Strobesstrobes
Platform
Solutions
Resources
Customers
Company
Pricing
Book a Demo
Strobesstrobes

Strobes connects every exposure signal to autonomous action, so security teams fix what matters, prove what works, and stop chasing noise.

Book a DemoTalk to an expert
ISO 27001SOC 2CREST
  • Platform
  • Platform Overview
  • Agentic Exposure Management
  • AI Agents
  • Integrations
  • API & Developers
  • Workflows & Automation
  • Analytics & Reporting
  • Solutions
  • Exposure Assessment (EAP)
  • Attack Surface Management
  • Application Security Posture
  • Risk-Based Vulnerability Management
  • Adversarial Exposure Validation (AEV)
  • AI Pentesting
  • Pentesting as a Service
  • CTEM Framework
  • By Industry
  • Financial Institutions
  • Technology
  • Retail
  • Healthcare
  • Manufacturing
  • By Roles
  • CISOs
  • Security Directors
  • Cloud Security Leaders
  • App Sec Leaders
  • Resources
  • Blog
  • Customer Stories
  • eBooks
  • Datasheets
  • Videos & Demos
  • Exposure Management Academy
  • CTEM Maturity Assessment
  • Pentest Health Check
  • Security Tool ROI Calculator
  • Company
  • About Strobes
  • Meet the Team
  • Trust & Security
  • Contact Us
  • Careers
  • Become a Partner
  • Technology Partner
  • Partner Deal Registration
  • Press Release

Weekly insight for security leaders

CTEM research, agentic AI trends, and what's actually moving the needle.

© 2026 Strobes Security Inc. All rights reserved.

Privacy PolicyTerms of ServiceCookie PolicyAccessibilitySitemap
Back to Blog
February 2024 Top CVEs and Vulnerabilities Report
Vulnerability IntelligenceVulnerability Management

February 2024 Top CVEs and Vulnerabilities Report

Akhil ReniMarch 1, 20243 min read

Authors

A
Akhil Reni

Share

Authors

A
Akhil Reni

Share

In February, hearts weren't the only things feeling vulnerable. The cyber arena saw a variety of critical exposures across multiple platforms and applications. While patching might not be as romantic as chocolates or roses, organizations and individuals alike must stay protected. Here, we highlight the most significant vulnerabilities reported during the month, emphasizing the importance of patching and mitigation strategies for organizations and individuals alike.

Fortinet FortiOS Critical Vulnerabilities

Fortinet released security updates to address critical remote code execution vulnerabilities in FortiOS, specifically CVE-2024-21762, and CVE-2024-23313. CVE-2024-21762, in particular, was noted as potentially being exploited in the wild, highlighting the urgent need for system administrators to apply necessary updates promptly​​.

To get details about CVE-2024-21762, visit our VI platform.

Microsoft's February 2024 Patch Tuesday

Microsoft's Patch Tuesday for February addressed 73 vulnerabilities, including two actively exploited zero-days, CVE-2024-21412 and CVE-2024-21351, both security feature bypass flaws. Among these vulnerabilities, CVE-2024-21413, a critical remote code execution (RCE) vulnerability in Microsoft Outlook, and CVE-2024-21380, a critical information disclosure vulnerability in Microsoft Dynamics Business Central, were particularly notable​​​​.

To get details about CVE-2024-21412 and CVE-2024-21351, visit our VI platform.

Android Security Bulletin

The Android Security Bulletin for February 2024 detailed security vulnerabilities affecting Android devices, with security patch levels of 2024-02-05 or later addressing these issues. The bulletin highlighted a critical security vulnerability in the System component that could lead to remote code execution without additional execution privileges​​.

Ivanti Connect Secure and Policy Secure Gateways

Ivanti disclosed vulnerabilities in its Connect Secure and Policy Secure Gateways, including CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893. These vulnerabilities were subject to increased exploitation activity and the release of exploit code, emphasizing the need for vigilance and timely application of patches​​.

Get details of CVE-2023-46805, CVE-2024-21887, CVE-2024-21888, and CVE-2024-21893 on our VI platform.

Atlassian Vulnerabilities

Atlassian reported multiple vulnerabilities across its products, including Confluence Data Center and Server. CVE-2024-21678, a Stored XSS vulnerability, and several Denial of Service (DoS) vulnerabilities, such as CVE-2023-5072, CVE-2023-6481, and CVE-2023-6378, were among the high-severity issues disclosed. Atlassian recommended updates to mitigate these vulnerabilities​​.

Get details of CVE-2023-5072, CVE-2023-6481, and CVE-2023-6378 on our VI platform.

Conclusion

February 2024 underscored the continuous challenges in cybersecurity, with critical vulnerabilities emerging across widely used platforms and applications. The disclosed vulnerabilities span a range of attack vectors, including remote code execution, information disclosure, and denial of service, underlining the importance of comprehensive vulnerability management practices. Organizations and individuals are urged to review the provided advisories and apply necessary updates to safeguard their systems against potential exploits.

Tags
Top CVE VulnerabiltiesTop VulnerabilitiesVulnerabilities

Stop chasing vulnerabilities Start reducing exposure

See how Strobes AI agents validate and fix your most critical exposures automatically.

Book a Demo
Continue Reading

Related Posts

Top CVEs of April 2026 - CVE Roundup
CVEVulnerability Intelligence

Top 7 Critical CVEs of April 2026 You Need to Act On Now

The top CVEs of April 2026 were exploited in hours. Marimo RCE, Windows IKE, Fortinet EMS, GitHub GHES, ActiveMQ, and more. Attack scenarios, risk context, and fixes.

May 1, 202622 min
Checkmarx and Bitwarden supply chain attack: Your CI/CD pipeline is the attack surface
CybersecurityVulnerability Intelligence

Checkmarx and Bitwarden Just Showed That Your Pipeline Is the Attack Surface

How the Checkmarx supply chain attack compromised Bitwarden's CLI pipeline in four minutes, what was stolen, and the program design gap that made it possible.

Apr 29, 20267 min
NIST Just Changed How It Tracks and Prioritizes CVEs - NVD Update 2026
CVEVulnerability Management

NIST Just Changed How It Tracks and Prioritizes CVEs

NIST has changed how it enriches CVEs in the NVD. Learn what the new risk-based triage model means for your vulnerability management program, scanner data, and remediation workflows.

Apr 29, 202613 min