Camaleon Cms
by Tuzitio
Standard maintenance is sufficient
Camaleon Cms has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
30.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
10.0%
Based on 10 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2024-46986 | 9.9 | 92.3% | — |
| CVE-2023-30145 | 9.8 | 53.3% | — |
| CVE-2024-48652 | 4.8 | 34.8% | — |
| CVE-2021-25969 | 6.1 | 1.5% | — |
| CVE-2021-25970 | 8.8 | 0.4% | — |
| CVE-2021-25971 | 4.3 | 0.3% | — |
| CVE-2021-25972 | 4.9 | 0.3% | — |
| CVE-2018-18260 | 6.1 | 0.2% | — |
| CVE-2024-46987 | 7.7 | 0.2% | — |
| CVE-2023-53936 | 4.8 | 0.0% | — |
25
/ 100
low-risk
Active Threat
22/50 · Moderate
Exploit Availability
3/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.