CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.3

    HIGH
    CVE-2020-3837 - Apple Multiple Products Memory Corruption Vulnerability -

    Action Due Jul 18, 2022 Target Vendor : Apple

    Description :Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a memory corruption vulnerability that could allow an application to execute code with kernel privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-3837

    Alert Date: Jun 27, 2022 | 1350 days ago

    7.8

    HIGH
    CVE-2021-4034 - Red Hat Polkit Out-of-Bounds Read and Write Vulnerability -

    Action Due Jul 18, 2022 Target Vendor : Red Hat

    Description :The Red Hat polkit pkexec utility contains an out-of-bounds read and write vulnerability that allows for privilege escalation with administrative rights.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-4034

    Alert Date: Jun 27, 2022 | 1350 days ago

    9.3

    HIGH
    CVE-2019-8605 - Apple Multiple Products Use-After-Free Vulnerability -

    Action Due Jul 18, 2022 Target Vendor : Apple

    Description :A use-after-free vulnerability in Apple iOS, macOS, tvOS, and watchOS could allow a malicious application to execute code with system privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-8605

    Alert Date: Jun 27, 2022 | 1350 days ago

    9.3

    HIGH
    CVE-2022-30190 - Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability -

    Action Due Jul 05, 2022 Target Vendor : Microsoft

    Description :A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Feb 26, 2026

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-30190

    Alert Date: Jun 14, 2022 | 1363 days ago

    5.3

    MEDIUM
    CVE-2016-2388 - SAP NetWeaver Information Disclosure Vulnerability -

    Action Due Jun 30, 2022 Target Vendor : SAP

    Description :The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-2388

    Alert Date: Jun 09, 2022 | 1368 days ago

    9.9

    CRITICAL
    CVE-2021-38163 - SAP NetWeaver Unrestricted File Upload Vulnerability -

    Action Due Jun 30, 2022 Target Vendor : SAP

    Description :SAP NetWeaver contains a vulnerability that allows unrestricted file upload.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-38163

    Alert Date: Jun 09, 2022 | 1368 days ago

    9.8

    CRITICAL
    CVE-2016-2386 - SAP NetWeaver SQL Injection Vulnerability -

    Action Due Jun 30, 2022 Target Vendor : SAP

    Description :SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-2386

    Alert Date: Jun 09, 2022 | 1368 days ago

    8.8

    HIGH
    CVE-2017-5070 - Google Chromium V8 Type Confusion Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Google

    Description :Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-5070

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.8

    CRITICAL
    CVE-2017-6862 - NETGEAR Multiple Devices Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : NETGEAR

    Description :Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-6862

    Alert Date: Jun 08, 2022 | 1369 days ago

    8.8

    HIGH
    CVE-2018-17463 - Google Chromium V8 Remote Code Execution Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Google

    Description :Google Chromium V8 Engine contains an unspecified vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-17463

    Alert Date: Jun 08, 2022 | 1369 days ago

    6.5

    MEDIUM
    CVE-2019-5825 - Google Chromium V8 Out-of-Bounds Write Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Google

    Description :Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-5825

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2009-4324 - Adobe Acrobat and Reader Use-After-Free Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-4324

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2010-1297 - Adobe Flash Player Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2010-1297

    Alert Date: Jun 08, 2022 | 1369 days ago

    10.0

    HIGH
    CVE-2011-2462 - Adobe Reader and Acrobat Universal 3D Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2011-2462

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2012-0151 - Microsoft Windows Authenticode Signature Verification Remote Code Execution Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0151

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2012-0754 - Adobe Flash Player Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0754

    Alert Date: Jun 08, 2022 | 1369 days ago

    10.0

    HIGH
    CVE-2019-7193 - QNAP QTS Improper Input Validation Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : QNAP

    Description :QNAP QTS contains an improper input validation vulnerability allowing remote attackers to inject code on the system.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Jun 08, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7193

    Alert Date: Jun 08, 2022 | 1369 days ago

    10.0

    HIGH
    CVE-2009-3953 - Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-3953

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2013-1331 - Microsoft Office Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via crafted PNG data in an Office document.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-1331

    Alert Date: Jun 08, 2022 | 1369 days ago

    9.3

    HIGH
    CVE-2009-1862 - Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-1862

    Alert Date: Jun 08, 2022 | 1369 days ago
Showing 20 of 1540 Results

Filters