Manageengine Remote Access Plus
by Zohocorp
Standard maintenance is sufficient
Manageengine Remote Access Plus has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
28.6%
Confirmed actively exploited (CISA)
7.1%
Public exploit code available
0.0%
Based on 14 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2022-47966 | 9.8 | 94.4% | Yes |
| CVE-2019-16268 | 4.8 | 12.4% | — |
| CVE-2021-41828 | 7.5 | 11.4% | — |
| CVE-2021-41827 | 7.5 | 11.4% | — |
| CVE-2021-41829 | 7.5 | 6.1% | — |
| CVE-2020-15589 | 8.1 | 3.6% | — |
| CVE-2022-26653 | 5.3 | 2.1% | — |
| CVE-2022-26777 | 5.3 | 2.1% | — |
| CVE-2020-8422 | 4.3 | 0.3% | — |
| CVE-2019-11361 | 8.8 | 0.2% | — |
| CVE-2019-20474 | 4.3 | 0.2% | — |
| CVE-2021-42955 | 7.3 | 0.1% | — |
| CVE-2023-6105 | 5.5 | 0.1% | — |
| CVE-2021-42954 | 7.8 | 0.0% | — |
25
/ 100
low-risk
Active Threat
23/50 · Moderate
Exploit Availability
2/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.