CISA Known Exploited Vulnerabilities
1484
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1484 KEV entries

View official CISA catalog

CVE-2019-8605

7.8 ⚠️ OVERDUE

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-8605

CVE-2020-3837

7.8 ⚠️ OVERDUE

A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-3837

CVE-2020-9907

7.8 ⚠️ OVERDUE

A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9907

CVE-2021-30533

6.5 ⚠️ OVERDUE

Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe.

google fedoraproject
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30533

CVE-2021-30983

7.8 ⚠️ OVERDUE

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.2 and iPadOS 15.2. An application may be able to execute arbitrary code with kernel privileges.

apple
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-30983

CVE-2021-4034

7.8 ⚠️ OVERDUE

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

redhat suse canonical +4
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-4034

CVE-2022-29499

9.8 ⚠️ OVERDUE 💀 Ransomware

The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.

mitel
Added to KEV
2022-06-27
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-29499

CVE-2022-30190

7.8 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user’s rights. Please see the MSRC Blog Entry for important information about steps you can take to protect your system from this vulnerability.

microsoft
Added to KEV
2022-06-14
Remediation Deadline
2022-07-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-30190

CVE-2016-2386

9.8 ⚠️ OVERDUE

SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-2386

CVE-2016-2388

5.3 ⚠️ OVERDUE

The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-2388

CVE-2021-38163

9.9 ⚠️ OVERDUE

SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.

sap
Added to KEV
2022-06-09
Remediation Deadline
2022-06-30

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-38163

CVE-2006-2492

8.8 ⚠️ OVERDUE

Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object pointer, as originally reported by ISC on 20060519 for a zero-day attack.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2006-2492

CVE-2008-0655

9.8 ⚠️ OVERDUE

Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2008-0655

CVE-2007-5659

7.8 ⚠️ OVERDUE

Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2007-5659

CVE-2009-0563

7.8 ⚠️ OVERDUE

Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-0563

CVE-2009-0557

7.8 ⚠️ OVERDUE

Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-0557

CVE-2009-1862

7.8 ⚠️ OVERDUE

Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-1862

CVE-2009-4324

7.8 ⚠️ OVERDUE

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-4324

CVE-2009-3953

8.8 ⚠️ OVERDUE

The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-3953

CVE-2010-1297

7.8 ⚠️ OVERDUE

Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1297

CVE-2010-2883

7.3 ⚠️ OVERDUE

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

apple adobe microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-2883

CVE-2010-2572

7.8 ⚠️ OVERDUE

Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka "PowerPoint Parsing Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-2572

CVE-2011-0609

7.8 ⚠️ OVERDUE

Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.

apple suse microsoft +5
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2011-0609

CVE-2011-2462

9.8 ⚠️ OVERDUE

Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.

apple adobe opengroup +1
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2011-2462

CVE-2012-0754

8.1 ⚠️ OVERDUE

Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

apple microsoft google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0754

CVE-2012-0767

6.1 ⚠️ OVERDUE

Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)," as exploited in the wild in February 2012.

apple microsoft google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0767

CVE-2012-0151

7.8 ⚠️ OVERDUE

The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0151

CVE-2012-1889

8.8 ⚠️ OVERDUE

Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-1889

CVE-2012-4969

8.1 ⚠️ OVERDUE

Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-4969

CVE-2012-5054

8.8 ⚠️ OVERDUE

Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-5054

CVE-2013-1331

7.8 ⚠️ OVERDUE

Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-1331

CVE-2016-1646

8.8 ⚠️ OVERDUE

The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.

redhat suse google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-1646

CVE-2016-5198

8.8 ⚠️ OVERDUE

V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.

redhat apple google +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-5198

CVE-2017-5030

8.8 ⚠️ OVERDUE

Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.

redhat apple google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5030

CVE-2017-6862

9.8 ⚠️ OVERDUE

NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261.

netgear
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-6862

CVE-2017-5070

8.8 ⚠️ OVERDUE

Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat apple google +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5070

CVE-2018-4990

8.8 ⚠️ OVERDUE

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

apple adobe microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-4990

CVE-2018-17463

8.8 ⚠️ OVERDUE

Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat google debian
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17463

CVE-2018-6065

8.8 ⚠️ OVERDUE

Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

redhat google mi +1
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-6065

CVE-2018-17480

8.8 ⚠️ OVERDUE

Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat google debian
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17480

CVE-2019-5825

6.5 ⚠️ OVERDUE

Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-5825

CVE-2019-15271

8.8 ⚠️ OVERDUE

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

cisco
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-15271

CVE-2019-7192

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7192

CVE-2019-7193

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7193

CVE-2019-7194

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7194

CVE-2019-7195

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7195

CVE-2022-26134

9.8 ⚠️ OVERDUE 💀 Ransomware

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

atlassian
Added to KEV
2022-06-02
Remediation Deadline
2022-06-06

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-26134

CVE-2010-0840

9.8 ⚠️ OVERDUE

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

oracle opensuse canonical
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0840

CVE-2010-0738

5.3 ⚠️ OVERDUE 💀 Ransomware

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0738

CVE-2010-1428

7.5 ⚠️ OVERDUE 💀 Ransomware

The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1428