vulncheck.com/xdb/5ebd889262c7||https://vulncheck.com/xdb/5ebd889262c7 , https://vulncheck.com/xdb/7ab2e8a707c8||https://vulncheck.com/xdb/7ab2e8a707c8 , https://vulncheck.com/xdb/bd1a9acc8fcf||https://vulncheck.com/xdb/bd1a9acc8fcf , https://vulncheck.com/xdb/8d2aa3944ef3||https://vulncheck.com/xdb/8d2aa3944ef3 , https://vulncheck.com/xdb/553ce4defd35||https://vulncheck.com/xdb/553ce4defd35 , https://vulncheck.com/xdb/34b27d809743||https://vulncheck.com/xdb/34b27d809743 , https://vulncheck.com/xdb/f3b2f3994c60||https://vulncheck.com/xdb/f3b2f3994c60 , https://vulncheck.com/xdb/f641370d0cf1||https://vulncheck.com/xdb/f641370d0cf1 , https://vulncheck.com/xdb/5daef00ab695||https://vulncheck.com/xdb/5daef00ab695 , https://vulncheck.com/xdb/0b44b71192dd||https://vulncheck.com/xdb/0b44b71192dd , https://vulncheck.com/xdb/02742865c3b9||https://vulncheck.com/xdb/02742865c3b9 , https://vulncheck.com/xdb/f2880bad85d1||https://vulncheck.com/xdb/f2880bad85d1 , https://vulncheck.com/xdb/ebfe92f86902||https://vulncheck.com/xdb/ebfe92f86902
CVE-2018-7600 Drupal Drupal Core 11/03/2021 0.94489 9.8 https://viz.greynoise.io/tag/drupal-rce-attempt||https://viz.greynoise.io/tag/drupal-rce-attempt 4 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-7600 https://vulncheck.com/xdb/0f9b4b5c3fdd||https://vulncheck.com/xdb/0f9b4b5c3fdd , https://vulncheck.com/xdb/6210c8efb8c0||https://vulncheck.com/xdb/6210c8efb8c0 , https://vulncheck.com/xdb/1df8d0e011f7||https://vulncheck.com/xdb/1df8d0e011f7 , https://vulncheck.com/xdb/06e3c416c2d9||https://vulncheck.com/xdb/06e3c416c2d9 , https://vulncheck.com/xdb/62fa544a97dc||https://vulncheck.com/xdb/62fa544a97dc , https://vulncheck.com/xdb/020a6d58ef57||https://vulncheck.com/xdb/020a6d58ef57 , https://vulncheck.com/xdb/c878141c1b57||https://vulncheck.com/xdb/c878141c1b57 , https://vulncheck.com/xdb/e07a02c6c680||https://vulncheck.com/xdb/e07a02c6c680 , https://vulncheck.com/xdb/2cb73a6f32d0||https://vulncheck.com/xdb/2cb73a6f32d0 , https://vulncheck.com/xdb/8bb18d909af8||https://vulncheck.com/xdb/8bb18d909af8 , https://vulncheck.com/xdb/f6840124d312||https://vulncheck.com/xdb/f6840124d312 , https://vulncheck.com/xdb/c7637bac32d5||https://vulncheck.com/xdb/c7637bac32d5 , https://vulncheck.com/xdb/70444c690e44||https://vulncheck.com/xdb/70444c690e44 , https://vulncheck.com/xdb/b2ad4ba89de6||https://vulncheck.com/xdb/b2ad4ba89de6 , https://vulncheck.com/xdb/464985de7ded||https://vulncheck.com/xdb/464985de7ded , https://vulncheck.com/xdb/e00c4f0f2628||https://vulncheck.com/xdb/e00c4f0f2628 , https://vulncheck.com/xdb/49097e1fdbbb||https://vulncheck.com/xdb/49097e1fdbbb , https://vulncheck.com/xdb/6f85920c0670||https://vulncheck.com/xdb/6f85920c0670 , https://vulncheck.com/xdb/d4d58bdc2983||https://vulncheck.com/xdb/d4d58bdc2983 , https://vulncheck.com/xdb/d1a4b59d693c||https://vulncheck.com/xdb/d1a4b59d693c , https://vulncheck.com/xdb/9b1b9ea4c421||https://vulncheck.com/xdb/9b1b9ea4c421 , https://vulncheck.com/xdb/36d1b1902163||https://vulncheck.com/xdb/36d1b1902163 , https://vulncheck.com/xdb/4649e1e3eb49||https://vulncheck.com/xdb/4649e1e3eb49 , https://vulncheck.com/xdb/0bef2689fa42||https://vulncheck.com/xdb/0bef2689fa42 , https://vulncheck.com/xdb/e104ec642cd7||https://vulncheck.com/xdb/e104ec642cd7 , https://vulncheck.com/xdb/275e04b88ebe||https://vulncheck.com/xdb/275e04b88ebe , https://vulncheck.com/xdb/ccc6bd53fd2b||https://vulncheck.com/xdb/ccc6bd53fd2b , https://vulncheck.com/xdb/18441ff73017||https://vulncheck.com/xdb/18441ff73017 , https://vulncheck.com/xdb/8fd9c335c455||https://vulncheck.com/xdb/8fd9c335c455 , https://vulncheck.com/xdb/2c29ea901266||https://vulncheck.com/xdb/2c29ea901266 , https://vulncheck.com/xdb/a91d4aaab05c||https://vulncheck.com/xdb/a91d4aaab05c , https://vulncheck.com/xdb/85edc13d35ba||https://vulncheck.com/xdb/85edc13d35ba , https://vulncheck.com/xdb/53767629a229||https://vulncheck.com/xdb/53767629a229
CVE-2020-5847 Unraid Unraid 11/03/2021 0.93510 9.8 https://viz.greynoise.io/tag/unraid-unauth-rce-attempt||https://viz.greynoise.io/tag/unraid-unauth-rce-attempt , https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check||https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check 2 FALSE TRUE TRUE https://nvd.nist.gov/vuln/detail/CVE-2020-5847
CVE-2019-17026 Mozilla Firefox and Thunderbird 11/03/2021 0.42007 8.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-17026 https://vulncheck.com/xdb/3ff9de1f6fb7||https://vulncheck.com/xdb/3ff9de1f6fb7 , https://vulncheck.com/xdb/1c3f5236eacb||https://vulncheck.com/xdb/1c3f5236eacb
CVE-2016-4437 Apache Shiro 11/03/2021 0.94303 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-4437 https://vulncheck.com/xdb/c53d22555992||https://vulncheck.com/xdb/c53d22555992 , https://vulncheck.com/xdb/6535af761e5c||https://vulncheck.com/xdb/6535af761e5c , https://vulncheck.com/xdb/d7a43fa66a9e||https://vulncheck.com/xdb/d7a43fa66a9e , https://vulncheck.com/xdb/67abb858193d||https://vulncheck.com/xdb/67abb858193d
CVE-2020-0878 Microsoft Edge and Internet Explorer 11/03/2021 0.23317 4.2 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0878
CVE-2021-1675 Microsoft Windows 11/03/2021 0.94349 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-1675 https://vulncheck.com/xdb/381c98d00dfc||https://vulncheck.com/xdb/381c98d00dfc , https://vulncheck.com/xdb/fd141cadfdd9||https://vulncheck.com/xdb/fd141cadfdd9 , https://vulncheck.com/xdb/debfb4d8ee62||https://vulncheck.com/xdb/debfb4d8ee62 , https://vulncheck.com/xdb/5761c571065d||https://vulncheck.com/xdb/5761c571065d , https://vulncheck.com/xdb/a3f29455981b||https://vulncheck.com/xdb/a3f29455981b , https://vulncheck.com/xdb/b2ee9973a014||https://vulncheck.com/xdb/b2ee9973a014 , https://vulncheck.com/xdb/b90c284dc523||https://vulncheck.com/xdb/b90c284dc523 , https://vulncheck.com/xdb/6365096d731b||https://vulncheck.com/xdb/6365096d731b , https://vulncheck.com/xdb/a45b8faa5940||https://vulncheck.com/xdb/a45b8faa5940 , https://vulncheck.com/xdb/ea76e3b517da||https://vulncheck.com/xdb/ea76e3b517da , https://vulncheck.com/xdb/22ddb70101f9||https://vulncheck.com/xdb/22ddb70101f9 , https://vulncheck.com/xdb/d01d428e5b4c||https://vulncheck.com/xdb/d01d428e5b4c , https://vulncheck.com/xdb/ddf90bbea093||https://vulncheck.com/xdb/ddf90bbea093 , https://vulncheck.com/xdb/da0d5a88e5db||https://vulncheck.com/xdb/da0d5a88e5db , https://vulncheck.com/xdb/132e026d2027||https://vulncheck.com/xdb/132e026d2027 , https://vulncheck.com/xdb/dcea18151317||https://vulncheck.com/xdb/dcea18151317 , https://vulncheck.com/xdb/3d814c23dd9d||https://vulncheck.com/xdb/3d814c23dd9d , https://vulncheck.com/xdb/a272e3e91f3a||https://vulncheck.com/xdb/a272e3e91f3a , https://vulncheck.com/xdb/ded60e94a061||https://vulncheck.com/xdb/ded60e94a061 , https://vulncheck.com/xdb/0c06ba53c498||https://vulncheck.com/xdb/0c06ba53c498 , https://vulncheck.com/xdb/29f9009b9be9||https://vulncheck.com/xdb/29f9009b9be9 , https://vulncheck.com/xdb/b93501b21b35||https://vulncheck.com/xdb/b93501b21b35 , https://vulncheck.com/xdb/0300146c83c2||https://vulncheck.com/xdb/0300146c83c2 , https://vulncheck.com/xdb/0d51bca37337||https://vulncheck.com/xdb/0d51bca37337 , https://vulncheck.com/xdb/a80f7a9e25f2||https://vulncheck.com/xdb/a80f7a9e25f2 , https://vulncheck.com/xdb/613d6b9bd25f||https://vulncheck.com/xdb/613d6b9bd25f , https://vulncheck.com/xdb/490a73431a10||https://vulncheck.com/xdb/490a73431a10 , https://vulncheck.com/xdb/7cc2f4d6f2d5||https://vulncheck.com/xdb/7cc2f4d6f2d5 , https://vulncheck.com/xdb/462712fb0096||https://vulncheck.com/xdb/462712fb0096 , https://vulncheck.com/xdb/97af0436c96d||https://vulncheck.com/xdb/97af0436c96d , https://vulncheck.com/xdb/ffee1c151af9||https://vulncheck.com/xdb/ffee1c151af9 , https://vulncheck.com/xdb/60402fe4962c||https://vulncheck.com/xdb/60402fe4962c
CVE-2021-21985 VMware vCenter Server 11/03/2021 0.94370 9.8 https://viz.greynoise.io/tag/vmware-vsphere-client-rce-vuln-check||https://viz.greynoise.io/tag/vmware-vsphere-client-rce-vuln-check , https://viz.greynoise.io/tag/vmware-vsphere-client-rce-attempt||https://viz.greynoise.io/tag/vmware-vsphere-client-rce-attempt 3 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21985 https://vulncheck.com/xdb/743530fc8fc0||https://vulncheck.com/xdb/743530fc8fc0 , https://vulncheck.com/xdb/21b7feee22dd||https://vulncheck.com/xdb/21b7feee22dd , https://vulncheck.com/xdb/8852763d165c||https://vulncheck.com/xdb/8852763d165c , https://vulncheck.com/xdb/ec790bf05bc8||https://vulncheck.com/xdb/ec790bf05bc8 , https://vulncheck.com/xdb/b3a451f18da0||https://vulncheck.com/xdb/b3a451f18da0 , https://vulncheck.com/xdb/f0b52d0eb738||https://vulncheck.com/xdb/f0b52d0eb738 , https://vulncheck.com/xdb/08882943728b||https://vulncheck.com/xdb/08882943728b
CVE-2021-20023 SonicWall SonicWall Email Security 11/03/2021 0.67205 4.9 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-20023
CVE-2021-21148 Google Chromium V8 11/03/2021 0.50292 8.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-21148
CVE-2021-27103 Accellion FTA 11/03/2021 0.05462 9.8 TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-27103
