CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.8

    CVSS31
    CVE-2024-43572 - Microsoft Windows Management Console Remote Code Execution Vulnerability -

    Action Due Oct 29, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/advisory/CVE-2024-43572 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43572

    Alert Date: Oct 08, 2024 | 255 days ago

    7.8

    CVSS31
    CVE-2024-43047 - Qualcomm Multiple Chipsets Use-After-Free Vulnerability -

    Action Due Oct 29, 2024 Target Vendor : Qualcomm

    Description : Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memory.

    Action : Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://git.codelinaro.org/clo/la/platform/vendor/qcom/opensource/dsp-kernel/-/commit/0e27b6c7d2bd8d0453e4465ac2ca49a8f8c440e2 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43047

    Alert Date: Oct 08, 2024 | 255 days ago

    10.0

    CVSS31
    CVE-2024-45519 - Synacor Zimbra Collaboration Command Execution Vulnerability -

    Action Due Oct 24, 2024 Target Vendor : Synacor

    Description : Synacor Zimbra Collaboration contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories ; https://nvd.nist.gov/vuln/detail/CVE-2024-45519

    Alert Date: Oct 03, 2024 | 260 days ago

    8.8

    CVSS31
    CVE-2024-29824 - Ivanti Endpoint Manager (EPM) SQL Injection Vulnerability -

    Action Due Oct 23, 2024 Target Vendor : Ivanti

    Description : Ivanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-May-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-29824

    Alert Date: Oct 02, 2024 | 261 days ago

    9.8

    CVSS31
    CVE-2019-0344 - SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability -

    Action Due Oct 21, 2024 Target Vendor : SAP

    Description : SAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://web.archive.org/web/20191214053020/https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017 ; https://nvd.nist.gov/vuln/detail/CVE-2019-0344

    Alert Date: Sep 30, 2024 | 263 days ago

    5.5

    CVSS31
    CVE-2021-4043 - Motion Spell GPAC Null Pointer Dereference Vulnerability -

    Action Due Oct 21, 2024 Target Vendor : Motion Spell

    Description : Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db ; https://nvd.nist.gov/vuln/detail/CVE-2021-4043

    Alert Date: Sep 30, 2024 | 263 days ago

    9.8

    CVSS31
    CVE-2020-15415 - DrayTek Multiple Vigor Routers OS Command Injection Vulnerability -

    Action Due Oct 21, 2024 Target Vendor : DrayTek

    Description : DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-remote-code-injection/execution-vulnerability-(cve-2020-14472) ; https://nvd.nist.gov/vuln/detail/CVE-2020-15415

    Alert Date: Sep 30, 2024 | 263 days ago

    9.8

    CVSS31
    CVE-2023-25280 - D-Link DIR-820 Router OS Command Injection Vulnerability -

    Action Due Oct 21, 2024 Target Vendor : D-Link

    Description : D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10358 ; https://nvd.nist.gov/vuln/detail/CVE-2023-25280

    Alert Date: Sep 30, 2024 | 263 days ago

    9.8

    CVSS31
    CVE-2024-7593 - Ivanti Virtual Traffic Manager Authentication Bypass Vulnerability -

    Action Due Oct 15, 2024 Target Vendor : Ivanti

    Description : Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593 ; https://nvd.nist.gov/vuln/detail/CVE-2024-7593

    Alert Date: Sep 24, 2024 | 269 days ago

    9.4

    CVSS31
    CVE-2024-8963 - Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability -

    Action Due Oct 10, 2024 Target Vendor : Ivanti

    Description : Ivanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.

    Action : As Ivanti CSA has reached End-of-Life status, users are urged to remove CSA 4.6.x from service or upgrade to the 5.0.x line of supported solutions, as future vulnerabilities on the 4.6.x version of CSA are unlikely to receive security updates.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963 ; https://nvd.nist.gov/vuln/detail/CVE-2024-8963

    Alert Date: Sep 19, 2024 | 274 days ago

    9.8

    CVSS31
    CVE-2020-14644 - Oracle WebLogic Server Remote Code Execution Vulnerability -

    Action Due Oct 09, 2024 Target Vendor : Oracle

    Description : Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpujul2020.html ; https://nvd.nist.gov/vuln/detail/CVE-2020-14644

    Alert Date: Sep 18, 2024 | 275 days ago

    9.8

    CVSS31
    CVE-2022-21445 - Oracle ADF Faces Deserialization of Untrusted Data Vulnerability -

    Action Due Oct 09, 2024 Target Vendor : Oracle

    Description : Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpuapr2022.html ; https://nvd.nist.gov/vuln/detail/CVE-2022-21445

    Alert Date: Sep 18, 2024 | 275 days ago

    8.8

    CVSS31
    CVE-2020-0618 - Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability -

    Action Due Oct 09, 2024 Target Vendor : Microsoft

    Description : Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2020-0618 ; https://nvd.nist.gov/vuln/detail/CVE-2020-0618

    Alert Date: Sep 18, 2024 | 275 days ago

    9.8

    CVSS31
    CVE-2024-27348 - Apache HugeGraph-Server Improper Access Control Vulnerability -

    Action Due Oct 09, 2024 Target Vendor : Apache

    Description : Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9 ; https://nvd.nist.gov/vuln/detail/CVE-2024-27348

    Alert Date: Sep 18, 2024 | 275 days ago

    8.8

    CVSS31
    CVE-2014-0502 - Adobe Flash Player Double Free Vulnerablity -

    Action Due Oct 08, 2024 Target Vendor : Adobe

    Description : Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502

    Alert Date: Sep 17, 2024 | 276 days ago

    8.8

    CVSS31
    CVE-2013-0648 - Adobe Flash Player Code Execution Vulnerability -

    Action Due Oct 08, 2024 Target Vendor : Adobe

    Description : Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648

    Alert Date: Sep 17, 2024 | 276 days ago

    8.8

    CVSS31
    CVE-2013-0643 - Adobe Flash Player Incorrect Default Permissions Vulnerability -

    Action Due Oct 08, 2024 Target Vendor : Adobe

    Description : Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643

    Alert Date: Sep 17, 2024 | 276 days ago

    9.8

    CVSS31
    CVE-2014-0497 - Adobe Flash Player Integer Underflow Vulnerablity -

    Action Due Oct 08, 2024 Target Vendor : Adobe

    Description : Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.

    Action : The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497

    Alert Date: Sep 17, 2024 | 276 days ago

    9.8

    CVSS31
    CVE-2024-6670 - Progress WhatsUp Gold SQL Injection Vulnerability -

    Action Due Oct 07, 2024 Target Vendor : Progress

    Description : Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024 ; https://nvd.nist.gov/vuln/detail/CVE-2024-6670

    Alert Date: Sep 16, 2024 | 277 days ago

    8.8

    CVSS31
    CVE-2024-43461 - Microsoft Windows MSHTML Platform Spoofing Vulnerability -

    Action Due Oct 07, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461 ; https://nvd.nist.gov/vuln/detail/CVE-2024-43461

    Alert Date: Sep 16, 2024 | 277 days ago
Showing 20 of 1370 Results

Filters

© cvefeed.io
Latest DB Update: Jun. 20, 2025 13:44