CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.3

    HIGH
    CVE-2012-4969 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer contains a use-after-free vulnerability that allows remote attackers to execute code via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-4969

    Alert Date: Jun 08, 2022 | 1367 days ago

    6.1

    MEDIUM
    CVE-2012-0767 - Adobe Flash Player Cross-Site Scripting (XSS) Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0767

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2010-2572 - Microsoft PowerPoint Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2010-2572

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2010-1297 - Adobe Flash Player Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2010-1297

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2009-0557 - Microsoft Office Object Record Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-0557

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.8

    CRITICAL
    CVE-2008-0655 - Adobe Acrobat and Reader Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2008-0655

    Alert Date: Jun 08, 2022 | 1367 days ago

    6.5

    MEDIUM
    CVE-2019-5825 - Google Chromium V8 Out-of-Bounds Write Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Google

    Description :Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-5825

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2012-0754 - Adobe Flash Player Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0754

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2012-0151 - Microsoft Windows Authenticode Signature Verification Remote Code Execution Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0151

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2011-0609 - Adobe Flash Player Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2011-0609

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.8

    CRITICAL
    CVE-2017-6862 - NETGEAR Multiple Devices Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : NETGEAR

    Description :Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-6862

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2007-5659 - Adobe Acrobat and Reader Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2007-5659

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.0

    HIGH
    CVE-2019-15271 - Cisco RV Series Routers Deserialization of Untrusted Data Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Cisco

    Description :A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an attacker to execute code with root privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-15271

    Alert Date: Jun 08, 2022 | 1367 days ago

    8.8

    HIGH
    CVE-2018-6065 - Google Chromium V8 Integer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Google

    Description :Google Chromium V8 Engine contains an integer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-6065

    Alert Date: Jun 08, 2022 | 1367 days ago

    8.8

    HIGH
    CVE-2018-4990 - Adobe Acrobat and Reader Double Free Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-4990

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2012-1889 - Microsoft XML Core Services Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-1889

    Alert Date: Jun 08, 2022 | 1367 days ago

    10.0

    HIGH
    CVE-2011-2462 - Adobe Reader and Acrobat Universal 3D Memory Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2011-2462

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.3

    HIGH
    CVE-2009-4324 - Adobe Acrobat and Reader Use-After-Free Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-4324

    Alert Date: Jun 08, 2022 | 1367 days ago

    8.8

    HIGH
    CVE-2006-2492 - Microsoft Word Malformed Object Pointer Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2006-2492

    Alert Date: Jun 08, 2022 | 1367 days ago

    9.8

    CRITICAL
    CVE-2019-7194 - QNAP Photo Station Path Traversal Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : QNAP

    Description :QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Jun 08, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7194

    Alert Date: Jun 08, 2022 | 1367 days ago
Showing 20 of 1540 Results

Filters