CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.8

    CRITICAL
    CVE-2008-0655 - Adobe Acrobat and Reader Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2008-0655

    Alert Date: Jun 08, 2022 | 1370 days ago

    9.3

    HIGH
    CVE-2007-5659 - Adobe Acrobat and Reader Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2007-5659

    Alert Date: Jun 08, 2022 | 1370 days ago

    9.8

    CRITICAL
    CVE-2022-26134 - Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability -

    Action Due Jun 06, 2022 Target Vendor : Atlassian

    Description :Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.

    Action :Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.

    Known To Be Used in Ransomware Campaigns? : Known Detected Jun 02, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26134

    Alert Date: Jun 02, 2022 | 1376 days ago

    5.3

    MEDIUM
    CVE-2013-0431 - Oracle JRE Sandbox Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0431

    Alert Date: May 25, 2022 | 1384 days ago

    4.3

    MEDIUM
    CVE-2013-2423 - Oracle JRE Unspecified Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-2423

    Alert Date: May 25, 2022 | 1384 days ago

    5.5

    MEDIUM
    CVE-2013-3896 - Microsoft Silverlight Information Disclosure Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3896

    Alert Date: May 25, 2022 | 1384 days ago

    6.5

    MEDIUM
    CVE-2013-3993 - IBM InfoSphere BigInsights Invalid Input Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : IBM

    Description :Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3993

    Alert Date: May 25, 2022 | 1384 days ago

    7.8

    HIGH
    CVE-2014-3153 - Linux Kernel Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Linux

    Description :The futex_requeue function in kernel/futex.c in Linux kernel does not ensure that calls have two different futex addresses, which allows local users to gain privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-3153

    Alert Date: May 25, 2022 | 1384 days ago

    8.8

    HIGH
    CVE-2014-2817 - Microsoft Internet Explorer Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-2817

    Alert Date: May 25, 2022 | 1384 days ago

    8.8

    HIGH
    CVE-2014-4123 - Microsoft Internet Explorer Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4123

    Alert Date: May 25, 2022 | 1384 days ago

    10.0

    HIGH
    CVE-2014-8439 - Adobe Flash Player Dereferenced Pointer Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-8439

    Alert Date: May 25, 2022 | 1384 days ago

    9.3

    HIGH
    CVE-2014-4148 - Microsoft Windows Remote Code Execution Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4148

    Alert Date: May 25, 2022 | 1384 days ago

    10.0

    HIGH
    CVE-2013-0422 - Oracle JRE Remote Code Execution Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0422

    Alert Date: May 25, 2022 | 1384 days ago

    6.5

    MEDIUM
    CVE-2013-7331 - Microsoft Internet Explorer Information Disclosure Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-7331

    Alert Date: May 25, 2022 | 1384 days ago

    10.0

    HIGH
    CVE-2014-0546 - Adobe Reader and Acrobat Sandbox Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0546

    Alert Date: May 25, 2022 | 1384 days ago

    9.3

    HIGH
    CVE-2015-8651 - Adobe Flash Player Integer Overflow Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Integer overflow in Adobe Flash Player allows attackers to execute code.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-8651

    Alert Date: May 25, 2022 | 1384 days ago

    8.8

    HIGH
    CVE-2015-4495 - Mozilla Firefox Security Feature Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Mozilla

    Description :Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-4495

    Alert Date: May 25, 2022 | 1384 days ago

    9.3

    HIGH
    CVE-2015-2425 - Microsoft Internet Explorer Memory Corruption Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-2425

    Alert Date: May 25, 2022 | 1384 days ago

    6.5

    MEDIUM
    CVE-2015-0071 - Microsoft Internet Explorer ASLR Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-0071

    Alert Date: May 25, 2022 | 1384 days ago

    9.3

    HIGH
    CVE-2015-0016 - Microsoft Windows TS WebProxy Directory Traversal Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers to escalate privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-0016

    Alert Date: May 25, 2022 | 1384 days ago
Showing 20 of 1540 Results

Filters