CVE-2024-1708
ConnectWise ScreenConnect Path Traversal Vulnerability - Active in CISA KEV catalog.
Critical vulnerabilities, curated daily for security professionals
See how vulnerabilities affect your specific environment
CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework
WordPress plugin vulnerabilities dominate Monday's disclosures, with four separate CVSS 9.8 flaws affecting MStore API, Plugin Download, TheCartPress, and a related OpenCart vulnerability of the same severity. Yesterday's volume was lighter overall, with 5 critical CVEs (down 37% from 8) and 21 high-priority issues (down 68% from 65). Notable critical entries include CVE-2021-47933 in WordPress MStore API, CVE-2021-47940 in WordPress Plugin Download, and CVE-2021-47923 in OpenCart, all rated CVSS 9.8. Three actively exploited vulnerabilities span ConnectWise ScreenConnect (CVE-2024-1708), Microsoft Windows (CVE-2026-32202), and the Linux Kernel (CVE-2026-31431), reflecting attacker interest in remote management tools and core operating system components. Patches are not yet broadly available across yesterday's disclosure set, so defenders should rely on compensating controls and vendor advisories while monitoring for updates.
Immediate action: Prioritize review of WordPress plugin inventories (MStore API, Plugin Download, TheCartPress) and OpenCart installations, alongside ConnectWise ScreenConnect, Windows, and Linux Kernel systems flagged for active exploitation. With no patches currently available for yesterday's disclosed CVEs, apply vendor-recommended mitigations, restrict exposed admin interfaces, and monitor vendor channels for upcoming fixes.
ConnectWise ScreenConnect Path Traversal Vulnerability - Active in CISA KEV catalog.
Microsoft Windows Protection Mechanism Failure Vulnerability - Active in CISA KEV catalog.
Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability - Active in CISA KEV catalog.
An arbitrary file upload vulnerability in the MStore API allows unauthenticated attackers to execute malicious code on the host server via the REST API.
An arbitrary file upload vulnerability in the Plugin Download WordPress plugin allows unauthenticated attackers to upload and execute malicious files via the admin-ajax.php endpoint.
A remote code execution vulnerability in OpenCATS allows unauthenticated attackers to execute arbitrary system commands by uploading malicious PHP files as resume attachments.
An unauthenticated privilege escalation vulnerability in TheCartPress WordPress plugin allows attackers to create new administrative accounts via the AJAX handler.
A session fixation vulnerability in OpenCart allows attackers to hijack user sessions by forcing the use of a known, malicious session identifier.
A vulnerability in the WordPress Plugin Survey & Poll may allow unauthorized access through manipulation of the cookie parameter.
A critical security vulnerability has been identified in the AzuraCast web radio management suite.
A security vulnerability has been discovered in e107 CMS 2 that could permit unauthorized access or code execution.
A security vulnerability has been identified in ImpressCMS 1 that requires immediate investigation and patching.
Evolution CMS 3
TextPattern CMS 4
Aero CMS 0
A security vulnerability has been identified in the self-hosted note-taking application Plainpad.
Some Hikvision switch products (discontinued since December 2023) are vulnerable to authenticated remote command execution due to insufficient input validation
A vulnerability was found in D-Link DCS-935L up to 1
Opencart TMD Vendor System 3
A security flaw in the Balbooa Joomla Forms Builder may allow an attacker to exploit form submission processes.
A security vulnerability has been identified in the EFM ipTIME A8004T router, potentially allowing for unauthorized system impact.
A vulnerability has been detected in Sentry 8, potentially impacting the monitoring and error-tracking capabilities of the platform.
A vulnerability has been identified in CyberPanel 2 that could permit unauthorized system access.
A vulnerability has been identified in the AzuraCast web radio management suite that could allow for unauthorized access or system impact.
A security vulnerability has been discovered in the Argus Surveillance DVR, potentially allowing unauthorized access to video feeds or system settings.
A vulnerability exists in the apko tool, which is used for building OCI container images from apk packages.
A security vulnerability has been identified in apko, a tool used to build OCI container images from apk packages.
A security vulnerability has been identified in memono Notepad 4 that requires investigation and remediation.
A security vulnerability has been identified in IAS Canias ERP 8 that requires immediate attention from security administrators.