CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    7.8

    CVSS31
    CVE-2024-36971 - Android Kernel Remote Code Execution Vulnerability -

    Action Due Aug 28, 2024 Target Vendor : Android

    Description : Android contains an unspecified vulnerability in the kernel that allows for remote code execution. This vulnerability resides in Linux Kernel and could impact other products, including but not limited to Android OS.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2024-08-01, https://lore.kernel.org/linux-cve-announce/[email protected]/T/#u ; https://nvd.nist.gov/vuln/detail/CVE-2024-36971

    Alert Date: Aug 07, 2024 | 341 days ago

    8.8

    CVSS31
    CVE-2018-0824 - Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability -

    Action Due Aug 26, 2024 Target Vendor : Microsoft

    Description : Microsoft COM for Windows contains a deserialization of untrusted data vulnerability that allows for privilege escalation and remote code execution via a specially crafted file or script.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2018-0824; https://nvd.nist.gov/vuln/detail/CVE-2018-0824

    Alert Date: Aug 05, 2024 | 343 days ago

    7.2

    CVSS31
    CVE-2024-37085 - VMware ESXi Authentication Bypass Vulnerability -

    Action Due Aug 20, 2024 Target Vendor : VMware

    Description : VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085

    Alert Date: Jul 30, 2024 | 349 days ago

    9.8

    CVSS31
    CVE-2023-45249 - Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : Acronis

    Description : Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://security-advisory.acronis.com/advisories/SEC-6452; https://nvd.nist.gov/vuln/detail/CVE-2023-45249

    Alert Date: Jul 29, 2024 | 350 days ago

    9.8

    CVSS31
    CVE-2024-5217 - ServiceNow Incomplete List of Disallowed Inputs Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : ServiceNow

    Description : ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313; https://nvd.nist.gov/vuln/detail/CVE-2024-5217

    Alert Date: Jul 29, 2024 | 350 days ago

    9.8

    CVSS31
    CVE-2024-4879 - ServiceNow Improper Input Validation Vulnerability -

    Action Due Aug 19, 2024 Target Vendor : ServiceNow

    Description : ServiceNow Utah, Vancouver, and Washington DC Now releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1645154; https://nvd.nist.gov/vuln/detail/CVE-2024-4879

    Alert Date: Jul 29, 2024 | 350 days ago

    5.3

    CVSS31
    CVE-2024-39891 - Twilio Authy Information Disclosure Vulnerability -

    Action Due Aug 13, 2024 Target Vendor : Twilio

    Description : Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.twilio.com/en-us/changelog/Security_Alert_Authy_App_Android_iOS; https://nvd.nist.gov/vuln/detail/CVE-2024-39891

    Alert Date: Jul 23, 2024 | 356 days ago

    8.8

    CVSS31
    CVE-2012-4792 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due Aug 13, 2024 Target Vendor : Microsoft

    Description : Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792

    Alert Date: Jul 23, 2024 | 356 days ago

    6.5

    CVSS31
    CVE-2022-22948 - VMware vCenter Server Incorrect Default File Permissions Vulnerability -

    Action Due Aug 07, 2024 Target Vendor : VMware

    Description : VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.vmware.com/security/advisories/VMSA-2022-0009.html; https://nvd.nist.gov/vuln/detail/CVE-2022-22948

    Alert Date: Jul 17, 2024 | 362 days ago

    8.6

    CVSS31
    CVE-2024-28995 - SolarWinds Serv-U Path Traversal Vulnerability -

    Action Due Aug 07, 2024 Target Vendor : SolarWinds

    Description : SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995; https://nvd.nist.gov/vuln/detail/CVE-2024-28995

    Alert Date: Jul 17, 2024 | 362 days ago

    9.8

    CVSS31
    CVE-2024-34102 - Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability -

    Action Due Aug 07, 2024 Target Vendor : Adobe

    Description : Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://helpx.adobe.com/security/products/magento/apsb24-40.html; https://nvd.nist.gov/vuln/detail/CVE-2024-34102

    Alert Date: Jul 17, 2024 | 362 days ago

    9.8

    CVSS31
    CVE-2024-36401 - OSGeo GeoServer GeoTools Eval Injection Vulnerability -

    Action Due Aug 05, 2024 Target Vendor : OSGeo

    Description : OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797 ; https://nvd.nist.gov/vuln/detail/CVE-2024-36401

    Alert Date: Jul 15, 2024 | 364 days ago

    9.8

    CVSS31
    CVE-2024-23692 - Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Rejetto

    Description : Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : The patched Rejetto HTTP File Server (HFS) is version 3: https://github.com/rejetto/hfs?tab=readme-ov-file#installation, https://www.rejetto.com/hfs/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-23692

    Alert Date: Jul 09, 2024 | 370 days ago

    7.8

    CVSS31
    CVE-2024-38080 - Microsoft Windows Hyper-V Privilege Escalation Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080; https://nvd.nist.gov/vuln/detail/CVE-2024-38080

    Alert Date: Jul 09, 2024 | 370 days ago

    7.5

    CVSS31
    CVE-2024-38112 - Microsoft Windows MSHTML Platform Spoofing Vulnerability -

    Action Due Jul 30, 2024 Target Vendor : Microsoft

    Description : Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112; https://nvd.nist.gov/vuln/detail/CVE-2024-38112

    Alert Date: Jul 09, 2024 | 370 days ago

    6.7

    CVSS31
    CVE-2024-20399 - Cisco NX-OS Command Injection Vulnerability -

    Action Due Jul 23, 2024 Target Vendor : Cisco

    Description : Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP; https://nvd.nist.gov/vuln/detail/CVE-2024-20399

    Alert Date: Jul 02, 2024 | 377 days ago

    6.3

    CVSS31
    CVE-2020-13965 - Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : Roundcube

    Description : Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12; https://nvd.nist.gov/vuln/detail/CVE-2020-13965

    Alert Date: Jun 26, 2024 | 383 days ago

    7.8

    CVSS31
    CVE-2022-2586 - Linux Kernel Use-After-Free Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : Linux

    Description : Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges.

    Action : Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://seclists.org/oss-sec/2022/q3/131; https://nvd.nist.gov/vuln/detail/CVE-2022-2586

    Alert Date: Jun 26, 2024 | 383 days ago

    10.0

    CVSS31
    CVE-2022-24816 - OSGeo GeoServer JAI-EXT Code Injection Vulnerability -

    Action Due Jul 17, 2024 Target Vendor : OSGeo

    Description : OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. The patched JAI-EXT is version 1.1.22: https://github.com/geosolutions-it/jai-ext/releases/tag/1.1.22, https://github.com/geosolutions-it/jai-ext/security/advisories/GHSA-v92f-jx6p-73rx; https://nvd.nist.gov/vuln/detail/CVE-2022-24816

    Alert Date: Jun 26, 2024 | 383 days ago

    9.8

    CVSS31
    CVE-2024-4358 - Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability -

    Action Due Jul 04, 2024 Target Vendor : Progress

    Description : Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.

    Action : Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358; https://nvd.nist.gov/vuln/detail/CVE-2024-4358

    Alert Date: Jun 13, 2024 | 396 days ago
Showing 20 of 1382 Results

Filters

© cvefeed.io
Latest DB Update: Jul. 14, 2025 20:26