CISA Known Exploited Vulnerabilities
1484
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1472 KEV entries

View official CISA catalog

CVE-2011-1823

7.8 ⚠️ OVERDUE

The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.

google
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823

CVE-2011-4723

5.7 ⚠️ OVERDUE

The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.

dlink
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723

CVE-2017-5521

8.1 ⚠️ OVERDUE

An issue was discovered on NETGEAR R8500, R8300, R7000, R6400, R7300, R7100LG, R6300v2, WNDR3400v3, WNR3500Lv2, R6250, R6700, R6900, and R8000 devices. They are prone to password disclosure via simple crafted requests to the web management server. The bug is exploitable remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When trying to access the web panel, a user is asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token. If a user supplies the correct token to the page /passwordrecovered.cgi?id=TOKEN (and password recovery is not enabled), they will receive the admin password for the router. If password recovery is set the exploit will fail, as it will ask the user for the recovery questions that were previously set when enabling that feature. This is persistent (even after disabling the recovery option, the exploit will fail) because the router will ask for the security questions.

netgear
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2017-5521

CVE-2018-6530

9.8 ⚠️ OVERDUE 💀 Ransomware

OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.

dlink
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10105; https://nvd.nist.gov/vuln/detail/CVE-2018-6530

CVE-2018-7445

9.8 ⚠️ OVERDUE

A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.

mikrotik
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://www.coresecurity.com/core-labs/advisories/mikrotik-routeros-smb-buffer-overflow#vendor_update, https://mikrotik.com/download; https://nvd.nist.gov/vuln/detail/CVE-2018-7445

CVE-2018-2628

9.8 ⚠️ OVERDUE

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

oracle
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://www.oracle.com/security-alerts/cpuapr2018.html; https://nvd.nist.gov/vuln/detail/CVE-2018-2628

CVE-2018-13374

4.3 ⚠️ OVERDUE 💀 Ransomware

A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4 allows attacker to obtain the LDAP server login credentials configured in FortiGate via pointing a LDAP server connectivity test request to a rogue LDAP server instead of the configured one.

fortinet
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://www.fortiguard.com/psirt/FG-IR-18-157; https://nvd.nist.gov/vuln/detail/CVE-2018-13374

CVE-2020-9934

5.5 ⚠️ OVERDUE

An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A local user may be able to view sensitive user information.

apple
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://support.apple.com/en-us/HT211288, https://support.apple.com/en-us/HT211289; https://nvd.nist.gov/vuln/detail/CVE-2020-9934

CVE-2022-26258

9.8 ⚠️ OVERDUE

D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.

dlink
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10295; https://nvd.nist.gov/vuln/detail/CVE-2022-26258

CVE-2022-27593

10.0 ⚠️ OVERDUE 💀 Ransomware

An externally controlled reference to a resource vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, This could allow an attacker to modify system files. We have already fixed the vulnerability in the following versions: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later

qnap
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://www.qnap.com/en/security-advisory/qsa-22-24; https://nvd.nist.gov/vuln/detail/CVE-2022-27593

CVE-2022-3075

9.6 ⚠️ OVERDUE

Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

google fedoraproject
Added to KEV
2022-09-08
Remediation Deadline
2022-09-29

Notes: https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html, https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-3075; https://nvd.nist.gov/vuln/detail/CVE-2022-3075

CVE-2020-28949

7.8 ⚠️ OVERDUE

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed.

debian drupal fedoraproject +1
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://pear.php.net/bugs/bug.php?id=27002, https://www.drupal.org/sa-core-2020-013, https://access.redhat.com/security/cve/cve-2020-28949; https://nvd.nist.gov/vuln/detail/CVE-2020-28949

CVE-2020-36193

7.5 ⚠️ OVERDUE

Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.

debian drupal fedoraproject +1
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916, https://www.drupal.org/sa-core-2021-001, https://access.redhat.com/security/cve/cve-2020-36193; https://nvd.nist.gov/vuln/detail/CVE-2020-36193

