CISA Known Exploited Vulnerabilities (KEV)
CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.
7.8
CVE-2019-0880 - Microsoft Windows Privilege Escalation Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Microsoft
Description :A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-0880
8.8
CVE-2019-13720 - Google Chrome WebAudio Use-After-Free Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Google
Description :Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-13720
8.8
CVE-2019-11707 - Mozilla Firefox and Thunderbird Type Confusion Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Mozilla
Description :Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-11707
10.0
CVE-2019-11708 - Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability -
Action Due Jun 13, 2022 Target Vendor : Mozilla
Description :Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-11708
8.8
CVE-2019-8720 - WebKitGTK Memory Corruption Vulnerability -
Action Due Jun 13, 2022 Target Vendor : WebKitGTK
Description :WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-8720
10.0
CVE-2022-30525 - Zyxel Multiple Firewalls OS Command Injection Vulnerability -
Action Due Jun 06, 2022 Target Vendor : Zyxel
Description :A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-30525
10.0
CVE-2022-22947 - VMware Spring Cloud Gateway Code Injection Vulnerability -
Action Due Jun 06, 2022 Target Vendor : VMware
Description :Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-22947
9.8
CVE-2022-1388 - F5 BIG-IP Missing Authentication Vulnerability -
Action Due May 31, 2022 Target Vendor : F5
Description :F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected May 10, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-1388
7.5
CVE-2014-0160 - OpenSSL Information Disclosure Vulnerability -
Action Due May 25, 2022 Target Vendor : OpenSSL
Description :The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0160
9.3
CVE-2014-0322 - Microsoft Internet Explorer Use-After-Free Vulnerability -
Action Due May 25, 2022 Target Vendor : Microsoft
Description :Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-0322
9.3
CVE-2019-8506 - Apple Multiple Products Type Confusion Vulnerability -
Action Due May 25, 2022 Target Vendor : Apple
Description :A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-8506
8.8
CVE-2021-1789 - Apple Multiple Products Type Confusion Vulnerability -
Action Due May 25, 2022 Target Vendor : Apple
Description :A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-1789
7.8
CVE-2014-4113 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due May 25, 2022 Target Vendor : Microsoft
Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4113
9.9
CVE-2019-1003029 - Jenkins Script Security Plugin Sandbox Bypass Vulnerability -
Action Due May 16, 2022 Target Vendor : Jenkins
Description :Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2019-1003029
7.8
CVE-2021-40450 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due May 16, 2022 Target Vendor : Microsoft
Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-40450
7.8
CVE-2022-0847 - Linux Kernel Privilege Escalation Vulnerability -
Action Due May 16, 2022 Target Vendor : Linux
Description :Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-0847
7.0
CVE-2022-21919 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -
Action Due May 16, 2022 Target Vendor : Microsoft
Description :Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-21919
7.8
CVE-2021-41357 - Microsoft Win32k Privilege Escalation Vulnerability -
Action Due May 16, 2022 Target Vendor : Microsoft
Description :Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2021-41357
7.0
CVE-2022-26904 - Microsoft Windows User Profile Service Privilege Escalation Vulnerability -
Action Due May 16, 2022 Target Vendor : Microsoft
Description :Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Unknown
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-26904
10.0
CVE-2022-29464 - WSO2 Multiple Products Unrestrictive Upload of File Vulnerability -
Action Due May 16, 2022 Target Vendor : WSO2
Description :Multiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.
Action :Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns? : Known Detected Apr 25, 2022
Notes :https://nvd.nist.gov/vuln/detail/CVE-2022-29464