CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    8.8

    HIGH
    CVE-2016-6366 - Cisco Adaptive Security Appliance (ASA) SNMP Buffer Overflow Vulnerability -

    Action Due Jun 14, 2022 Target Vendor : Cisco

    Description :A buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASA software could allow an attacker to cause a reload of the affected system or to remotely execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-6366

    Alert Date: May 24, 2022 | 1432 days ago

    7.8

    HIGH
    CVE-2016-6367 - Cisco Adaptive Security Appliance (ASA) CLI Remote Code Execution Vulnerability -

    Action Due Jun 14, 2022 Target Vendor : Cisco

    Description :A vulnerability in the command-line interface (CLI) parser of Cisco ASA software could allow an authenticated, local attacker to create a denial-of-service (DoS) condition or potentially execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-6367

    Alert Date: May 24, 2022 | 1432 days ago

    6.5

    MEDIUM
    CVE-2016-3298 - Microsoft Internet Explorer Messaging API Information Disclosure Vulnerability -

    Action Due Jun 14, 2022 Target Vendor : Microsoft

    Description :An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow the attacker to test for the presence of files on disk.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-3298

    Alert Date: May 24, 2022 | 1432 days ago

    8.8

    HIGH
    CVE-2017-0149 - Microsoft Internet Explorer Memory Corruption Vulnerability -

    Action Due Jun 14, 2022 Target Vendor : Microsoft

    Description :Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS) via a crafted website.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2017-0149

    Alert Date: May 24, 2022 | 1432 days ago

    7.8

    HIGH
    CVE-2018-8589 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-8589

    Alert Date: May 23, 2022 | 1433 days ago

    10.0

    HIGH
    CVE-2018-5002 - Adobe Flash Player Stack-based Buffer Overflow Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2018-5002

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2019-1130 - Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1130

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2019-1385 - Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1385

    Alert Date: May 23, 2022 | 1433 days ago

    8.2

    HIGH
    CVE-2019-18426 - WhatsApp Cross-Site Scripting Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Meta Platforms

    Description :A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-18426

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2021-1048 - Android Kernel Use-After-Free Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Android

    Description :Android kernel contains a use-after-free vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-1048

    Alert Date: May 23, 2022 | 1433 days ago

    6.5

    MEDIUM
    CVE-2022-20821 - Cisco IOS XR Open Port Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Cisco

    Description :Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-20821

    Alert Date: May 23, 2022 | 1433 days ago

    6.9

    MEDIUM
    CVE-2021-0920 - Android Kernel Race Condition Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Android

    Description :Android kernel contains a race condition, which allows for a use-after-free vulnerability. Exploitation can allow for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-0920

    Alert Date: May 23, 2022 | 1433 days ago

    9.3

    HIGH
    CVE-2021-30883 - Apple Multiple Products Memory Corruption Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Apple

    Description :Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-30883

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2020-1027 - Microsoft Windows Kernel Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-1027

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2020-0638 - Microsoft Update Notification Manager Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 23, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2020-0638

    Alert Date: May 23, 2022 | 1433 days ago

    7.8

    HIGH
    CVE-2019-7286 - Apple Multiple Products Memory Corruption Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Apple

    Description :Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7286

    Alert Date: May 23, 2022 | 1433 days ago

    9.3

    HIGH
    CVE-2019-7287 - Apple iOS Memory Corruption Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Apple

    Description :Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-7287

    Alert Date: May 23, 2022 | 1433 days ago

    6.5

    MEDIUM
    CVE-2019-0676 - Microsoft Internet Explorer Information Disclosure Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0676

    Alert Date: May 23, 2022 | 1433 days ago

    6.5

    MEDIUM
    CVE-2019-5786 - Google Chrome Blink Use-After-Free Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Google

    Description :Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-5786

    Alert Date: May 23, 2022 | 1433 days ago

    6.5

    MEDIUM
    CVE-2019-0703 - Microsoft Windows SMB Information Disclosure Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0703

    Alert Date: May 23, 2022 | 1433 days ago
Showing 20 of 1587 Results

Filters