{"id":24540,"date":"2024-02-14T13:06:22","date_gmt":"2024-02-14T13:06:22","guid":{"rendered":"https:\/\/blog.lacnic.net\/2017octen\/resumen-de-vulnerabilidades-mas-probables-de-ser-explotadas"},"modified":"2024-02-20T15:08:58","modified_gmt":"2024-02-20T15:08:58","slug":"summary-of-vulnerabilities-most-likely-to-be-exploited","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/","title":{"rendered":"Summary of Vulnerabilities Most Likely to Be Exploited"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/guillermo-pereyra\">Guillermo Pereyra<\/a>, Security Analyst at LACNIC CSIRT.<\/p>\n\n\n\n<p>The following article presents a summary of the vulnerabilities that had the highest probability of being exploited during the second half of 2023.<\/p>\n\n\n\n<p>As mentioned in our first <a href=\"https:\/\/blog.lacnic.net\/ciberseguridad\/vulnerabilidades-con-mayor-probabilidad-de-ser-explotadas\">article<\/a>, the tools provided by <a href=\"https:\/\/www.first.org\/\">FIRST<\/a> can be used to find the vulnerabilities most likely to be exploited. Likewise, we used the <a href=\"https:\/\/nvd.nist.gov\/developers\/vulnerabilities\">NIST<\/a> vulnerability classifier to discover the severity of each vulnerability.<\/p>\n\n\n\n<p>We then filtered the vulnerabilities, prioritizing those with a higher probability of being exploited.<\/p>\n\n\n\n<div class=\"flourish-embed flourish-bar-chart-race\" data-src=\"visualisation\/16277087\"><script src=\"https:\/\/public.flourish.studio\/resources\/embed.js\"><\/script><\/div>\n\n\n\n<p>Figure 1. Vulnerabilities throughout the second semester ordered by their probability of being exploited.<\/p>\n\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--24540\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__link acf-view__row\"><div class=\"acf-view__link-field acf-view__field\"><a target=\"_self\" class=\"acf-view__link-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/a-year-of-increasingly-sophisticated-security-incidents\/\">A Year of Increasingly Sophisticated Security Incidents<\/a><\/div><\/div><\/section>\n\n\n\n<h2 class=\"wp-block-heading\">Details of some vulnerabilities<\/h2>\n\n\n\n<p>The following is a table with some critical vulnerabilities that had a greater likelihood of being exploited during the second half of last year.<\/p>\n\n\n\n<p><strong>Top 10 Table<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><span lang=\"es\" style=\"white-space-collapse: collapse; font-size: 12pt; line-height: 18.4px; font-family: Roboto; color: rgb(34, 34, 34);\">CVE<\/span><span style=\"font-size: medium; white-space-collapse: collapse;\"><\/span><\/td><td>CVSS v3.1<\/td><td>EPSS (Q4 2023)<\/td><\/tr><tr><td>CVE-2019-1653<\/td><td>7.5 HIGH<\/td><td>0.97567<\/td><\/tr><tr><td>CVE-2014-6271<\/td><td>7.5 HIGH<\/td><td>0.97564<\/td><\/tr><tr><td>CVE-2015-7297<\/td><td>7.5 HIGH<\/td><td>0.97564<\/td><\/tr><tr><td>CVE-2018-7600<\/td><td>9.8 CRITICAL<\/td><td>0.9756<\/td><\/tr><tr><td>CVE-2015-1635<\/td><td>10 HIGH (CVSS v2)<\/td><td>0.97559<\/td><\/tr><tr><td>CVE-2019-2725<\/td><td>9.8 CRITICAL<\/td><td>0.97559<\/td><\/tr><tr><td>CVE-2017-8917<\/td><td>9.8 CRITICAL<\/td><td>0.97555<\/td><\/tr><tr><td>CVE-2019-16662<\/td><td>9.8 CRITICAL<\/td><td>0.97555<\/td><\/tr><tr><td>CVE-2020-5902<\/td><td>9.8 CRITICAL<\/td><td>0.97555<\/td><\/tr><tr><td>CVE-2020-14750<\/td><td>9.8 CRITICAL<\/td><td>0.97553<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">CVE-2019-1653 &#8211; Information disclosure vulnerability in Cisco Small Business RV320 and RV325 Routers<\/h2>\n\n\n\n<p><strong>CVSSv3.1: 7.5 HIGH<\/strong><\/p>\n\n\n\n<p><strong>Vulnerable versions<\/strong>: Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers using Firmware from 1.4.2.15 to 1.4.2.20.<\/p>\n\n\n\n<p><strong>Solution<\/strong>: Update to the newest possible version.<\/p>\n\n\n\n<p><strong>Description<\/strong>: Vulnerability in the Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers\u2019 web manager might allow a remote, unauthenticated attacker to download the system configuration.<\/p>\n\n\n\n<p>Reference:  <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/csa\/cisco-sa-20190123-rv-info.html\">https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/csa\/cisco-sa-20190123-rv-info.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CVE-2019-2725 and CVE-2020-14750 &#8211; Vulnerabilities in Oracle WebLogic Server<\/h2>\n\n\n\n<p><strong>CVSSv3.1: 9.8 CRITICAL<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Vulnerable versions<\/strong>: Oracle WebLogic Server, versions 10.3.6.0, 12.1.3.0, 12.2.1.4.0, 14.1.1.0.0.<\/p>\n\n\n\n<p><strong>Solution<\/strong>: Update to the newest possible version.<\/p>\n\n\n\n<p><strong>Description<\/strong>: Remote code execution without the need for authentication.<\/p>\n\n\n\n<p><strong>Reference<\/strong>: <a href=\"https:\/\/www.oracle.com\/security-alerts\/alert-cve-2019-2725.html\">https:\/\/www.oracle.com\/security-alerts\/alert-cve-2019-2725.html<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Summary<\/h3>\n\n\n\n<p>Overall, the vulnerabilities most likely to be exploited are persistent issues. They are used to compromise systems that have not been updated. This is coupled with the existence of publicly available exploits or proofs of concept that are generally easily applied by cybercriminals with limited knowledge about the technology they wish to compromise.<\/p>\n\n\n\n<p>Some new vulnerabilities are also actively exploited by criminals. Examples of these include CVE-2023-20198 and CVE-2023-20273, which were released in October 2023 and affect the web configuration feature of Cisco IOS XE Software. In this case, updating the system is suggested. If the update cannot be performed, the web functionalities must be deactivated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a>Recommendations<\/h3>\n\n\n\n<p>When faced with the challenge of updating multiple systems, it is advisable to prioritize updating those that are <strong>most likely to be attacked or compromised<\/strong>.