CISA Known Exploited Vulnerabilities Catalog
7.8
CVE-2014-6352 - Microsoft Windows Code Injection Vulnerability -
Action Due Aug 25, 2022 Target Vendor : Microsoft
Description : Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
9.8
CVE-2022-23131 - Zabbix Frontend Authentication Bypass Vulnerability -
Action Due Mar 08, 2022 Target Vendor : Zabbix
Description : Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
5.3
CVE-2022-23134 - Zabbix Frontend Improper Access Control Vulnerability -
Action Due Mar 08, 2022 Target Vendor : Zabbix
Description : Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
7.8
CVE-2013-3906 - Microsoft Graphics Component Memory Corruption Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Microsoft
Description : Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
9.8
CVE-2022-24086 - Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability -
Action Due Mar 01, 2022 Target Vendor : Adobe
Description : Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
8.8
CVE-2022-0609 - Google Chromium Animation Use-After-Free Vulnerability -
Action Due Mar 01, 2022 Target Vendor : Google
Description : Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
7.5
CVE-2019-0752 - Microsoft Internet Explorer Type Confusion Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Microsoft
Description : A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
7.5
CVE-2018-8174 - Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Microsoft
Description : A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
7.8
CVE-2018-20250 - WinRAR Absolute Path Traversal Vulnerability -
Action Due Aug 15, 2022 Target Vendor : RARLAB
Description : WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
9.8
CVE-2018-15982 - Adobe Flash Player Use-After-Free Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Adobe
Description : Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability
Action : The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Known
9.8
CVE-2017-9841 - PHPUnit Command Injection Vulnerability -
Action Due Aug 15, 2022 Target Vendor : PHPUnit
Description : PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
7.8
CVE-2014-1761 - Microsoft Word Memory Corruption Vulnerability -
Action Due Aug 15, 2022 Target Vendor : Microsoft
Description : Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
8.8
CVE-2022-22620 - Apple Webkit Remote Code Execution Vulnerability -
Action Due Feb 25, 2022 Target Vendor : Apple
Description : Apple Webkit, which impacts iOS, iPadOS, and macOS, contains a vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
7.8
CVE-2021-36934 - Microsoft Windows SAM Local Privilege Escalation Vulnerability -
Action Due Feb 24, 2022 Target Vendor : Microsoft
Description : If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
10.0
CVE-2020-0796 - Microsoft SMBv3 Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
9.8
CVE-2018-1000861 - Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Jenkins
Description : A code execution vulnerability exists in the Stapler web framework used by Jenkins
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
9.8
CVE-2017-9791 - Apache Struts 1 Improper Input Validation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Apache
Description : The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
8.8
CVE-2017-8464 - Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
7.5
CVE-2017-10271 - Oracle Corporation WebLogic Server Remote Code Execution Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Oracle
Description : Oracle Corporation WebLogic Server contains a vulnerability that allows for remote code execution.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known
7.8
CVE-2017-0263 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Aug 10, 2022 Target Vendor : Microsoft
Description : Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.
Action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown