CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.8

    CVSS31
    CVE-2017-11826 - Microsoft Office Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-11826

    Alert Date: Mar 03, 2022 | 1206 days ago

    7.8

    CVSS31
    CVE-2017-0001 - Microsoft Graphics Device Interface (GDI) Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0001

    Alert Date: Mar 03, 2022 | 1206 days ago

    7.8

    CVSS31
    CVE-2016-0099 - Microsoft Windows Secondary Logon Service Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A privilege escalation vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2016-0099

    Alert Date: Mar 03, 2022 | 1206 days ago

    7.8

    CVSS31
    CVE-2014-4114 - Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-4114

    Alert Date: Mar 03, 2022 | 1206 days ago

    8.8

    CVSS31
    CVE-2013-3897 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description : A use-after-free vulnerability exists within CDisplayPointer in Microsoft Internet Explorer that allows an attacker to remotely execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2013-3897

    Alert Date: Mar 03, 2022 | 1206 days ago

    9.8

    CVSS31
    CVE-2012-4681 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2012-4681

    Alert Date: Mar 03, 2022 | 1206 days ago

    9.8

    CVSS31
    CVE-2011-3544 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description : An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2011-3544

    Alert Date: Mar 03, 2022 | 1206 days ago

    6.1

    CVSS31
    CVE-2022-24682 - Zimbra Webmail Cross-Site Scripting Vulnerability -

    Action Due Mar 11, 2022 Target Vendor : Zimbra

    Description : Zimbra webmail clients running versions 8.8.15 P29 & P30 contain a XSS vulnerability that would allow attackers to steal session cookie files.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-24682

    Alert Date: Feb 25, 2022 | 1212 days ago

    7.8

    CVSS31
    CVE-2017-8570 - Microsoft Office Remote Code Execution Vulnerability -

    Action Due Aug 25, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-8570

    Alert Date: Feb 25, 2022 | 1212 days ago

    8.8

    CVSS31
    CVE-2017-0222 - Microsoft Internet Explorer Remote Code Execution Vulnerability -

    Action Due Aug 25, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0222

    Alert Date: Feb 25, 2022 | 1212 days ago

    7.8

    CVSS31
    CVE-2014-6352 - Microsoft Windows Code Injection Vulnerability -

    Action Due Aug 25, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-6352

    Alert Date: Feb 25, 2022 | 1212 days ago

    5.3

    CVSS31
    CVE-2022-23134 - Zabbix Frontend Improper Access Control Vulnerability -

    Action Due Mar 08, 2022 Target Vendor : Zabbix

    Description : Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-23134

    Alert Date: Feb 22, 2022 | 1215 days ago

    9.8

    CVSS31
    CVE-2022-23131 - Zabbix Frontend Authentication Bypass Vulnerability -

    Action Due Mar 08, 2022 Target Vendor : Zabbix

    Description : Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-23131

    Alert Date: Feb 22, 2022 | 1215 days ago

    8.8

    CVSS31
    CVE-2022-0609 - Google Chromium Animation Use-After-Free Vulnerability -

    Action Due Mar 01, 2022 Target Vendor : Google

    Description : Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-0609

    Alert Date: Feb 15, 2022 | 1222 days ago

    7.5

    CVSS31
    CVE-2019-0752 - Microsoft Internet Explorer Type Confusion Vulnerability -

    Action Due Aug 15, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2019-0752

    Alert Date: Feb 15, 2022 | 1222 days ago

    7.5

    CVSS31
    CVE-2018-8174 - Microsoft Windows VBScript Engine Out-of-Bounds Write Vulnerability -

    Action Due Aug 15, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2018-8174

    Alert Date: Feb 15, 2022 | 1222 days ago

    7.8

    CVSS31
    CVE-2018-20250 - WinRAR Absolute Path Traversal Vulnerability -

    Action Due Aug 15, 2022 Target Vendor : RARLAB

    Description : WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2018-20250

    Alert Date: Feb 15, 2022 | 1222 days ago

    9.8

    CVSS31
    CVE-2018-15982 - Adobe Flash Player Use-After-Free Vulnerability -

    Action Due Aug 15, 2022 Target Vendor : Adobe

    Description : Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2018-15982

    Alert Date: Feb 15, 2022 | 1222 days ago

    7.8

    CVSS31
    CVE-2014-1761 - Microsoft Word Memory Corruption Vulnerability -

    Action Due Aug 15, 2022 Target Vendor : Microsoft

    Description : Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-1761

    Alert Date: Feb 15, 2022 | 1222 days ago

    9.8

    CVSS31
    CVE-2022-24086 - Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability -

    Action Due Mar 01, 2022 Target Vendor : Adobe

    Description : Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-24086

    Alert Date: Feb 15, 2022 | 1222 days ago
Showing 20 of 1370 Results

Filters

© cvefeed.io
Latest DB Update: Jun. 21, 2025 4:46