Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ZDI-26-182: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026

    ZDI-26-180: Microsoft Windows cdd Improper Locking Local Privilege Escalation Vulnerability

    April 29, 2026

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    April 29, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog
    News

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    adminBy adminApril 29, 2026No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Before diving into this month’s Known Exploited Vulnerabilities update, I’d like to note that this post covers data from June, July, and August so we are calling it a Summer report. This is due prioritizing other research over the last few month that we’ve been focused on publishing, which are worth a read:

    • VulnCheck captured exploitation evidence for 158 vulnerabilities with initial evidence emerging during June, July and August.
    • The evidence of known exploitation was collected from over 35 different sources.
    • Software that topped the list of new Known Exploited Vulnerabilities (KEVs) includes Microsoft Windows, Apache OFBiz, PHP Everywhere, OSGeo GeoServer, ServiceNow, Google Chromium, and the Linux Kernel.
    • CISA added 42 CVEs to their KEV list during June, July and August. For 71.4% (30/42) of those vulnerabilities, VulnCheck provided evidence earlier than CISA.

    Vulnerabilities, Exploitation, Exploits

    The 158 CVEs with known exploitation evidence were associated with 119 software suppliers across 136 unique products. The following software topped the list with two or more CVEs with known exploitation:

    • Microsoft Windows (10)
    • Apache OFBiz (3)
    • PHP Everywhere (3)
    • OSGeo GeoServer (3)
    • Totolink (2)
    • ServiceNow (2)
    • Google Chromium (2)
    • Linux Kernel (2)

    VulnCheck KEV Trends

    Vulnerability exploitation disclosure occasionally appears to spike, as evidence of exploitation is reported publicly at different times or when we onboard new sources like ShadowServer.

    We expect the baseline of new KEVs to range between 30-50 vulnerabilities per month, with occasional spikes around quarterly reports in October/November and the start of the new year. A increasing trend towards an increase in public disclosure of exploitation evidence appears to be continuing along with the growth in vulnerability disclosure, which we encourage, as it enhances organizations’ visibility into vulnerability exploitation.

    If you use VulnCheck KEV, you might have noticed an overall increase in the total number of Known Exploited Vulnerabilities beyond just the new evidence we captured. This is due to our ongoing efforts to capture historical exploitation evidence. We hope to write more about this soon to provide some clarity on this topic.

    VulnCheck KEV Sources

    We collected exploitation evidence from over 35 sources. Notably, F5 published two reports, and CISA released a report titled “North Korea Cyber Group Conducts Global Espionage Campaign,” both with significant numbers of CVEs. Additionally, several vulnerabilities on the CISA KEV list were disclosed simultaneously with the vendors, such as Microsoft. For a deeper dive into these details, you can access the full dataset of the VulnCheck KEV here.

    It’s worth noting that we audited and added evidence from Patchstack and Wordfence over the last few months. Both these projects track wordpress plugin vulnerabilities and exploitation so VulnCheck KEV now has much better coverage for wordpress plug-ins thanks to these sources.

    VulnCheck KEV vs. CISA KEV

    Between June and August, VulnCheck added 158 CVEs to its Known Exploited Vulnerabilities (KEV) list, while CISA added 42 CVEs to their KEV list. For 30 of these 42 (71.4%) vulnerabilities, VulnCheck provided evidence earlier than CISA, enabling organizations to gain early visibility into vulnerabilities that later appear on the CISA KEV list.

    The 12 vulnerabilities disclosed by CISA KEV included OSgeo GeoServer, Dahua IP Camera, Microsoft Project, Microsoft Windows (7),Versa Director (1) and Roundcube (1). With the exception of Dahua, OSgeo GeoServer and Roundcube, these vulnerabilities were disclosed within 2 days of the exploitation evidence. The Microsoft vulnerabilities were also disclosed at the same time through Microsoft MSRC which we also capture in VulnCheck KEV.

    VulnCheck KEV vs. CISA KEV

    We’ve continued to analyze Known Exploitation in relation to vulnerability scoring systems, specifically CVSS and EPSS. Our goal is to gain insights into how these scoring systems can better reflect known exploitation and emerging threats.

    To enhance visibility into CVSS and EPSS, I created a plot of known exploitation mapped to these systems. Yellow indicates higher density, while purple represents lower density of CVEs associated with known exploitation.
    By applying an EPSS score (Early September scoring) of 0.1 or a 10% probability of exploitation or higher, we find that 40 CVEs (25.3%) align with Known Exploitation captured for the first time during June, July and August. With a CVSS-BT score of 9 or higher, 57 CVEs (36.1%) map to Known Exploitation. We plan to explore scoring systems further to provide deeper insights when we have more time.

    Related to the topic of vulnerability prioritization, ee suggest exploring these articles on the topic of vulnerability prioritization:

    • Taking an Evidence Based Approach to Prioritization: https://vulncheck.com/blog/vulnerability-prioritization
    • Do We Need Yet Another Vulnerability Scoring Systems? (Ben Edwards, Bitsight): https://www.bitsight.com/blog/do-we-need-yet-another-vulnerability-scoring-system-if-its-ssvc-thats-resounding-yass

    For those eager to dive deeper into known exploited vulnerabilities, you can start by utilizing VulnCheck Community a free resource including VulnCheck KEV and VulnCheck NVD++.

    VulnCheck is helping organizations not just to solve the vulnerability prioritization challenge – we’re working to help equip any product manager, CSIRT/PSIRT or SecOps team and Threat Hunting team to get faster and more accurate with infinite efficiency using VulnCheck solutions.

    We knew that we needed better data, faster across the board, in our industry. So that’s what we deliver to the market. We’re going to continue to deliver key insights on vulnerability management, exploitation and major trends we can extrapolate from our dataset to continuously support practitioners.

    Are you interested in learning more? If so, VulnCheck’s Exploit & Vulnerability Intelligence has broad threat actor coverage. Register and demo our data today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDebian Trixie pdns Important Denial of Service Fix DSA-6233-1
    Next Article ZDI-26-180: Microsoft Windows cdd Improper Locking Local Privilege Escalation Vulnerability
    admin
    • Website

    Related Posts

    News

    Microsoft says backend change broke Teams Free chat and calls

    April 29, 2026
    News

    Intelligence is the Most Important and Most Lucrative Asset in Cybersecurity | Blog

    April 29, 2026
    News

    Hackers are exploiting a critical LiteLLM pre-auth SQLi flaw

    April 28, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    ZDI-26-182: Microsoft Windows win32full Improper Release Local Privilege Escalation Vulnerability

    April 29, 2026

    ZDI-26-180: Microsoft Windows cdd Improper Locking Local Privilege Escalation Vulnerability

    April 29, 2026

    VulnCheck Known Exploited Vulnerabilities Report – Summer 2024 | Blog

    April 29, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.