CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    10.0

    CVSS31
    CVE-2022-22947 - VMware Spring Cloud Gateway Code Injection Vulnerability -

    Action Due Jun 06, 2022 Target Vendor : VMware

    Description : Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 16, 2022 | 858 days ago

    9.8

    CVSS31
    CVE-2022-1388 - F5 BIG-IP Missing Authentication Vulnerability -

    Action Due May 31, 2022 Target Vendor : F5

    Description : F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: May 10, 2022 | 864 days ago

    8.8

    CVSS31
    CVE-2021-1789 - Apple Multiple Products Type Confusion Vulnerability -

    Action Due May 25, 2022 Target Vendor : Apple

    Description : A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 04, 2022 | 870 days ago

    8.8

    CVSS31
    CVE-2019-8506 - Apple Multiple Products Type Confusion Vulnerability -

    Action Due May 25, 2022 Target Vendor : Apple

    Description : A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 04, 2022 | 870 days ago

    7.8

    CVSS31
    CVE-2014-4113 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 25, 2022 Target Vendor : Microsoft

    Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 04, 2022 | 870 days ago

    8.8

    CVSS31
    CVE-2014-0322 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due May 25, 2022 Target Vendor : Microsoft

    Description : Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 04, 2022 | 870 days ago

    7.5

    CVSS31
    CVE-2014-0160 - OpenSSL Information Disclosure Vulnerability -

    Action Due May 25, 2022 Target Vendor : OpenSSL

    Description : The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: May 04, 2022 | 870 days ago

    7.8

    CVSS31
    CVE-2021-40450 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    9.8

    CVSS31
    CVE-2022-29464 - WSO2 Multiple Products Unrestrictive Upload of File Vulnerability -

    Action Due May 16, 2022 Target Vendor : WSO2

    Description : Multiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Apr 25, 2022 | 879 days ago

    7.0

    CVSS31
    CVE-2022-26904 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    7.0

    CVSS31
    CVE-2022-21919 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    7.8

    CVSS31
    CVE-2022-0847 - Linux Kernel Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Linux

    Description : Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    7.8

    CVSS31
    CVE-2021-41357 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    9.9

    CVSS31
    CVE-2019-1003029 - Jenkins Script Security Plugin Sandbox Bypass Vulnerability -

    Action Due May 16, 2022 Target Vendor : Jenkins

    Description : Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 25, 2022 | 879 days ago

    6.1

    CVSS30
    CVE-2018-6882 - Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability -

    Action Due May 10, 2022 Target Vendor : Zimbra

    Description : Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that might allow remote attackers to inject arbitrary web script or HTML.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Apr 19, 2022 | 885 days ago

    9.8

    CVSS31
    CVE-2019-3568 - WhatsApp VOIP Stack Buffer Overflow Vulnerability -

    Action Due May 10, 2022 Target Vendor : Meta Platforms

    Description : A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 19, 2022 | 885 days ago

    7.8

    CVSS31
    CVE-2022-22718 - Microsoft Windows Print Spooler Privilege Escalation Vulnerability -

    Action Due May 10, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 19, 2022 | 885 days ago

    7.8

    CVSS31
    CVE-2022-22960 - VMware Multiple Products Privilege Escalation Vulnerability -

    Action Due May 06, 2022 Target Vendor : VMware

    Description : VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 15, 2022 | 889 days ago

    8.8

    CVSS31
    CVE-2022-1364 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due May 06, 2022 Target Vendor : Google

    Description : Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 15, 2022 | 889 days ago

    9.8

    CVSS31
    CVE-2019-3929 - Crestron Multiple Products Command Injection Vulnerability -

    Action Due May 06, 2022 Target Vendor : Crestron

    Description : Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Apr 15, 2022 | 889 days ago
Showing 20 of 1181 Results

Filters