CVE-2021-31010

7.5 ⚠️ OVERDUE

A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release..

apple
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://support.apple.com/en-us/HT212804, https://support.apple.com/en-us/HT212805, https://support.apple.com/en-us/HT212806, https://support.apple.com/en-us/HT212807, https://support.apple.com/en-us/HT212824; https://nvd.nist.gov/vuln/detail/CVE-2021-31010

CVE-2021-38406

7.8 ⚠️ OVERDUE

Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.

deltaww
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-02; https://nvd.nist.gov/vuln/detail/CVE-2021-38406

CVE-2021-39226

9.8 ⚠️ OVERDUE

Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot "public_mode" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot "public_mode" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.

grafana fedoraproject
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://grafana.com/blog/2021/10/05/grafana-7.5.11-and-8.1.6-released-with-critical-security-fix/; https://nvd.nist.gov/vuln/detail/CVE-2021-39226

CVE-2022-24112

9.8 ⚠️ OVERDUE

An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.

apache
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94; https://nvd.nist.gov/vuln/detail/CVE-2022-24112

CVE-2022-22963

9.8 ⚠️ OVERDUE

In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

oracle vmware
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://tanzu.vmware.com/security/cve-2022-22963; https://nvd.nist.gov/vuln/detail/CVE-2022-22963

CVE-2022-24706

9.8 ⚠️ OVERDUE

In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.

apache
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00; https://nvd.nist.gov/vuln/detail/CVE-2022-24706

CVE-2022-26352

9.8 ⚠️ OVERDUE 💀 Ransomware

An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.

dotcms
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://www.dotcms.com/security/SI-62; https://nvd.nist.gov/vuln/detail/CVE-2022-26352

CVE-2022-2294

8.8 ⚠️ OVERDUE 💀 Ransomware

Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

apple webkitgtk google +3
Added to KEV
2022-08-25
Remediation Deadline
2022-09-15

Notes: https://groups.google.com/g/discuss-webrtc/c/5KBtZx2gvcQ; https://nvd.nist.gov/vuln/detail/CVE-2022-2294

CVE-2022-0028

8.6 ⚠️ OVERDUE

A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.

paloaltonetworks
Added to KEV
2022-08-22
Remediation Deadline
2022-09-12

Notes: https://security.paloaltonetworks.com/CVE-2022-0028; https://nvd.nist.gov/vuln/detail/CVE-2022-0028

CVE-2017-15944

9.8 ⚠️ OVERDUE

Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.

paloaltonetworks
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://security.paloaltonetworks.com/CVE-2017-15944; https://nvd.nist.gov/vuln/detail/CVE-2017-15944

CVE-2022-21971

7.8 ⚠️ OVERDUE

Windows Runtime Remote Code Execution Vulnerability

microsoft
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21971; https://nvd.nist.gov/vuln/detail/CVE-2022-21971

CVE-2022-22536

10.0 ⚠️ OVERDUE

SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

sap
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: SAP users must have an account in order to login and access the patch. https://accounts.sap.com/saml2/idp/sso; https://nvd.nist.gov/vuln/detail/CVE-2022-22536

CVE-2022-26923

8.8 ⚠️ OVERDUE

Active Directory Domain Services Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923; https://nvd.nist.gov/vuln/detail/CVE-2022-26923

CVE-2022-32893

8.8 ⚠️ OVERDUE

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

apple webkitgtk fedoraproject +2
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32893

CVE-2022-32894

7.8 ⚠️ OVERDUE

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

apple
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://support.apple.com/en-gb/HT213412, https://support.apple.com/en-gb/HT213413; https://nvd.nist.gov/vuln/detail/CVE-2022-32894

CVE-2022-2856

6.5 ⚠️ OVERDUE

Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 104.0.5112.101 allowed a remote attacker to arbitrarily browse to a malicious website via a crafted HTML page.

apple google microsoft +2
Added to KEV
2022-08-18
Remediation Deadline
2022-09-08

Notes: https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_16.html; https://nvd.nist.gov/vuln/detail/CVE-2022-2856

