CISA Known Exploited Vulnerabilities (KEV)
CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.
9.8
CVE-2008-0655 - Adobe Acrobat and Reader Unspecified Vulnerability -
Action Due Jun 22, 2022 Target Vendor : Adobe
Description :Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2008-0655
9.3
CVE-2007-5659 - Adobe Acrobat and Reader Buffer Overflow Vulnerability -
Action Due Jun 22, 2022 Target Vendor : Adobe
Description :Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2007-5659
9.8
CVE-2022-26134 - Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability -
Action Due Jun 06, 2022 Target Vendor : Atlassian
Description :Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.
Action :Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.
Known To Be Used in Ransomware Campaigns? : Known Detected Jun 02, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26134
5.3
CVE-2013-0431 - Oracle JRE Sandbox Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0431
4.3
CVE-2013-2423 - Oracle JRE Unspecified Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-2423
5.5
CVE-2013-3896 - Microsoft Silverlight Information Disclosure Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3896
6.5
CVE-2013-3993 - IBM InfoSphere BigInsights Invalid Input Vulnerability -
Action Due Jun 15, 2022 Target Vendor : IBM
Description :Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3993
7.8
CVE-2014-3153 - Linux Kernel Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Linux
Description :The futex_requeue function in kernel/futex.c in Linux kernel does not ensure that calls have two different futex addresses, which allows local users to gain privileges.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-3153
8.8
CVE-2014-2817 - Microsoft Internet Explorer Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-2817
8.8
CVE-2014-4123 - Microsoft Internet Explorer Privilege Escalation Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4123
10.0
CVE-2014-8439 - Adobe Flash Player Dereferenced Pointer Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-8439
9.3
CVE-2014-4148 - Microsoft Windows Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4148
10.0
CVE-2013-0422 - Oracle JRE Remote Code Execution Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Oracle
Description :A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0422
6.5
CVE-2013-7331 - Microsoft Internet Explorer Information Disclosure Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-7331
10.0
CVE-2014-0546 - Adobe Reader and Acrobat Sandbox Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0546
9.3
CVE-2015-8651 - Adobe Flash Player Integer Overflow Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Adobe
Description :Integer overflow in Adobe Flash Player allows attackers to execute code.
Action :The impacted product is end-of-life and should be disconnected if still in use.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-8651
8.8
CVE-2015-4495 - Mozilla Firefox Security Feature Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Mozilla
Description :Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-4495
9.3
CVE-2015-2425 - Microsoft Internet Explorer Memory Corruption Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-2425
6.5
CVE-2015-0071 - Microsoft Internet Explorer ASLR Bypass Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web site.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-0071
9.3
CVE-2015-0016 - Microsoft Windows TS WebProxy Directory Traversal Vulnerability -
Action Due Jun 15, 2022 Target Vendor : Microsoft
Description :Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers to escalate privileges.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-0016