CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    9.8

    CVSS31
    CVE-2013-0632 - Adobe ColdFusion Authentication Bypass Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description : An authentication bypass vulnerability exists in Adobe ColdFusion which could result in an unauthorized user gaining administrative access.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    10.0

    CVSS2
    CVE-2012-4681 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    8.8

    CVSS31
    CVE-2012-1856 - Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    9.8

    CVSS31
    CVE-2012-1723 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2012-1535 - Adobe Flash Player Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description : Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    10.0

    CVSS2
    CVE-2012-0507 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Mar 03, 2022 | 932 days ago

    9.8

    CVSS31
    CVE-2011-3544 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    9.8

    CVSS31
    CVE-2011-1889 - Microsoft Forefront TMG Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    8.8

    CVSS31
    CVE-2011-0611 - Adobe Flash Player Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description : Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2010-3333 - Microsoft Office Stack-based Buffer Overflow Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2010-0232 - Microsoft Windows Kernel Exception Handler Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2010-0188 - Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description : Unspecified vulnerability in Adobe Reader and Acrobat allows attackers to cause a denial of service or possibly execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2009-3129 - Microsoft Excel Featheader Record Memory Corruption Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2009-1123 - Microsoft Windows Improper Input Validation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    8.8

    CVSS31
    CVE-2008-3431 - Oracle VirtualBox Insufficient Input Validation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2008-2992 - Adobe Reader and Acrobat Input Validation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description : Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2004-0210 - Microsoft Windows Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    7.8

    CVSS31
    CVE-2002-0367 - Microsoft Windows Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Mar 03, 2022 | 932 days ago

    6.1

    CVSS31
    CVE-2022-24682 - Zimbra Webmail Cross-Site Scripting Vulnerability -

    Action Due Mar 11, 2022 Target Vendor : Zimbra

    Description : Zimbra webmail clients running versions 8.8.15 P29 & P30 contain a XSS vulnerability that would allow attackers to steal session cookie files.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Feb 25, 2022 | 938 days ago

    7.8

    CVSS30
    CVE-2017-8570 - Microsoft Office Remote Code Execution Vulnerability -

    Action Due Aug 25, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Feb 25, 2022 | 938 days ago
Showing 20 of 1181 Results

Filters