CISA Known Exploited Vulnerabilities (KEV)

CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilities actively used in real-world attacks. CVEFeed.io tracks the latest additions so you can prioritize remediation as new entries are published.

    9.3

    HIGH
    CVE-2016-7193 - Microsoft Office Memory Corruption Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains a memory corruption vulnerability which can allow for remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-7193

    Alert Date: Mar 03, 2022 | 1468 days ago

    7.2

    HIGH
    CVE-2016-5195 - Linux Kernel Race Condition Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Linux

    Description :Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-5195

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2016-4117 - Adobe Flash Player Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :An access of resource using incompatible type vulnerability exists within Adobe Flash Player that allows an attacker to perform remote code execution.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-4117

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2016-1019 - Adobe Flash Player Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player allows remote attackers to cause a denial of service or possibly execute arbitrary code.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known Detected Mar 03, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-1019

    Alert Date: Mar 03, 2022 | 1468 days ago

    7.8

    HIGH
    CVE-2016-0099 - Microsoft Windows Secondary Logon Service Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :A privilege escalation vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Mar 03, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2016-0099

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2015-7645 - Adobe Flash Player Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Known Detected Feb 26, 2026

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-7645

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2015-5119 - Adobe Flash Player Use-After-Free Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :A use-after-free vulnerability exists within the ActionScript 3 ByteArray class in Adobe Flash Player that allows an attacker to perform remote code execution.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-5119

    Alert Date: Mar 03, 2022 | 1468 days ago

    5.3

    MEDIUM
    CVE-2015-4902 - Oracle Java SE Integrity Check Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description :Unspecified vulnerability in Oracle Java SE allows remote attackers to affect integrity via Unknown vectors related to deployment.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-4902

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2015-2545 - Microsoft Office Malformed EPS File Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-2545

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2015-1642 - Microsoft Office Memory Corruption Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :Microsoft Office contains a memory corruption vulnerability that allows remote attackers to execute arbitrary code via a crafted document.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2015-1642

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2014-4114 - Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2014-4114

    Alert Date: Mar 03, 2022 | 1468 days ago

    7.8

    HIGH
    CVE-2013-5065 - Microsoft Windows Kernel Privilege Escalation Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :Microsoft Windows NDProxy.sys in the kernel contains an improper input validation vulnerability which can allow a local attacker to escalate privileges.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-5065

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2013-3897 - Microsoft Internet Explorer Use-After-Free Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :A use-after-free vulnerability exists within CDisplayPointer in Microsoft Internet Explorer that allows an attacker to remotely execute arbitrary code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3897

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2013-3346 - Adobe Reader and Acrobat Memory Corruption Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :Adobe Reader and Acrobat contain a memory corruption vulnerability which can allow attackers to execute arbitrary code or cause a denial of service.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-3346

    Alert Date: Mar 03, 2022 | 1468 days ago

    6.5

    MEDIUM
    CVE-2013-1675 - Mozilla Firefox Information Disclosure Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Mozilla

    Description :Mozilla Firefox does not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-1675

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2013-1347 - Microsoft Internet Explorer Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :This vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2013-1347

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2012-0507 - Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Oracle

    Description :An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known Detected Mar 03, 2022

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2012-0507

    Alert Date: Mar 03, 2022 | 1468 days ago

    10.0

    HIGH
    CVE-2011-1889 - Microsoft Forefront TMG Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2011-1889

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2011-0611 - Adobe Flash Player Remote Code Execution Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Adobe

    Description :Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.

    Action :The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2011-0611

    Alert Date: Mar 03, 2022 | 1468 days ago

    9.3

    HIGH
    CVE-2010-3333 - Microsoft Office Stack-based Buffer Overflow Vulnerability -

    Action Due Mar 24, 2022 Target Vendor : Microsoft

    Description :A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.

    Action :Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes :https://nvd.nist.gov/vuln/detail/CVE-2010-3333

    Alert Date: Mar 03, 2022 | 1468 days ago
Showing 20 of 1543 Results

Filters