ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
Lockbit | Unspecified | 1 | LockBit is a type of malware, specifically ransomware, that infiltrates systems to exploit and damage them. It can enter your system through various channels such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt |
ID | Type | Votes | Profile Description |
---|---|---|---|
APT40 | Unspecified | 2 | APT40, a Chinese cyber espionage group suspected to be linked to the People's Republic of China (PRC) Ministry of State Security, has been identified as a significant threat actor. The group typically targets countries strategically important to China's Belt and Road Initiative. Over the years, APT4 |
Cadet Blizzard | Unspecified | 1 | Cadet Blizzard, a threat actor group associated with Russia's GRU military intelligence unit, has been identified by Microsoft as the perpetrator of destructive cyber attacks in Ukraine using wiper malware. The group has been active since at least 2020 and has recently gained some success, according |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2021-44228 | Unspecified | 3 | CVE-2021-44228, also known as the Log4j vulnerability, is a software flaw found in Apache Log4j, a widely used logging utility. Despite multiple attempts by Advanced Persistent Threat (APT) actors to exploit this vulnerability in the ServiceDesk system, these efforts were unsuccessful. However, it b |
CVE-2021-31207 | Unspecified | 3 | CVE-2021-31207 is a significant software vulnerability that affects Atlassian Confluence and Microsoft Exchange. It was discovered that Advanced Persistent Threat group APT40 rapidly exploits this flaw, along with other public vulnerabilities in widely used software like Log4J (CVE-2021-44228) and M |
Follina | Unspecified | 2 | Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou |
Log4Shell | Unspecified | 2 | Log4Shell is a software vulnerability, specifically a flaw in the design or implementation of the popular Java logging library, Log4j. Identified as CVE-2021-44228, this vulnerability allows an attacker to remotely execute arbitrary code, often leading to full system compromise. Advanced Persistent |
Proxyshell | Unspecified | 2 | ProxyShell is a critical vulnerability affecting Microsoft Exchange email servers. Identified as CVE-2021-34473, it is a flaw in software design or implementation that can be exploited by attackers to gain unauthorized access to systems. The vulnerability was actively exploited by threat actors, cau |
CVE-2021-34523 | Unspecified | 1 | None |
Proxyshell Cve-2021-34473 | Unspecified | 1 | ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) is a set of three chained vulnerabilities that perform unauthenticated remote code execution (RCE) in Microsoft Exchange. Identified as a significant flaw in software design or implementation, it allows unauthorized users to execute arbitra |
CVE-2017-7504 | Unspecified | 1 | CVE-2017-7504 is a significant software vulnerability identified in the JBoss MQ Java Message Service (JMS). This flaw, rooted in software design and implementation, allows for deserialization attacks when exploited on an internet-exposed server. The vulnerability has been abused by malicious actors |
CVE-2020-14882 | Unspecified | 1 | None |
CVE-2021-35464 | Unspecified | 1 | None |
CVE-2019-19781 | Unspecified | 1 | CVE-2019-19781, also known as the Citrix Directory Traversal Bug, is a software vulnerability that lies in the design or implementation of the software. This flaw allows an attacker to potentially gain unauthorized access to sensitive data or even execute arbitrary code on the compromised system. De |
CVE-2021-22205 | Unspecified | 1 | CVE-2021-22205 is a significant vulnerability in GitLab, a flaw in software design or implementation that allows for remote code execution. This vulnerability has been assigned the highest severity score (CVSS score: 10.0) due to its potential impact. The bug, which is now two years old, continues t |
CVE-2020-14750 | Unspecified | 1 | None |
CVE-2021-22941 | Unspecified | 1 | CVE-2021-22941 is a significant software vulnerability identified in Citrix ShareFile, which allows for remote code execution (RCE). This flaw was exploited by the threat actor group known as GOLD MELODY, also referred to as PROPHET SPIDER. The group has been linked to various attacks exploiting sec |
Proxynotshell | Unspecified | 1 | ProxyNotShell is a software vulnerability, specifically a flaw in the design or implementation of Microsoft Exchange Server. It was first identified and exploited through CVE-2022-41082, as reported by Palo Alto Networks' Unit 42. The ProxyNotShell exploit method leveraged an AutoDiscover endpoint t |
CVE-2021-26085 | Unspecified | 1 | None |
CVE-2022-26134 | Unspecified | 1 | CVE-2022-26134 is a critical software vulnerability that was discovered in Atlassian Confluence Server and Data Center. This flaw, which allows for remote code execution (RCE), was publicly disclosed by Atlassian in June 2022. The Cybersecurity and Infrastructure Security Agency (CISA) recognized th |
CVE-2021-34473 | Unspecified | 1 | CVE-2021-34473 is a significant software vulnerability that was discovered in Microsoft Exchange Server. This flaw, along with two others (CVE-2021-31207 and CVE-2021-34523), forms a chain of vulnerabilities known as ProxyShell. These vulnerabilities can be exploited together by remote attackers to |
Source | CreatedAt | Title |
---|---|---|
Securityaffairs | 16 days ago | Cybersecurity agencies warn of China-linked APT40 's capabilities |
CISA | 18 days ago | People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action | CISA |
CERT-EU | 5 months ago | Sensor Intel Series: Top CVEs in December 2023 |
CERT-EU | 8 months ago | Sensor Intel Series: Top CVEs in October 2023 |
CERT-EU | 9 months ago | Critical Atlassian Confluence bug exploited in Cerber ransomware attacks |
Malwarebytes | 9 months ago | Update now! Atlassian Confluence vulnerability is being actively exploited |
CERT-EU | 10 months ago | Sensor Intel Series: Top CVEs in August 2023 | F5 Labs |
CERT-EU | 10 months ago | Cyber Group 'Gold Melody' Selling Compromised Access to Ransomware Attackers |
CERT-EU | a year ago | Qualys Top 20 Exploited Vulnerabilities | Qualys Security Blog |
Malwarebytes | a year ago | 2022's most routinely exploited vulnerabilities—history repeats |
CERT-EU | a year ago | Unmasking the top exploited vulnerabilities of 2022 – GIXtools |
BankInfoSecurity | a year ago | Patching Conundrum: 5-Year Old Flaw Again Tops Most-Hit List |
CERT-EU | a year ago | Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities |
CERT-EU | a year ago | FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022 |
CERT-EU | a year ago | Most exploited cyber vulnerabilities of 2022 revealed |
CERT-EU | a year ago | CISA Advisory of Top 42 Frequently Exploited Flaws of 2022 |
BankInfoSecurity | a year ago | Patching Conundrum: 4-Year Old Flaw Again Tops Most-Hit List |
Securityaffairs | a year ago | CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022 |
CERT-EU | a year ago | Old vulnerabilities, major vendors dominate list of most-exploited flaws of 2022 |
CERT-EU | a year ago | FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022 |