CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.8

    CVSS31
    CVE-2020-6572 - Google Chrome Media Prior to 81.0.4044.92 Use-After-Free Vulnerability -

    Action Due Jul 10, 2022 Target Vendor : Google

    Description : Google Chrome Media contains a use-after-free vulnerability that allows a remote attacker to execute code via a crafted HTML page.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    7.8

    CVSS31
    CVE-2019-1458 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due Jul 10, 2022 Target Vendor : Microsoft

    Description : A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k EoP.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jan 10, 2022 | 1047 days ago

    8.8

    CVSS31
    CVE-2013-3900 - Microsoft WinVerifyTrust function Remote Code Execution -

    Action Due Jul 10, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for PE files.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS31
    CVE-2019-2725 - Oracle WebLogic Server, Injection -

    Action Due Jul 10, 2022 Target Vendor : Oracle

    Description : Injection vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services).

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS31
    CVE-2019-9670 - Synacor Zimbra Collaboration (ZCS) Improper Restriction of XML External Entity Reference -

    Action Due Jul 10, 2022 Target Vendor : Synacor

    Description : Improper Restriction of XML External Entity Reference vulnerability affecting Synacor Zimbra Collaboration (ZCS).

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.1

    CVSS31
    CVE-2018-13382 - Fortinet FortiOS and FortiProxy Improper Authorization -

    Action Due Jul 10, 2022 Target Vendor : Fortinet

    Description : An Improper Authorization vulnerability in Fortinet FortiOS and FortiProxy under SSL VPN web portal allows an unauthenticated attacker to modify the password.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jan 10, 2022 | 1047 days ago

    6.5

    CVSS31
    CVE-2018-13383 - Fortinet FortiOS and FortiProxy Out-of-bounds Write -

    Action Due Jul 10, 2022 Target Vendor : Fortinet

    Description : A heap buffer overflow in Fortinet FortiOS and FortiProxy may cause the SSL VPN web service termination for logged in users.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jan 10, 2022 | 1047 days ago

    8.1

    CVSS31
    CVE-2019-1579 - Palo Alto Networks PAN-OS Remote Code Execution Vulnerability -

    Action Due Jul 10, 2022 Target Vendor : Palo Alto Networks

    Description : Remote Code Execution in PAN-OS with GlobalProtect Portal or GlobalProtect Gateway Interface enabled.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS31
    CVE-2019-10149 - Exim Mail Transfer Agent (MTA) Improper Input Validation -

    Action Due Jul 10, 2022 Target Vendor : Exim

    Description : Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS31
    CVE-2015-7450 - IBM WebSphere Application Server and Server Hypervisor Edition Code Injection. -

    Action Due Jul 10, 2022 Target Vendor : IBM

    Description : Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS30
    CVE-2017-1000486 - Primetek Primefaces Remote Code Execution Vulnerability -

    Action Due Jul 10, 2022 Target Vendor : Primetek

    Description : Primetek Primefaces is vulnerable to a weak encryption flaw resulting in remote code execution

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    10.0

    CVSS31
    CVE-2019-7609 - Kibana Arbitrary Code Execution -

    Action Due Jul 10, 2022 Target Vendor : Elastic

    Description : Kibana contain an arbitrary code execution flaw in the Timelion visualizer.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    9.8

    CVSS31
    CVE-2021-27860 - FatPipe WARP, IPVPN, and MPVPN Configuration Upload exploit -

    Action Due Jan 24, 2022 Target Vendor : FatPipe

    Description : A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software allows a remote, unauthenticated attacker to upload a file to any location on the filesystem.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Jan 10, 2022 | 1047 days ago

    7.1

    CVSS31
    CVE-2021-43890 - Microsoft Windows AppX Installer Spoofing Vulnerability -

    Action Due Dec 29, 2021 Target Vendor : Microsoft

    Description : Microsoft Windows AppX Installer contains a spoofing vulnerability which has a high impacts to confidentiality, integrity, and availability.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 15, 2021 | 1073 days ago

    8.8

    CVSS31
    CVE-2021-4102 - Google Chromium V8 Use-After-Free Vulnerability -

    Action Due Dec 29, 2021 Target Vendor : Google

    Description : Google Chromium V8 Engine contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 15, 2021 | 1073 days ago

    9.8

    CVSS31
    CVE-2021-44515 - Zoho Desktop Central Authentication Bypass Vulnerability -

    Action Due Dec 24, 2021 Target Vendor : Zoho

    Description : Zoho Desktop Central contains an authentication bypass vulnerability that could allow an attacker to execute arbitrary code in the Desktop Central MSP server.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 10, 2021 | 1078 days ago

    7.8

    CVSS31
    CVE-2019-13272 - Linux Kernel Improper Privilege Management Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Linux

    Description : Kernel/ptrace.c in Linux kernel mishandles contains an improper privilege management vulnerability that allows local users to obtain root access.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 10, 2021 | 1078 days ago

    9.8

    CVSS31
    CVE-2021-35394 - Realtek Jungle SDK Remote Code Execution Vulnerability -

    Action Due Dec 24, 2021 Target Vendor : Realtek

    Description : RealTek Jungle SDK contains multiple memory corruption vulnerabilities which can allow an attacker to perform remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 10, 2021 | 1078 days ago

    9.8

    CVSS30
    CVE-2019-7238 - Sonatype Nexus Repository Manager Incorrect Access Control Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Sonatype

    Description : Sonatype Nexus Repository Manager before 3.15.0 has an incorrect access control vulnerability. Exploitation allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 10, 2021 | 1078 days ago

    7.2

    CVSS31
    CVE-2019-0193 - Apache Solr DataImportHandler Code Injection Vulnerability -

    Action Due Jun 10, 2022 Target Vendor : Apache

    Description : The optional Apache Solr module DataImportHandler contains a code injection vulnerability.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Alert Date: Dec 10, 2021 | 1078 days ago
Showing 20 of 1224 Results

Filters

© cvefeed.io
Latest DB Update: Nov. 22, 2024 14:37