CVE-2020-5849 Unraid Unraid 11/03/2021 0.93710 7.5 https://viz.greynoise.io/tag/unraid-unauth-rce-attempt||https://viz.greynoise.io/tag/unraid-unauth-rce-attempt , https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check||https://viz.greynoise.io/tag/unraid-unauth-rce-vuln-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-5849
CVE-2020-26919 NETGEAR JGS516PE Devices 11/03/2021 0.93066 9.8 https://viz.greynoise.io/tag/netgear-prosafe-plus-remote-command-execution-attempt||https://viz.greynoise.io/tag/netgear-prosafe-plus-remote-command-execution-attempt FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-26919
CVE-2021-27065 Microsoft Exchange Server 11/03/2021 0.94174 7.8 TRUE TRUE FALSE Reference CISA's ED 21-02 (https://www.cisa.gov/news-events/directives/ed-21-02-mitigate-microsoft-exchange-premises-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-02. https://nvd.nist.gov/vuln/detail/CVE-2021-27065 https://vulncheck.com/xdb/cc79093ff9c5||https://vulncheck.com/xdb/cc79093ff9c5 , https://vulncheck.com/xdb/035cb0a06ecd||https://vulncheck.com/xdb/035cb0a06ecd , https://vulncheck.com/xdb/4440a0603d4e||https://vulncheck.com/xdb/4440a0603d4e
CVE-2021-30860 Apple Multiple Products 11/03/2021 0.69382 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30860
CVE-2021-30869 Apple iOS, iPadOS, and macOS 11/03/2021 0.04229 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-30869
CVE-2021-33771 Microsoft Windows 11/03/2021 0.01557 7.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-33771
CVE-2021-36955 Microsoft Windows 11/03/2021 0.18971 7.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2021-36955 https://vulncheck.com/xdb/64cb88a140f3
CVE-2020-0646 Microsoft .NET Framework 11/03/2021 0.92775 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-0646
CVE-2016-3643 SolarWinds Virtualization Manager 11/03/2021 0.06995 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2016-3643
CVE-2020-1147 Microsoft .NET Framework, SharePoint, Visual Studio 11/03/2021 0.92846 7.8 https://viz.greynoise.io/tag/sharepoint-rce-vuln-check||https://viz.greynoise.io/tag/sharepoint-rce-vuln-check FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-1147
CVE-2020-17144 Microsoft Exchange Server 11/03/2021 0.92223 8.4 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-17144 https://vulncheck.com/xdb/3c6c5d3ca673||https://vulncheck.com/xdb/3c6c5d3ca673 , https://vulncheck.com/xdb/bbc21fba2ce0||https://vulncheck.com/xdb/bbc21fba2ce0 , https://vulncheck.com/xdb/bf12a0733fb9||https://vulncheck.com/xdb/bf12a0733fb9 , https://vulncheck.com/xdb/78f51572c784||https://vulncheck.com/xdb/78f51572c784 , https://vulncheck.com/xdb/72b878cc1c22||https://vulncheck.com/xdb/72b878cc1c22
CVE-2020-2555 Oracle Multiple Products 11/03/2021 0.93183 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-2555 https://vulncheck.com/xdb/1003dc67ff34||https://vulncheck.com/xdb/1003dc67ff34 , https://vulncheck.com/xdb/e667362e551e||https://vulncheck.com/xdb/e667362e551e , https://vulncheck.com/xdb/2c95cddac1b5||https://vulncheck.com/xdb/2c95cddac1b5 , https://vulncheck.com/xdb/6179b4e1d51c||https://vulncheck.com/xdb/6179b4e1d51c , https://vulncheck.com/xdb/c9e0223955e2||https://vulncheck.com/xdb/c9e0223955e2 , https://vulncheck.com/xdb/322326255843||https://vulncheck.com/xdb/322326255843 , https://vulncheck.com/xdb/235a5c344d3f||https://vulncheck.com/xdb/235a5c344d3f
