priority-software CVE Vulnerabilities & Metrics

Focus on priority-software vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About priority-software Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with priority-software. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total priority-software CVEs: 8
Earliest CVE date: 14 Apr 2021, 14:15 UTC
Latest CVE date: 20 Aug 2024, 12:15 UTC

Latest CVE reference: CVE-2024-41699

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical priority-software CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.85

Max CVSS: 6.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 3
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS priority-software CVEs

These are the five CVEs with the highest CVSS scores for priority-software, sorted by severity first and recency.

All CVEs for priority-software

Priority – CWE-552: Files or Directories Accessible to External Parties

Priority – CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Priority - CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Priority Web version 19.1.0.68, parameter manipulation on an unspecified end-point may allow authentication bypass.

Priority Windows may allow Command Execution via SQL Injection using an unspecified method.

CVE-2022-23173 priority-software vulnerability CVSS: 6.5 06 Jul 2022, 14:15 UTC

this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.

CVE-2022-23172 priority-software vulnerability CVSS: 4.0 06 Jul 2022, 14:15 UTC

An attacker can access to "Forgot my password" button, as soon as he puts users is valid in the system, the system would issue a message that a password reset email had been sent to user. This way you can verify which users are in the system and which are not.

CVE-2021-26832 priority-software vulnerability CVSS: 4.3 14 Apr 2021, 14:15 UTC

Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.