CISA Known Exploited Vulnerabilities
1483
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1483 KEV entries

View official CISA catalog

CVE-2018-6961

8.1 ⚠️ OVERDUE

VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

vmware
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-6961

CVE-2018-8373

7.5 ⚠️ OVERDUE

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.

microsoft
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8373

CVE-2018-8414

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.

microsoft
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8414

CVE-2019-6340

8.1 ⚠️ OVERDUE

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

drupal
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-6340

CVE-2019-1003030

9.9 ⚠️ OVERDUE

A sandbox bypass vulnerability exists in Jenkins Pipeline: Groovy Plugin 2.63 and earlier in pom.xml, src/main/java/org/jenkinsci/plugins/workflow/cps/CpsGroovyShell.java that allows attackers able to control pipeline scripts to execute arbitrary code on the Jenkins master JVM.

redhat jenkins
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1003030

CVE-2019-10068

9.8 ⚠️ OVERDUE

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.

kentico
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-10068

CVE-2019-2616

7.2 ⚠️ OVERDUE

Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

oracle
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-2616

CVE-2018-14839

9.8 ⚠️ OVERDUE

LG N1A1 NAS 3718.510 is affected by: Remote Command Execution. The impact is: execute arbitrary code (remote). The attack vector is: HTTP POST with parameters.

lg
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-14839

CVE-2019-0903

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-0903

CVE-2019-12989

9.8 ⚠️ OVERDUE

Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 allow SQL Injection.

citrix
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-12989

CVE-2019-12991

8.8 ⚠️ OVERDUE

Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler SD-WAN 10.0.x before 10.0.8 have Improper Input Validation (issue 5 of 6).

citrix
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-12991

CVE-2019-15107

9.8 ⚠️ OVERDUE

An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.

webmin
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-15107

CVE-2019-16920

9.8 ⚠️ OVERDUE

Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a "PingTest" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.

dlink
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-16920

CVE-2019-11043

8.7 ⚠️ OVERDUE 💀 Ransomware

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

php redhat canonical +3
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-11043

CVE-2020-7247

9.8 ⚠️ OVERDUE

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

debian fedoraproject openbsd +1
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-7247

CVE-2020-9054

9.8 ⚠️ OVERDUE

Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2

zyxel
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9054

CVE-2016-11021

7.2 ⚠️ OVERDUE

setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.

dlink
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-11021

CVE-2020-1631

8.8 ⚠️ OVERDUE

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP) allows an unauthenticated attacker to perform local file inclusion (LFI) or path traversal. Using this vulnerability, an attacker may be able to inject commands into the httpd.log, read files with 'world' readable permission file or obtain J-Web session tokens. In the case of command injection, as the HTTP service runs as user 'nobody', the impact of this command injection is limited. (CVSS score 5.3, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) In the case of reading files with 'world' readable permission, in Junos OS 19.3R1 and above, the unauthenticated attacker would be able to read the configuration file. (CVSS score 5.9, vector CVSS:3.1/ AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) If J-Web is enabled, the attacker could gain the same level of access of anyone actively logged into J-Web. If an administrator is logged in, the attacker could gain administrator access to J-Web. (CVSS score 8.8, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled. Junos OS devices with HTTP/HTTPS services disabled are not affected. If HTTP/HTTPS services are enabled, the following command will show the httpd processes: user@device> show system processes | match http 5260 - S 0:00.13 /usr/sbin/httpd-gk -N 5797 - I 0:00.10 /usr/sbin/httpd --config /jail/var/etc/httpd.conf To summarize: If HTTP/HTTPS services are disabled, there is no impact from this vulnerability. If HTTP/HTTPS services are enabled and J-Web is not in use, this vulnerability has a CVSS score of 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). If J-Web is enabled, this vulnerability has a CVSS score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Juniper SIRT has received a single report of this vulnerability being exploited in the wild. Out of an abundance of caution, we are notifying customers so they can take appropriate actions. Indicators of Compromise: The /var/log/httpd.log may have indicators that commands have injected or files being accessed. The device administrator can look for these indicators by searching for the string patterns "=*;*&" or "*%3b*&" in /var/log/httpd.log, using the following command: user@device> show log httpd.log | match "=*;*&|=*%3b*&" If this command returns any output, it might be an indication of malicious attempts or simply scanning activities. Rotated logs should also be reviewed, using the following command: user@device> show log httpd.log.0.gz | match "=*;*&|=*%3b*&" user@device> show log httpd.log.1.gz | match "=*;*&|=*%3b*&" Note that a skilled attacker would likely remove these entries from the local log file, thus effectively eliminating any reliable signature that the device had been attacked. This issue affects Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D101, 12.3X48-D105; 14.1X53 versions prior to 14.1X53-D54; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D211, 15.1X49-D220; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R3-S2 ; 18.4 version 18.4R2 and later versions; 19.1 versions prior to 19.1R1-S5, 19.1R3-S1; 19.1 version 19.1R2 and later versions; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2; 20.1 versions prior to 20.1R1-S1, 20.1R2.

