CISA Known Exploited Vulnerabilities
1549
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1530
Overdue

Showing 50 of 1549 KEV entries

View official CISA catalog

CVE-2017-5070

8.8 ⚠️ OVERDUE

Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

linux apple microsoft +2
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5070

CVE-2018-4990

8.8 ⚠️ OVERDUE

Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.

apple adobe microsoft
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-4990

CVE-2018-17463

8.8 ⚠️ OVERDUE

Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

debian google redhat
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17463

CVE-2018-6065

8.8 ⚠️ OVERDUE

Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

debian google mi +1
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-6065

CVE-2018-17480

8.8 ⚠️ OVERDUE

Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

debian google redhat
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-17480

CVE-2019-5825

6.5 ⚠️ OVERDUE

Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-5825

CVE-2019-15271

8.8 ⚠️ OVERDUE

A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.

cisco
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-15271

CVE-2019-7192

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper access control vulnerability allows remote attackers to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7192

CVE-2019-7193

9.8 ⚠️ OVERDUE 💀 Ransomware

This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7193

CVE-2019-7194

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7194

CVE-2019-7195

9.8 ⚠️ OVERDUE 💀 Ransomware

This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.

qnap
Added to KEV
2022-06-08
Remediation Deadline
2022-06-22

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7195

CVE-2022-26134

9.8 ⚠️ OVERDUE 💀 Ransomware

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

atlassian
Added to KEV
2022-06-02
Remediation Deadline
2022-06-06

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-26134

CVE-2010-0840

9.8 ⚠️ OVERDUE

Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."

oracle canonical opensuse
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0840

CVE-2010-0738

5.3 ⚠️ OVERDUE 💀 Ransomware

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-0738

CVE-2010-1428

7.5 ⚠️ OVERDUE 💀 Ransomware

The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST methods, which allows remote attackers to obtain sensitive information via an unspecified request that uses a different method.

redhat
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1428

CVE-2012-1710

9.8 ⚠️ OVERDUE 💀 Ransomware

Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Designer, a different vulnerability than CVE-2012-1709.

oracle
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-1710

CVE-2013-0422

9.8 ⚠️ OVERDUE

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114. CVE-2013-0422 covers both the JMX/MBean and Reflection API issues. NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks. NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11. If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.

oracle canonical opensuse
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0422

CVE-2013-0431

5.3 ⚠️ OVERDUE 💀 Ransomware

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.

oracle
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0431

CVE-2013-0074

7.8 ⚠️ OVERDUE 💀 Ransomware

Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0074

CVE-2013-2423

3.7 ⚠️ OVERDUE

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.

oracle canonical opensuse
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-2423

CVE-2013-3896

5.5 ⚠️ OVERDUE

Microsoft Silverlight 5 before 5.1.20913.0 does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application, aka "Silverlight Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3896

CVE-2013-7331

6.5 ⚠️ OVERDUE

The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-7331

CVE-2014-3153

7.8 ⚠️ OVERDUE

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.

linux canonical oracle +3
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-3153

CVE-2013-3993

6.5 ⚠️ OVERDUE 💀 Ransomware

IBM InfoSphere BigInsights before 2.1.0.3 allows remote authenticated users to bypass intended file and directory restrictions, or access untrusted data or code, via crafted parameters in unspecified API calls.

ibm
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3993

CVE-2014-0546

9.8 ⚠️ OVERDUE

Adobe Reader and Acrobat 10.x before 10.1.11 and 11.x before 11.0.08 on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via unspecified vectors.

adobe microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-0546

CVE-2014-2817

8.8 ⚠️ OVERDUE

Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-2817

CVE-2014-4123

8.8 ⚠️ OVERDUE

Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-4123

CVE-2014-4148

8.8 ⚠️ OVERDUE

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted TrueType font, as exploited in the wild in October 2014, aka "TrueType Font Parsing Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-4148

CVE-2014-4077

7.8 ⚠️ OVERDUE

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-4077

CVE-2014-8439

8.8 ⚠️ OVERDUE

Adobe Flash Player before 13.0.0.258 and 14.x and 15.x before 15.0.0.239 on Windows and OS X and before 11.2.202.424 on Linux, Adobe AIR before 15.0.0.293, Adobe AIR SDK before 15.0.0.302, and Adobe AIR SDK & Compiler before 15.0.0.302 allow attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.

linux apple adobe +1
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-8439

CVE-2015-0016

7.8 ⚠️ OVERDUE

Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-0016

CVE-2015-0310

7.8 ⚠️ OVERDUE

Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015.

microsoft linux adobe +1
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-0310

CVE-2015-0071

6.5 ⚠️ OVERDUE

Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-0071

CVE-2015-1671

7.8 ⚠️ OVERDUE

The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-1671

CVE-2015-2360

8.8 ⚠️ OVERDUE

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-2360

CVE-2015-2425

8.8 ⚠️ OVERDUE

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384.

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-2425

CVE-2015-4495

8.8 ⚠️ OVERDUE

The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.

oracle canonical opensuse +3
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-4495

CVE-2015-1769

6.6 ⚠️ OVERDUE

Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-1769

CVE-2015-6175

7.8 ⚠️ OVERDUE

The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-6175

CVE-2015-8651

8.8 ⚠️ OVERDUE

Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.

linux apple opensuse +6
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-8651

CVE-2016-0034

8.8 ⚠️ OVERDUE 💀 Ransomware

Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-0034

CVE-2016-0984

8.8 ⚠️ OVERDUE

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.

linux apple microsoft +2
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-0984

CVE-2016-1010

8.8 ⚠️ OVERDUE

Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993.

linux apple microsoft +3
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-1010

CVE-2016-3393

7.8 ⚠️ OVERDUE

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component RCE Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-3393

CVE-2016-7256

8.8 ⚠️ OVERDUE

atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Open Type Font Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-7256

CVE-2019-3010

8.8 ⚠️ OVERDUE

Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

oracle
Added to KEV
2022-05-25
Remediation Deadline
2022-06-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-3010

CVE-2016-0162

4.3 ⚠️ OVERDUE

Microsoft Internet Explorer 9 through 11 allows remote attackers to determine the existence of files via crafted JavaScript code, aka "Internet Explorer Information Disclosure Vulnerability."

microsoft
Added to KEV
2022-05-24
Remediation Deadline
2022-06-14

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-0162

CVE-2016-6366

8.8 ⚠️ OVERDUE

Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.

cisco
Added to KEV
2022-05-24
Remediation Deadline
2022-06-14

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-6366

CVE-2016-6367

7.8 ⚠️ OVERDUE

Cisco Adaptive Security Appliance (ASA) Software before 8.4(1) on ASA 5500, ASA 5500-X, PIX, and FWSM devices allows local users to gain privileges via invalid CLI commands, aka Bug ID CSCtu74257 or EPICBANANA.

cisco
Added to KEV
2022-05-24
Remediation Deadline
2022-06-14

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-6367

CVE-2016-4655

5.5 ⚠️ OVERDUE

The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app.

apple
Added to KEV
2022-05-24
Remediation Deadline
2022-06-14

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-4655