CVE-2022-27925

7.2 ⚠️ OVERDUE 💀 Ransomware

Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.

synacor
Added to KEV
2022-08-11
Remediation Deadline
2022-09-01

Notes: https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-27925

CVE-2022-37042

9.8 ⚠️ OVERDUE 💀 Ransomware

Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.

synacor
Added to KEV
2022-08-11
Remediation Deadline
2022-09-01

Notes: https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/; https://nvd.nist.gov/vuln/detail/CVE-2022-37042

CVE-2022-30333

7.5 ⚠️ OVERDUE 💀 Ransomware

RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.

debian rarlab opengroup +1
Added to KEV
2022-08-09
Remediation Deadline
2022-08-30

Notes: Vulnerability updated with version 6.12. Accessing link will download update information: https://www.rarlab.com/rar/rarlinux-x32-612.tar.gz; https://nvd.nist.gov/vuln/detail/CVE-2022-30333

CVE-2022-34713

7.8 ⚠️ OVERDUE

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

microsoft
Added to KEV
2022-08-09
Remediation Deadline
2022-08-30

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713; https://nvd.nist.gov/vuln/detail/CVE-2022-34713

CVE-2022-27924

7.5 ⚠️ OVERDUE 💀 Ransomware

Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 allows an unauthenticated attacker to inject arbitrary memcache commands into a targeted instance. These memcache commands becomes unescaped, causing an overwrite of arbitrary cached entries.

synacor
Added to KEV
2022-08-04
Remediation Deadline
2022-08-25

Notes: https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24.1#Security_Fixes; https://nvd.nist.gov/vuln/detail/CVE-2022-27924

CVE-2022-26138

9.8 ⚠️ OVERDUE

The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.

atlassian
Added to KEV
2022-07-29
Remediation Deadline
2022-08-19

Notes: https://confluence.atlassian.com/doc/questions-for-confluence-security-advisory-2022-07-20-1142446709.html; https://nvd.nist.gov/vuln/detail/CVE-2022-26138

CVE-2022-22047

7.8 ⚠️ OVERDUE

Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-07-12
Remediation Deadline
2022-08-02

Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22047; https://nvd.nist.gov/vuln/detail/CVE-2022-22047

CVE-2022-26925

8.1 ⚠️ OVERDUE

Windows LSA Spoofing Vulnerability

microsoft
Added to KEV
2022-07-01
Remediation Deadline
2022-07-22

Notes: WARNING: This update is required on all Microsoft Windows endpoints but if deployed to domain controllers without additional configuration changes the update breaks PIV/CAC authentication. Read CISA implementation guidance carefully before deploying to domain controllers.; https://nvd.nist.gov/vuln/detail/CVE-2022-26925

CVE-2018-4344

7.8 ⚠️ OVERDUE

A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-4344

CVE-2019-8605

7.8 ⚠️ OVERDUE

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-8605

CVE-2020-3837

7.8 ⚠️ OVERDUE

A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3837

CVE-2020-9907

7.8 ⚠️ OVERDUE

A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9907

CVE-2021-30533

6.5 ⚠️ OVERDUE

Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.

google fedoraproject
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30533

CVE-2021-30983

7.8 ⚠️ OVERDUE

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.2 and iPadOS 15.2. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30983

CVE-2021-4034

7.8 ⚠️ OVERDUE

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

redhat suse canonical +4
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-4034

CVE-2022-29499

9.8 ⚠️ OVERDUE 💀 Ransomware

The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.

mitel
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-29499

CVE-2022-30190

7.8 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.

microsoft
Added to KEV
2022-06-14
Remediation Deadline
2022-07-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-30190

CVE-2016-2386

9.8 ⚠️ OVERDUE

SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-2386

CVE-2016-2388

5.3 ⚠️ OVERDUE

The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-2388

CVE-2021-38163

9.9 ⚠️ OVERDUE

SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-38163

CVE-2006-2492

8.8 ⚠️ OVERDUE

Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2006-2492