In December, we classified four vulnerabilities as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.
In December, we classified four vulnerabilities as trending. These represent the most dangerous security flaws, either currently being widely exploited by cybercriminals or likely to be exploited in the near future.
Two vulnerabilities (CVE-2024-38144 and CVE-2024-49138) that, if exploited, allow attackers to obtain SYSTEM-level privileges—the highest level of privileges in Windows—were discovered in Microsoft products. By exploiting these vulnerabilities, an attacker can gain full control over compromised devices, steal confidential data, or inject malicious software.
A third vulnerability (CVE-2024-11972) was found in the Hunk Companion plugin designed to enhance and extend the functionality of ThemeHunk themes for the WordPress content management system. This vulnerability is critically dangerous. By exploiting this vulnerability, the attackers can install other outdated plugins containing vulnerabilities on a WordPress site. This way, they can take control of the web server hosting the site.
The fourth vulnerability (CVE-2024-53677) was found in the Apache Struts web application framework. By exploiting this vulnerability, attackers can perform a directory traversal attack1, upload arbitrary files to the server, and execute them, allowing them to run malicious code within the system and ultimately gain control over the web server.
Read more about these vulnerabilities, cases of their exploitation, and remediation methods in the digest.