<\/p>\n\n\n\n<p>In this context, there could be a situation where a vulnerability with a <em>HIGH<\/em> CVSS score is technically difficult to exploit, while at the same time there might be another vulnerability with a <em>MEDIUM<\/em> CVSS score for which public exploits exist, which would make it easier for it to be exploited by an attacker. To decide this prioritization, we recommend using the EPSS tool offered by FIRST.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is the Exploit Prediction Scoring System (EPSS)?\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/csirt.lacnic.net\/articulos-y-novedades\/%ef%bf%bcque-es-el-exploit-prediction-scoring-system\">https:\/\/csirt.lacnic.net\/articulos-y-novedades\/%ef%bf%bcque-es-el-exploit-prediction-scoring-system<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blog.lacnic.net\/ciberseguridad\/vulnerabilidades-con-mayor-probabilidad-de-ser-explotadas\">https:\/\/blog.lacnic.net\/ciberseguridad\/vulnerabilidades-con-mayor-probabilidad-de-ser-explotadas<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Active Exploitation of CVE-2023-20198 and CVE-2023-20273\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/blog.talosintelligence.com\/active-exploitation-of-cisco-ios-xe-software\/\">https:\/\/blog.talosintelligence.com\/active-exploitation-of-cisco-ios-xe-software\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Guillermo Pereyra, Security Analyst at LACNIC CSIRT. The following article presents a summary of the vulnerabilities that had the highest probability of being exploited during the second half of 2023. As mentioned in our first article, the tools provided by FIRST can be used to find the vulnerabilities most likely to be exploited. Likewise, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":24536,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1245],"tipo_autor":[],"class_list":["post-24540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-guillermo-pereyra-en"],"acf":{"author":"Guillermo Pereyra, Security Analyst at LACNIC CSIRT","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited\" \/>\n<meta property=\"og:description\" content=\"By Guillermo Pereyra, Security Analyst at LACNIC CSIRT. The following article presents a summary of the vulnerabilities that had the highest probability of being exploited during the second half of 2023. As mentioned in our first article, the tools provided by FIRST can be used to find the vulnerabilities most likely to be exploited. Likewise, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T13:06:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T15:08:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"686\" \/>\n\t<meta property=\"og:image:height\" content=\"332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"Summary of Vulnerabilities Most Likely to Be Exploited\",\"datePublished\":\"2024-02-14T13:06:22+00:00\",\"dateModified\":\"2024-02-20T15:08:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\",\"name\":\"LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg\",\"datePublished\":\"2024-02-14T13:06:22+00:00\",\"dateModified\":\"2024-02-20T15:08:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg\",\"width\":686,\"height\":332},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Summary of Vulnerabilities Most Likely to Be Exploited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited","og_description":"By Guillermo Pereyra, Security Analyst at LACNIC CSIRT. The following article presents a summary of the vulnerabilities that had the highest probability of being exploited during the second half of 2023. As mentioned in our first article, the tools provided by FIRST can be used to find the vulnerabilities most likely to be exploited. Likewise, [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-02-14T13:06:22+00:00","article_modified_time":"2024-02-20T15:08:58+00:00","og_image":[{"width":686,"height":332,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","type":"image\/jpeg"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"Summary of Vulnerabilities Most Likely to Be Exploited","datePublished":"2024-02-14T13:06:22+00:00","dateModified":"2024-02-20T15:08:58+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/","url":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/","name":"LACNIC Blog | Summary of Vulnerabilities Most Likely to Be Exploited","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","datePublished":"2024-02-14T13:06:22+00:00","dateModified":"2024-02-20T15:08:58+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","width":686,"height":332},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/summary-of-vulnerabilities-most-likely-to-be-exploited\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Summary of Vulnerabilities Most Likely to Be Exploited"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/02\/001.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":24531,"post_title":"Resumen de vulnerabilidades con m\u00e1s probabilidad de ser explotadas","slug":"resumen-de-vulnerabilidades-con-mas-probabilidad-de-ser-explotadas","href":"https:\/\/blog.lacnic.net\/resumen-de-vulnerabilidades-con-mas-probabilidad-de-ser-explotadas\/"},{"locale":"pt_BR","id":24541,"post_title":"Resumo das vulnerabilidades com maior possibilidade de serem exploradas","slug":"resumen-de-vulnerabilidades-mas-probables-de-ser-explotadas","href":"https:\/\/blog.lacnic.net\/pt-br\/resumen-de-vulnerabilidades-mas-probables-de-ser-explotadas\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=24540"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24540\/revisions"}],"predecessor-version":[{"id":24650,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/24540\/revisions\/24650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/24536"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=24540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=24540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=24540"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=24540"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=24540"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=24540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}