CVE-2020-3950 VMware Multiple Products 11/03/2021 0.09431 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-3950
CVE-2020-8599 Trend Micro Apex One and OfficeScan 11/03/2021 0.58420 9.8 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8599
CVE-2020-8657 EyesOfNetwork EyesOfNetwork 11/03/2021 0.86143 9.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-8657
CVE-2020-8260 Ivanti Pulse Connect Secure 11/03/2021 0.72598 7.2 TRUE TRUE FALSE Reference CISA's ED 21-03 (https://www.cisa.gov/news-events/directives/ed-21-03-mitigate-pulse-connect-secure-product-vulnerabilities) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 21-03. https://nvd.nist.gov/vuln/detail/CVE-2020-8260
CVE-2020-9819 Apple iOS, iPadOS, and watchOS 11/03/2021 0.00446 4.3 FALSE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2020-9819
CVE-2019-7481 SonicWall SMA100 11/03/2021 0.94344 7.5 https://viz.greynoise.io/tag/sonicwall-sra-4600-sql-injection-attempt||https://viz.greynoise.io/tag/sonicwall-sra-4600-sql-injection-attempt TRUE FALSE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-7481
CVE-2019-18988 TeamViewer Desktop 11/03/2021 0.11779 7.0 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2019-18988 https://vulncheck.com/xdb/ab7ae9b0b03e||https://vulncheck.com/xdb/ab7ae9b0b03e , https://vulncheck.com/xdb/15aa9088b9e8||https://vulncheck.com/xdb/15aa9088b9e8
CVE-2018-0802 Microsoft Office 11/03/2021 0.94103 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2018-0802 https://vulncheck.com/xdb/9de5d4bf2056||https://vulncheck.com/xdb/9de5d4bf2056 , https://vulncheck.com/xdb/3eb61ae72bb4||https://vulncheck.com/xdb/3eb61ae72bb4 , https://vulncheck.com/xdb/d2e01d805674||https://vulncheck.com/xdb/d2e01d805674 , https://vulncheck.com/xdb/79b5c2826fcb||https://vulncheck.com/xdb/79b5c2826fcb , https://vulncheck.com/xdb/e0e7653da293||https://vulncheck.com/xdb/e0e7653da293 , https://vulncheck.com/xdb/2b50b68aab89||https://vulncheck.com/xdb/2b50b68aab89
CVE-2017-0143 Microsoft Windows 11/03/2021 0.94022 8.8 TRUE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-0143 https://vulncheck.com/xdb/3ec88a1770ac||https://vulncheck.com/xdb/3ec88a1770ac , https://vulncheck.com/xdb/3e4890416f69||https://vulncheck.com/xdb/3e4890416f69 , https://vulncheck.com/xdb/5a99b35253e9||https://vulncheck.com/xdb/5a99b35253e9
CVE-2017-8759 Microsoft .NET Framework 11/03/2021 0.93905 7.8 FALSE TRUE FALSE https://nvd.nist.gov/vuln/detail/CVE-2017-8759 https://vulncheck.com/xdb/c10cc081a401||https://vulncheck.com/xdb/c10cc081a401 , https://vulncheck.com/xdb/8334ffed12fa||https://vulncheck.com/xdb/8334ffed12fa , https://vulncheck.com/xdb/78581acb6157||https://vulncheck.com/xdb/78581acb6157 , https://vulncheck.com/xdb/4b60da5761a0||https://vulncheck.com/xdb/4b60da5761a0 , https://vulncheck.com/xdb/9b87d37fcb73||https://vulncheck.com/xdb/9b87d37fcb73 , https://vulncheck.com/xdb/ed1021bf7878||https://vulncheck.com/xdb/ed1021bf7878 , https://vulncheck.com/xdb/4107da43504a||https://vulncheck.com/xdb/4107da43504a , https://vulncheck.com/xdb/0187c7bde1e5||https://vulncheck.com/xdb/0187c7bde1e5 , https://vulncheck.com/xdb/2c3cc4e5f0ef||https://vulncheck.com/xdb/2c3cc4e5f0ef , https://vulncheck.com/xdb/e28825904312||https://vulncheck.com/xdb/e28825904312 , https://vulncheck.com/xdb/b9285bd07a5a||https://vulncheck.com/xdb/b9285bd07a5a , https://vulncheck.com/xdb/074916446e1c||https://vulncheck.com/xdb/074916446e1c , https://vulncheck.com/xdb/229e0e29b71b||https://vulncheck.com/xdb/229e0e29b71b
CVE-2020-1472 Microsoft Netlogon 11/03/2021 0.94448 5.5 TRUE TRUE FALSE Reference CISA's ED 20-04 (https://www.cisa.gov/news-events/directives/ed-20-04-mitigate-netlogon-elevation-privilege-vulnerability-august-2020-patch-tuesday) for further guidance and requirements. Note: The due date for addressing this vulnerability aligns with the requirements outlined in ED 20-04. https://nvd.nist.gov/vuln/detail/CVE-2020-1472 https://vulncheck.com/xdb/a1b9b1f814a4||https://vulncheck.com/xdb/a1b9b1f814a4 , https://vulncheck.com/xdb/7d0ea12835e6||https://vulncheck.com/xdb/7d0ea12835e6 , https://vulncheck.com/xdb/a89dd51de0e3||https://vulncheck.com/xdb/a89dd51de0e3 , https://vulncheck.com/xdb/e4924536cdc3||https://vulncheck.com/xdb/e4924536cdc3 , https://vulncheck.com/xdb/20af17b721b6||https://vulncheck.com/xdb/20af17b721b6 , https://vulncheck.com/xdb/1b38ed7bf92e||https://vulncheck.com/xdb/1b38ed7bf92e , https://vulncheck.com/xdb/141011b9f610||https://vulncheck.com/xdb/141011b9f610 , https://vulncheck.com/xdb/ffa521c6d50d||https://vulncheck.com/xdb/ffa521c6d50d , https://vulncheck.com/xdb/21a822495611||https://vulncheck.com/xdb/21a822495611 , https://vulncheck.com/xdb/907edaa608a7||https://vulncheck.com/xdb/907edaa608a7 , https://vulncheck.com/xdb/0878132c0998||https://vulncheck.com/xdb/0878132c0998 , https://vulncheck.com/xdb/273d08fc4891||https://vulncheck.com/xdb/273d08fc4891 , https://vulncheck.com/xdb/11534d8099c0||https://vulncheck.com/xdb/11534d8099c0 , https://vulncheck.com/xdb/7e3fb5cd52b5||https://vulncheck.com/xdb/7e3fb5cd52b5 , https://vulncheck.com/xdb/65af2cf69e5f||https://vulncheck.com/xdb/65af2cf69e5f , https://vulncheck.com/xdb/d4088276b3d3||https://vulncheck.com/xdb/d4088276b3d3 , https://vulncheck.com/xdb/614d9bc21087||https://vulncheck.com/xdb/614d9bc21087 , https://vulncheck.com/xdb/b3e7553472c0||https://vulncheck.com/xdb/b3e7553472c0 , https://vulncheck.com/xdb/6f61ec3202ab||https://vulncheck.com/xdb/6f61ec3202ab , https://vulncheck.com/xdb/f31d61268a71||https://vulncheck.com/xdb/f31d61268a71 , https://vulncheck.com/xdb/47718882bf35||https://vulncheck.com/xdb/47718882bf35 , https://vulncheck.com/xdb/5ec098e97c2b||https://vulncheck.com/xdb/5ec098e97c2b , https://vulncheck.com/xdb/d3b02f321a67||https://vulncheck.com/xdb/d3b02f321a67 , https://vulncheck.com/xdb/d5db0229692d||https://vulncheck.com/xdb/d5db0229692d , https://vulncheck.com/xdb/f2386616a5f6||https://vulncheck.com/xdb/f2386616a5f6 , https://vulncheck.com/xdb/15295a0728a1||https://vulncheck.com/xdb/15295a0728a1 , https://vulncheck.com/xdb/91a82e32aebb||https://vulncheck.com/xdb/91a82e32aebb , https://vulncheck.com/xdb/2b2746cff079||https://vulncheck.com/xdb/2b2746cff079 , https://vulncheck.com/xdb/f6d507143d13||https://vulncheck.com/xdb/f6d507143d13 , https://vulncheck.com/xdb/981d68eb93dc||https://vulncheck.com/xdb/981d68eb93dc , https://vulncheck.com/xdb/cc70b2cf77c2||https://vulncheck.com/xdb/cc70b2cf77c2 , https://vulncheck.com/xdb/ded3b5e316de||https://vulncheck.com/xdb/ded3b5e316de , https://vulncheck.com/xdb/baa1d498a5f5||https://vulncheck.com/xdb/baa1d498a5f5 , https://vulncheck.com/xdb/de09f764488a||https://vulncheck.com/xdb/de09f764488a , https://vulncheck.com/xdb/4266c54f6888||https://vulncheck.com/xdb/4266c54f6888 , https://vulncheck.com/xdb/b802c327864b||https://vulncheck.com/xdb/b802c327864b , https://vulncheck.com/xdb/082957aab268||https://vulncheck.com/xdb/082957aab268 , https://vulncheck.com/xdb/aab99fa8bb77||https://vulncheck.com/xdb/aab99fa8bb77 , https://vulncheck.com/xdb/fc4cb42e3317||https://vulncheck.com/xdb/fc4cb42e3317 , https://vulncheck.com/xdb/56246df0d671||https://vulncheck.com/xdb/56246df0d671 , https://vulncheck.com/xdb/0f6d43740f56||https://vulncheck.com/xdb/0f6d43740f56 , https://vulncheck.com/xdb/cf64e2ea741f||https://vulncheck.com/xdb/cf64e2ea741f , https://vulncheck.com/xdb/c5fc872daa6a||https://vulncheck.com/xdb/c5fc872daa6a , https://vulncheck.com/xdb/983f39e3a57e||https://vulncheck.com/xdb/983f39e3a57e , https://vulncheck.com/xdb/3ce5076013bb||https://vulncheck.com/xdb/3ce5076013bb , https://vulncheck.com/xdb/ef4224f7e535||https://vulncheck.com/xdb/ef4224f7e535 , https://vulncheck.com/xdb/9da3143dc5c2||https://vulncheck.com/xdb/9da3143dc5c2 , https://vulncheck.com/xdb/dd4ae8009961||https://vulncheck.com/xdb/dd4ae8009961 , https://vulncheck.com/xdb/945ac6f44b35||https://vulncheck.com/xdb/945ac6f44b35 , https://vulncheck.com/xdb/22611416152e||https://vulncheck.com/xdb/22611416152e , https://vulncheck.com/xdb/25c4330dd5bc||https://vulncheck.com/xdb/25c4330dd5bc , https://vulncheck.com/xdb/6869949be286||https://vulncheck.com/xdb/6869949be286 , https://vulncheck.com/xdb/819d8120f6b4||https://vulncheck.com/xdb/819d8120f6b4 , https://vulncheck.com/xdb/8240eab3ecba||https://vulncheck.com/xdb/8240eab3ecba , https://vulncheck.com/xdb/ec3302cc4035||https://vulncheck.com/xdb/ec3302cc4035 , https://vulncheck.com/xdb/85bb14853591||https://vulncheck.com/xdb/85bb14853591 , https://vulncheck.com/xdb/1561d5b8edd9||https://vulncheck.com/xdb/1561d5b8edd9 , https://vulncheck.com/xdb/869e2256552c||https://vulncheck.com/xdb/869e2256552c , https://vulncheck.com/xdb/5063a30af753||https://vulncheck.com/xdb/5063a30af753 , https://vulncheck.com/xdb/7a9717baaae0||https://vulncheck.com/xdb/7a9717baaae0 , https://vulncheck.com/xdb/e6e9f7eb96c4||https://vulncheck.com/xdb/e6e9f7eb96c4 , https://vulncheck.com/xdb/743025db6559||https://vulncheck.com/xdb/743025db6559 , https://vulncheck.com/xdb/44550fddd054||https://vulncheck.com/xdb/44550fddd054 , https://vulncheck.com/xdb/992b98c5b3a6||https://vulncheck.com/xdb/992b98c5b3a6 , https://vulncheck.com/xdb/dcd5b16f0af2||https://vulncheck.com/xdb/dcd5b16f0af2 , https://vulncheck.com/xdb/4cc91a55dad4||https://vulncheck.com/xdb/4cc91a55dad4
