Research Alerts
- CVE-2023-45249: Exploitation in the wild has been confirmed by Acronis. Patches have been available for some time and if not remediated, urgent patching is recommended.
- CVE-2024-4879: Public exploit code is available and reports indicate that exploitation is underway. Urgent patching is recommended
- CVE-2024-41110: This authentication bypass vulnerability was assigned a max severity CVSS score of 10, however no current exploitation has been observed.
- CVE-2024-6327: Due to past exploitation of Telerik Report Server, Tenable Research is carefully watching for exploitation or PoCs
- CVE-2024-20419: Successful exploitation could allow an attacker to change the password of any user, including admin users. Immediate patching is recommended