CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.3

    HIGH
    CVE-2009-1862 - Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).

    Action :For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-1862

    Alert Date: Jun 08, 2022 | 1371 days ago

    9.3

    HIGH
    CVE-2009-0563 - Microsoft Office Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-0563

    Alert Date: Jun 08, 2022 | 1371 days ago

    9.3

    HIGH
    CVE-2009-0557 - Microsoft Office Object Record Corruption Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2009-0557

    Alert Date: Jun 08, 2022 | 1371 days ago

    9.8

    CRITICAL
    CVE-2008-0655 - Adobe Acrobat and Reader Unspecified Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2008-0655

    Alert Date: Jun 08, 2022 | 1371 days ago

    9.3

    HIGH
    CVE-2007-5659 - Adobe Acrobat and Reader Buffer Overflow Vulnerability -

    Action Due Jun 22, 2022 Target Vendor : Adobe

    Description :Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2007-5659

    Alert Date: Jun 08, 2022 | 1371 days ago

    9.8

    CRITICAL
    CVE-2022-26134 - Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability -

    Action Due Jun 06, 2022 Target Vendor : Atlassian

    Description :Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.

    Action :Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.

    Known To Be Used in Ransomware Campaigns? : Known Detected Jun 02, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26134

    Alert Date: Jun 02, 2022 | 1377 days ago

    5.3

    MEDIUM
    CVE-2013-0431 - Oracle JRE Sandbox Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0431

    Alert Date: May 25, 2022 | 1385 days ago

    4.3

    MEDIUM
    CVE-2013-2423 - Oracle JRE Unspecified Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-2423

    Alert Date: May 25, 2022 | 1385 days ago

    5.5

    MEDIUM
    CVE-2013-3896 - Microsoft Silverlight Information Disclosure Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3896

    Alert Date: May 25, 2022 | 1385 days ago

    6.5

    MEDIUM
    CVE-2013-3993 - IBM InfoSphere BigInsights Invalid Input Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : IBM

    Description :Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 25, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3993

    Alert Date: May 25, 2022 | 1385 days ago

    7.8

    HIGH
    CVE-2014-3153 - Linux Kernel Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Linux

    Description :The futex_requeue function in kernel/futex.c in Linux kernel does not ensure that calls have two different futex addresses, which allows local users to gain privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-3153

    Alert Date: May 25, 2022 | 1385 days ago

    8.8

    HIGH
    CVE-2014-2817 - Microsoft Internet Explorer Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-2817

    Alert Date: May 25, 2022 | 1385 days ago

    8.8

    HIGH
    CVE-2014-4123 - Microsoft Internet Explorer Privilege Escalation Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4123

    Alert Date: May 25, 2022 | 1385 days ago

    10.0

    HIGH
    CVE-2014-8439 - Adobe Flash Player Dereferenced Pointer Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-8439

    Alert Date: May 25, 2022 | 1385 days ago

    9.3

    HIGH
    CVE-2014-4148 - Microsoft Windows Remote Code Execution Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4148

    Alert Date: May 25, 2022 | 1385 days ago

    10.0

    HIGH
    CVE-2013-0422 - Oracle JRE Remote Code Execution Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Oracle

    Description :A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-0422

    Alert Date: May 25, 2022 | 1385 days ago

    6.5

    MEDIUM
    CVE-2013-7331 - Microsoft Internet Explorer Information Disclosure Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Microsoft

    Description :An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-7331

    Alert Date: May 25, 2022 | 1385 days ago

    10.0

    HIGH
    CVE-2014-0546 - Adobe Reader and Acrobat Sandbox Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0546

    Alert Date: May 25, 2022 | 1385 days ago

    9.3

    HIGH
    CVE-2015-8651 - Adobe Flash Player Integer Overflow Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Adobe

    Description :Integer overflow in Adobe Flash Player allows attackers to execute code.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-8651

    Alert Date: May 25, 2022 | 1385 days ago

    8.8

    HIGH
    CVE-2015-4495 - Mozilla Firefox Security Feature Bypass Vulnerability -

    Action Due Jun 15, 2022 Target Vendor : Mozilla

    Description :Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-4495

    Alert Date: May 25, 2022 | 1385 days ago
Showing 20 of 1543 Results

Filters