Memcached
by Memcached
Review your setup
Memcached has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
35.7%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 14 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2018-1000115 | 7.5 | 82.5% | — |
| CVE-2016-8706 | 8.1 | 51.8% | — |
| CVE-2020-10931 | 7.5 | 15.4% | — |
| CVE-2016-8704 | 9.8 | 14.3% | — |
| CVE-2016-8705 | 9.8 | 12.6% | — |
| CVE-2020-22570 | 7.5 | 2.1% | — |
| CVE-2017-9951 | 7.5 | 1.7% | — |
| CVE-2019-11596 | 7.5 | 1.6% | — |
| CVE-2018-1000127 | 7.5 | 1.0% | — |
| CVE-2019-15026 | 7.5 | 0.9% | — |
| CVE-2023-46853 | 9.8 | 0.2% | — |
| CVE-2023-46852 | 7.5 | 0.1% | — |
| CVE-2022-48571 | 7.5 | 0.1% | — |
| CVE-2021-37519 | 5.5 | 0.0% | — |
33
/ 100
moderate-risk
Active Threat
33/50 · High
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.