CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    5.5

    CVSS31
    CVE-2014-0196 - Linux Kernel Race Condition Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Linux

    Description : Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196

    Alert Date: May 12, 2023 | 771 days ago

    7.8

    CVSS31
    CVE-2010-3904 - Linux Kernel Improper Input Validation Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Linux

    Description : Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904

    Alert Date: May 12, 2023 | 771 days ago

    9.8

    CVSS31
    CVE-2016-3427 - Oracle Java SE and JRockit Unspecified Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Oracle

    Description : Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpuapr2016v3.html; https://nvd.nist.gov/vuln/detail/CVE-2016-3427

    Alert Date: May 12, 2023 | 771 days ago

    9.8

    CVSS31
    CVE-2023-25717 - Multiple Ruckus Wireless Products CSRF and RCE Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Ruckus Wireless

    Description : Ruckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.

    Action : Apply updates per vendor instructions or disconnect product if it is end-of-life.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.ruckuswireless.com/security_bulletins/315; https://nvd.nist.gov/vuln/detail/CVE-2023-25717

    Alert Date: May 12, 2023 | 771 days ago

    7.5

    CVSS31
    CVE-2015-5317 - Jenkins User Interface (UI) Information Disclosure Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Jenkins

    Description : Jenkins User Interface (UI) contains an information disclosure vulnerability that allows users to see the names of jobs and builds otherwise inaccessible to them on the "Fingerprints" pages.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.jenkins.io/security/advisory/2015-11-11/; https://nvd.nist.gov/vuln/detail/CVE-2015-5317

    Alert Date: May 12, 2023 | 771 days ago

    9.8

    CVSS31
    CVE-2016-8735 - Apache Tomcat Remote Code Execution Vulnerability -

    Action Due Jun 02, 2023 Target Vendor : Apache

    Description : Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://tomcat.apache.org/security-9.html; https://nvd.nist.gov/vuln/detail/CVE-2016-8735

    Alert Date: May 12, 2023 | 771 days ago

    7.8

    CVSS31
    CVE-2023-29336 - Microsoft Win32K Privilege Escalation Vulnerability -

    Action Due May 30, 2023 Target Vendor : Microsoft

    Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation up to SYSTEM privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29336; https://nvd.nist.gov/vuln/detail/CVE-2023-29336

    Alert Date: May 09, 2023 | 774 days ago

    8.8

    CVSS31
    CVE-2023-1389 - TP-Link Archer AX-21 Command Injection Vulnerability -

    Action Due May 22, 2023 Target Vendor : TP-Link

    Description : TP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.tp-link.com/us/support/download/archer-ax21/v3/#Firmware; https://nvd.nist.gov/vuln/detail/CVE-2023-1389

    Alert Date: May 01, 2023 | 782 days ago

    9.0

    CVSS31
    CVE-2021-45046 - Apache Log4j2 Deserialization of Untrusted Data Vulnerability -

    Action Due May 22, 2023 Target Vendor : Apache

    Description : Apache Log4j2 contains a deserialization of untrusted data vulnerability due to the incomplete fix of CVE-2021-44228, where the Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://logging.apache.org/log4j/2.x/security.html; https://nvd.nist.gov/vuln/detail/CVE-2021-45046

    Alert Date: May 01, 2023 | 782 days ago

    7.5

    CVSS31
    CVE-2023-21839 - Oracle WebLogic Server Unspecified Vulnerability -

    Action Due May 22, 2023 Target Vendor : Oracle

    Description : Oracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.oracle.com/security-alerts/cpujan2023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-21839

    Alert Date: May 01, 2023 | 782 days ago

    7.5

    CVSS31
    CVE-2023-28432 - MinIO Information Disclosure Vulnerability -

    Action Due May 12, 2023 Target Vendor : MinIO

    Description : MinIO contains a vulnerability in a cluster deployment where MinIO returns all environment variables, which allows for information disclosure.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q; https://nvd.nist.gov/vuln/detail/CVE-2023-28432

    Alert Date: Apr 21, 2023 | 792 days ago

    9.8

    CVSS31
    CVE-2023-27350 - PaperCut MF/NG Improper Access Control Vulnerability -

    Action Due May 12, 2023 Target Vendor : PaperCut

    Description : PaperCut MF/NG contains an improper access control vulnerability within the SetupCompleted class that allows authentication bypass and code execution in the context of system.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://www.papercut.com/kb/Main/PO-1216-and-PO-1219; https://nvd.nist.gov/vuln/detail/CVE-2023-27350

    Alert Date: Apr 21, 2023 | 792 days ago

    9.6

    CVSS31
    CVE-2023-2136 - Google Chrome Skia Integer Overflow Vulnerability -

    Action Due May 12, 2023 Target Vendor : Google

    Description : Google Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2136

    Alert Date: Apr 21, 2023 | 792 days ago

    8.8

    CVSS31
    CVE-2017-6742 - Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability -

    Action Due May 10, 2023 Target Vendor : Cisco

    Description : The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742

    Alert Date: Apr 19, 2023 | 794 days ago

    8.8

    CVSS31
    CVE-2023-2033 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due May 08, 2023 Target Vendor : Google

    Description : Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html; https://nvd.nist.gov/vuln/detail/CVE-2023-2033

    Alert Date: Apr 17, 2023 | 796 days ago

    7.8

    CVSS31
    CVE-2019-8526 - Apple macOS Use-After-Free Vulnerability -

    Action Due May 08, 2023 Target Vendor : Apple

    Description : Apple macOS contains a use-after-free vulnerability that could allow for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT209600; https://nvd.nist.gov/vuln/detail/CVE-2019-8526

    Alert Date: Apr 17, 2023 | 796 days ago

    9.8

    CVSS31
    CVE-2023-29492 - Novi Survey Insecure Deserialization Vulnerability -

    Action Due May 04, 2023 Target Vendor : Novi Survey

    Description : Novi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the service account.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://novisurvey.net/blog/novi-survey-security-advisory-apr-2023.aspx; https://nvd.nist.gov/vuln/detail/CVE-2023-29492

    Alert Date: Apr 13, 2023 | 800 days ago

    7.8

    CVSS31
    CVE-2023-20963 - Android Framework Privilege Escalation Vulnerability -

    Action Due May 04, 2023 Target Vendor : Android

    Description : Android Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://source.android.com/docs/security/bulletin/2023-03-01; https://nvd.nist.gov/vuln/detail/CVE-2023-20963

    Alert Date: Apr 13, 2023 | 800 days ago

    7.8

    CVSS31
    CVE-2023-28252 - Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability -

    Action Due May 02, 2023 Target Vendor : Microsoft

    Description : Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-28252; https://nvd.nist.gov/vuln/detail/CVE-2023-28252

    Alert Date: Apr 11, 2023 | 802 days ago

    8.8

    CVSS31
    CVE-2023-28205 - Apple Multiple Products WebKit Use-After-Free Vulnerability -

    Action Due May 01, 2023 Target Vendor : Apple

    Description : Apple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.apple.com/en-us/HT213720,https://support.apple.com/en-us/HT213721,https://support.apple.com/en-us/HT213722,https://support.apple.com/en-us/HT213723; https://nvd.nist.gov/vuln/detail/CVE-2023-28205

    Alert Date: Apr 10, 2023 | 803 days ago
Showing 20 of 1370 Results

Filters

© cvefeed.io
Latest DB Update: Jun. 21, 2025 6:27