CVE ID Vendor Product Date Added to Catalog EPSS Score CVSSv4 Base CVSSv3 Base GreyNoise Tags Shadowserver 30d Avg. Nucleus Exploited by Malware Nucleus Public Exploit Available Nucleus Impacts OT CISA Notes VulnCheck XDB Entries

The Dashboard above provides a complete list of the CISA Known Exploitable Vulnerabilities Catalog, as well as essential information about each vulnerability, including:

  • CVE Identifier: The unique Common Vulnerabilities and Exposures (CVE) identification number assigned to each vulnerability.
  • Vendor: The organization who developed the product associated with the CVE.
  • Product: The product associated with the CVE.
  • Date Added: The date CISA added the vulnerability to the CISA KEV list.
  • Due Date: Federal organizations are required to comply with remediation dates that are set by CISA BOD 22-01. The due date reflects the date federal agencies must comply with the mandate by.

Frequently Asked Questions

Why did Nucleus create the CISA KEV Enrichment Dashboard?

We created this tool out of our own curiosity to learn more about the vulnerabilities CISA identifies on the CISA KEV catalog as the information provided by CISA is extremely limited. We believe having additional context can help organizations better understand the value of incorporating CISA KEV, GreynoiseEPSS, and other threat intelligence into vulnerability management prioritization and remediation efforts.

What is the CISA KEV (Known Exploitable Vulnerabilities) Catalog?

The CISA KEV Catalog is a managed threat intelligence source that provides a list of known exploited vulnerabilities that carry a significant risk to federal agencies. CISA KEV was developed as a part of the CISA Binding Operating Directive 22-01. The catalog is available for free from CISA and we recommend any organizations should consider using this and other threat intelligence sources to help prioritize vulnerability remediation.

What vulnerability enrichment is included on the dashboard?

Nucleus CISA KEV Vulnerability Enrichment Dashboard mirrors the CISA KEV list, and is enriched with CVSS, EPSS and GreyNoise Threat Intelligence.

How can I identify CISA Known Exploitable Vulnerabilities within my environment?

Lucky you should ask! Enriching your vulnerabilities findings data with vulnerability intelligence is a key way to prioritize vulnerability remediation efforts and significantly reduce your risk of being the victim of an exploited vulnerability. Nucleus enables you to aggregate all of your assets and vulnerabilities and quickly identify what CISA Known Exploitable Vulnerabilities are within your environment.

Learn how Nucleus can help you identify and prioritize CISA Known Exploitable Vulnerabilities for remediation.

Watch a Demo Today

Learn more about the Nucleus Unified Vulnerability Management platform right away.
Watch our in-depth, on-demand demo to see us in action.