CISA Known Exploited Vulnerabilities (KEV)
CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.
8.8
CVE-2017-5030 - Google Chromium V8 Memory Corruption Vulnerability -
Action Due Jun 22, 2022 Target Vendor : Google
Description :Google Chromium V8 Engine contains a memory corruption vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-5030
8.8
CVE-2016-5198 - Google Chromium V8 Out-of-Bounds Memory Vulnerability -
Action Due Jun 22, 2022 Target Vendor : Google
Description :Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to perform read/write operations, leading to code execution, via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-5198
9.8
CVE-2022-26134 - Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability -
Action Due Jun 06, 2022 Target Vendor : Atlassian
Description :Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.
Action :Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.
Known To Be Used in Ransomware Campaigns? : Known Detected Jun 02, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26134
7.5
CVE-2010-1428 - Red Hat JBoss Information Disclosure Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Red Hat
Description :Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2010-1428
9.3
CVE-2014-4077 - Microsoft IME Japanese Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4077
8.8
CVE-2015-2360 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Win32k.sys in the kernel-mode drivers in Microsoft Windows allows local users to gain privileges or cause denial-of-service (DoS).
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-2360
7.2
CVE-2015-1769 - Microsoft Windows Mount Manager Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic links.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-1769
9.3
CVE-2016-3393 - Microsoft Windows Graphics Device Interface (GDI) Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :A remote code execution vulnerability exists due to the way the Windows GDI component handles objects in the memory. An attacker who successfully exploits this vulnerability could take control of the affected system.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-3393
7.8
CVE-2015-6175 - Microsoft Windows Kernel Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-6175
9.3
CVE-2015-1671 - Microsoft Windows Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :A remote code execution vulnerability exists when components of Windows, .NET Framework, Office, Lync, and Silverlight fail to properly handle TrueType fonts.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-1671
9.3
CVE-2015-8651 - Adobe Flash Player Integer Overflow Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Integer overflow in Adobe Flash Player allows attackers to execute code.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-8651
10.0
CVE-2014-0546 - Adobe Reader and Acrobat Sandbox Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0546
8.8
CVE-2015-4495 - Mozilla Firefox Security Feature Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Mozilla
Description :Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-4495
9.3
CVE-2014-4148 - Microsoft Windows Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4148
10.0
CVE-2014-8439 - Adobe Flash Player Dereferenced Pointer Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-8439
4.3
CVE-2013-2423 - Oracle JRE Unspecified Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-2423
10.0
CVE-2013-0422 - Oracle JRE Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0422
8.8
CVE-2014-4123 - Microsoft Internet Explorer Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4123
6.5
CVE-2013-3993 - IBM InfoSphere BigInsights Invalid Input Vulnerability -
Action Due Jun 15, 2022 Target Vendor : IBM
Description :Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3993
5.3
CVE-2013-0431 - Oracle JRE Sandbox Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0431