CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-54003

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00094/1

CVE-2024-54003 is a newly identified vulnerability. While the description is currently unavailable, it is tagged as "In The Wild," suggesting active exploitation. SOCRadar's Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk level despite the absence of CVSS score. Even without full details, the "In The Wild" tag warrants careful monitoring. The vulnerability may allow unauthorized access or data breach if exploited. Immediate action may not be required but continuous monitoring and further investigation are critical. Stay informed and apply available patches promptly once vendor information becomes available to mitigate potential cybersecurity risks.

In The Wild
2024-12-09

2024-12-09

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-54003 | Jenkins Simple Queue Plugin up to 1.4.4 cross site scripting (Nessus ID 211917)
vuldb.com2025-02-23
CVE-2024-54003 | Jenkins Simple Queue Plugin up to 1.4.4 cross site scripting (Nessus ID 211917) | A vulnerability, which was classified as problematic, was found in Jenkins Simple Queue Plugin up to 1.4.4. Affected is an unknown function. The manipulation leads to cross site scripting. This vulnerability is traded as CVE-2024-54003. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
rss
forum
news
2nd December – Threat Intelligence Report
2nd December – Threat Intelligence Report | For the latest discoveries in cyber research for the week of 2nd December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Supply chain software provider Blue Yonder was hit by a ransomware attack, disrupting services for clients like Starbucks and UK grocery chains Morrisons and Sainsbury’s. The incident affected operations such as employee […] The post 2nd December – Threat Intelligence Report appeared first on Check Point
checkpoint.com
rss
forum
news
Tageszusammenfassung - 28.11.2024
CERT.at2025-02-01
Tageszusammenfassung - 28.11.2024 | End-of-Day report Timeframe: Mittwoch 27-11-2024 18:00 - Donnerstag 28-11-2024 18:00 Handler: Michael Schlagenhaufer Co-Handler: n/a News Zello asks users to reset passwords after security incident Zello is warning customers to reset their passwords if their account was created before November 2nd in what appears to be another security breach. https://www.bleepingcomputer.com/news/security/zello-asks-users-to-reset-passwords-after-security-incident/ Sneaky
cert.at
rss
forum
news
2nd December – Threat Intelligence Report - Check Point Research
2024-12-02
2nd December – Threat Intelligence Report - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 2nd December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Supply chain software provider Blue Yonder was hit by a ransomware attack, disrupting services for clients like Starbucks and UK grocery chains Morrisons and Sainsbury’s. The incident affected operations such as employee scheduling and payroll processing. Blue Yonder is collaborating with cybersecurity firms to recover and has informed affected customers. Uganda’s central bank experienced a cyberattack resulting in the unauthorized transfer of approximately 62 billion
google.com
rss
forum
news

Social Media

5️⃣ #Jenkins Warning: High severity #XSS vulnerability in the #SimpleQueue Plugin affects versions 1.4.4 and earlier. Update to 1.4.5 to prevent exploitation (Reference: CVE-2024-54003).
0
0
0

Affected Software

No affected software found for this CVE

References

No references found for this CVE

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence