CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    7.8

    HIGH
    CVE-2019-0880 - Microsoft Windows Privilege Escalation Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Microsoft

    Description :A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0880

    Alert Date: May 23, 2022 | 1433 days ago

    8.8

    HIGH
    CVE-2019-13720 - Google Chrome WebAudio Use-After-Free Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Google

    Description :Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-13720

    Alert Date: May 23, 2022 | 1433 days ago

    8.8

    HIGH
    CVE-2019-11707 - Mozilla Firefox and Thunderbird Type Confusion Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Mozilla

    Description :Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-11707

    Alert Date: May 23, 2022 | 1433 days ago

    10.0

    CRITICAL
    CVE-2019-11708 - Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : Mozilla

    Description :Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-11708

    Alert Date: May 23, 2022 | 1433 days ago

    8.8

    HIGH
    CVE-2019-8720 - WebKitGTK Memory Corruption Vulnerability -

    Action Due Jun 13, 2022 Target Vendor : WebKitGTK

    Description :WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-8720

    Alert Date: May 23, 2022 | 1433 days ago

    10.0

    HIGH
    CVE-2022-30525 - Zyxel Multiple Firewalls OS Command Injection Vulnerability -

    Action Due Jun 06, 2022 Target Vendor : Zyxel

    Description :A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-30525

    Alert Date: May 16, 2022 | 1440 days ago

    10.0

    CRITICAL
    CVE-2022-22947 - VMware Spring Cloud Gateway Code Injection Vulnerability -

    Action Due Jun 06, 2022 Target Vendor : VMware

    Description :Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-22947

    Alert Date: May 16, 2022 | 1440 days ago

    9.8

    CRITICAL
    CVE-2022-1388 - F5 BIG-IP Missing Authentication Vulnerability -

    Action Due May 31, 2022 Target Vendor : F5

    Description :F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected May 10, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-1388

    Alert Date: May 10, 2022 | 1446 days ago

    7.5

    HIGH
    CVE-2014-0160 - OpenSSL Information Disclosure Vulnerability -

    Action Due May 25, 2022 Target Vendor : OpenSSL

    Description :The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0160

    Alert Date: May 04, 2022 | 1452 days ago

    9.3

    HIGH
    CVE-2014-0322 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due May 25, 2022 Target Vendor : Microsoft

    Description :Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0322

    Alert Date: May 04, 2022 | 1452 days ago

    9.3

    HIGH
    CVE-2019-8506 - Apple Multiple Products Type Confusion Vulnerability -

    Action Due May 25, 2022 Target Vendor : Apple

    Description :A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-8506

    Alert Date: May 04, 2022 | 1452 days ago

    8.8

    HIGH
    CVE-2021-1789 - Apple Multiple Products Type Confusion Vulnerability -

    Action Due May 25, 2022 Target Vendor : Apple

    Description :A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-1789

    Alert Date: May 04, 2022 | 1452 days ago

    7.8

    HIGH
    CVE-2014-4113 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 25, 2022 Target Vendor : Microsoft

    Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4113

    Alert Date: May 04, 2022 | 1452 days ago

    9.9

    CRITICAL
    CVE-2019-1003029 - Jenkins Script Security Plugin Sandbox Bypass Vulnerability -

    Action Due May 16, 2022 Target Vendor : Jenkins

    Description :Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1003029

    Alert Date: Apr 25, 2022 | 1461 days ago

    7.8

    HIGH
    CVE-2021-40450 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-40450

    Alert Date: Apr 25, 2022 | 1461 days ago

    7.8

    HIGH
    CVE-2022-0847 - Linux Kernel Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Linux

    Description :Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-0847

    Alert Date: Apr 25, 2022 | 1461 days ago

    7.0

    HIGH
    CVE-2022-21919 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description :Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-21919

    Alert Date: Apr 25, 2022 | 1461 days ago

    7.8

    HIGH
    CVE-2021-41357 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-41357

    Alert Date: Apr 25, 2022 | 1461 days ago

    7.0

    HIGH
    CVE-2022-26904 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -

    Action Due May 16, 2022 Target Vendor : Microsoft

    Description :Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26904

    Alert Date: Apr 25, 2022 | 1461 days ago

    10.0

    HIGH
    CVE-2022-29464 - WSO2 Multiple Products Unrestrictive Upload of File Vulnerability -

    Action Due May 16, 2022 Target Vendor : WSO2

    Description :Multiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Apr 25, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-29464

    Alert Date: Apr 25, 2022 | 1461 days ago
Showing 20 of 1587 Results

Filters