CISA Known Exploited Vulnerabilities
1484
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1472 KEV entries

View official CISA catalog

CVE-2008-0655

9.8 ⚠️ OVERDUE

Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2008-0655

CVE-2007-5659

7.8 ⚠️ OVERDUE

Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2007-5659

CVE-2009-0563

7.8 ⚠️ OVERDUE

Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-0563

CVE-2009-0557

7.8 ⚠️ OVERDUE

Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-0557

CVE-2009-1862

7.8 ⚠️ OVERDUE

Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via (1) a crafted Flash application in a .pdf file or (2) a crafted .swf file, related to authplay.dll, as exploited in the wild in July 2009.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-1862

CVE-2009-4324

7.8 ⚠️ OVERDUE

Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-4324

CVE-2009-3953

8.8 ⚠️ OVERDUE

The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF document, related to a CLODProgressiveMeshDeclaration "array boundary issue," a different vulnerability than CVE-2009-2994.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-3953

CVE-2010-1297

7.8 ⚠️ OVERDUE

Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.

apple suse microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1297

CVE-2010-2883

7.3 ⚠️ OVERDUE

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.

apple adobe microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-2883

CVE-2010-2572

7.8 ⚠️ OVERDUE

Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka "PowerPoint Parsing Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-2572

CVE-2011-0609

7.8 ⚠️ OVERDUE

Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.

apple suse microsoft +5
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2011-0609

CVE-2011-2462

9.8 ⚠️ OVERDUE

Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.

apple adobe opengroup +1
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2011-2462

CVE-2012-0754

8.1 ⚠️ OVERDUE

Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

apple microsoft google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0754

CVE-2012-0767

6.1 ⚠️ OVERDUE

Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)," as exploited in the wild in February 2012.

apple microsoft google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0767

CVE-2012-0151

7.8 ⚠️ OVERDUE

The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0151

CVE-2012-1889

8.8 ⚠️ OVERDUE

Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-1889

CVE-2012-4969

8.1 ⚠️ OVERDUE

Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-4969

CVE-2012-5054

8.8 ⚠️ OVERDUE

Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments.

adobe
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-5054

CVE-2013-1331

7.8 ⚠️ OVERDUE

Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote attackers to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."

microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-1331

CVE-2016-1646

8.8 ⚠️ OVERDUE

The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.

redhat suse google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-1646

CVE-2016-5198

8.8 ⚠️ OVERDUE

V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.

redhat apple google +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-5198

CVE-2017-5030

8.8 ⚠️ OVERDUE

Incorrect handling of complex species in V8 in Google Chrome prior to 57.0.2987.98 for Linux, Windows, and Mac and 57.0.2987.108 for Android allowed a remote attacker to execute arbitrary code via a crafted HTML page.

redhat apple google +3
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5030

CVE-2017-6862

9.8 ⚠️ OVERDUE

NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, and WNR2000v5 devices before 1.0.0.42 allow authentication bypass and remote code execution via a buffer overflow that uses a parameter in the administration webapp. The NETGEAR ID is PSV-2016-0261.

netgear
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-6862

CVE-2017-5070

8.8 ⚠️ OVERDUE

Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat apple google +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5070

CVE-2018-4990

8.8 ⚠️ OVERDUE

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

apple adobe microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-4990

CVE-2018-17463

8.8 ⚠️ OVERDUE

Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat google debian
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17463

CVE-2018-6065

8.8 ⚠️ OVERDUE

Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

redhat google mi +1
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-6065

CVE-2018-17480

8.8 ⚠️ OVERDUE

Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

redhat google debian
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17480

CVE-2019-5825

6.5 ⚠️ OVERDUE

Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-5825

CVE-2019-15271

8.8 ⚠️ OVERDUE

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

cisco
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-15271

CVE-2019-7192

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7192

CVE-2019-7193

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7193

CVE-2019-7194

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7194

CVE-2019-7195

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7195

CVE-2022-26134

9.8 ⚠️ OVERDUE 💀 Ransomware

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

atlassian
Added to KEV
2022-06-02
Remediation Deadline
2022-06-06

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-26134

CVE-2010-0840

9.8 ⚠️ OVERDUE

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

oracle opensuse canonical
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0840

CVE-2010-0738

5.3 ⚠️ OVERDUE 💀 Ransomware

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0738

CVE-2010-1428

7.5 ⚠️ OVERDUE 💀 Ransomware

The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1428

CVE-2012-1710

9.8 ⚠️ OVERDUE 💀 Ransomware

Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Designer, a different vulnerability than CVE-2012-1709.

oracle
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-1710

CVE-2013-0422

9.8 ⚠️ OVERDUE

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

oracle opensuse canonical
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0422

CVE-2013-0431

5.3 ⚠️ OVERDUE 💀 Ransomware

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.

oracle
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0431

CVE-2013-0074

7.8 ⚠️ OVERDUE 💀 Ransomware

Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0074

CVE-2013-2423

3.7 ⚠️ OVERDUE

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.

oracle opensuse canonical
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-2423

CVE-2013-3896

5.5 ⚠️ OVERDUE

Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3896

CVE-2013-7331

6.5 ⚠️ OVERDUE

The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-7331

CVE-2014-3153

7.8 ⚠️ OVERDUE

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.

redhat suse opensuse +3
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-3153

CVE-2013-3993

6.5 ⚠️ OVERDUE 💀 Ransomware

IBM InfoSphere BigInsights before 2.1.0.3 allows remote authenticated users to bypass intended file and directory restrictions, or access untrusted data or code, via crafted parameters in unspecified API calls.

ibm
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3993

CVE-2014-0546

9.8 ⚠️ OVERDUE

Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors.

adobe microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-0546

CVE-2014-2817

8.8 ⚠️ OVERDUE

Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-2817

CVE-2014-4123

8.8 ⚠️ OVERDUE

Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-4123