juniper
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1631

CVE-2020-1956

8.8 ⚠️ OVERDUE

Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.

apache
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-1956

CVE-2020-5410

7.5 ⚠️ OVERDUE

Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.

vmware
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-5410

CVE-2020-2021

10.0 ⚠️ OVERDUE 💀 Ransomware

When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability. This issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1. This issue cannot be exploited if SAML is not used for authentication. This issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile. Resources that can be protected by SAML-based single sign-on (SSO) authentication are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN, Authentication and Captive Portal, PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces, Prisma Access In the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N). In the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.

paloaltonetworks
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-2021

CVE-2020-9377

8.8 ⚠️ OVERDUE

D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

dlink
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-9377

CVE-2020-25223

9.8 ⚠️ OVERDUE

A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11

sophos
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-25223

CVE-2020-2506

7.3 ⚠️ OVERDUE

The vulnerability have been reported to affect earlier versions of QTS. If exploited, this improper access control vulnerability could allow attackers to compromise the security of the software by gaining privileges, or reading sensitive information. This issue affects: QNAP Systems Inc. Helpdesk versions prior to 3.0.3.

qnap
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-2506

CVE-2021-22941

9.8 ⚠️ OVERDUE 💀 Ransomware

Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.

citrix
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22941

CVE-2021-42237

9.8 ⚠️ OVERDUE 💀 Ransomware

Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.

sitecore
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-42237

CVE-2022-21999

7.8 ⚠️ OVERDUE 💀 Ransomware

Windows Print Spooler Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-21999

CVE-2022-26318

9.8 ⚠️ OVERDUE

On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka FBX-22786. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.

watchguard
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-26318

CVE-2022-26143

9.8 ⚠️ OVERDUE

The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.

mitel
Added to KEV
2022-03-25
Remediation Deadline
2022-04-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-26143

CVE-2015-2546

8.2 ⚠️ OVERDUE 💀 Ransomware

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-2546

CVE-2016-3309

7.8 ⚠️ OVERDUE 💀 Ransomware

The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3308, CVE-2016-3310, and CVE-2016-3311.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-3309

CVE-2017-0101

7.8 ⚠️ OVERDUE 💀 Ransomware

The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0101

CVE-2018-8120

7.0 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8120

CVE-2019-0543

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka "Microsoft Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-0543

CVE-2019-0841

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-0841

CVE-2019-1064

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1064

CVE-2019-1069

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1069

CVE-2019-1129

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1130.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1129

CVE-2019-1132

7.8 ⚠️ OVERDUE

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1132

CVE-2019-1253

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1253

CVE-2019-1315

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1315

CVE-2019-1322

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1322

CVE-2019-1405

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.

microsoft
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1405

CVE-2020-5135

9.8 ⚠️ OVERDUE

A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.

sonicwall
Added to KEV
2022-03-15
Remediation Deadline
2022-04-05

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-5135

CVE-2009-3960

6.5 ⚠️ OVERDUE 💀 Ransomware

Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, allows remote attackers to obtain sensitive information via vectors that are associated with a request, and related to injected tags and external entity references in XML documents.

adobe
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2009-3960

CVE-2013-0625

9.8 ⚠️ OVERDUE

Adobe ColdFusion 9.0, 9.0.1, and 9.0.2, when a password is not configured, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.

apple adobe microsoft +1
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0625

CVE-2013-0629

7.5 ⚠️ OVERDUE

Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10, when a password is not configured, allows attackers to access restricted directories via unspecified vectors, as exploited in the wild in January 2013.

apple adobe microsoft +1
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0629

CVE-2013-0631

7.5 ⚠️ OVERDUE

Adobe ColdFusion 9.0, 9.0.1, and 9.0.2 allows attackers to obtain sensitive information via unspecified vectors, as exploited in the wild in January 2013.

apple adobe microsoft +1
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-0631

CVE-2016-6277

8.8 ⚠️ OVERDUE

NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.

netgear
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-6277

CVE-2017-6077

9.8 ⚠️ OVERDUE

ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request.

netgear
Added to KEV
2022-03-07
Remediation Deadline
2022-09-07

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-6077