CISA Known Exploited Vulnerabilities
1483
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1472
Overdue

Showing 50 of 1483 KEV entries

View official CISA catalog

CVE-2014-6352

7.8 ⚠️ OVERDUE

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-6352

CVE-2017-0222

8.8 ⚠️ OVERDUE

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0222

CVE-2017-8570

7.8 ⚠️ OVERDUE

Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.

microsoft
Added to KEV
2022-02-25
Remediation Deadline
2022-08-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-8570

CVE-2022-24682

6.1 ⚠️ OVERDUE 💀 Ransomware

An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.

synacor
Added to KEV
2022-02-25
Remediation Deadline
2022-03-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-24682

CVE-2022-23131

9.1 ⚠️ OVERDUE

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

zabbix
Added to KEV
2022-02-22
Remediation Deadline
2022-03-08

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-23131

CVE-2022-23134

3.7 ⚠️ OVERDUE

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

zabbix fedoraproject debian
Added to KEV
2022-02-22
Remediation Deadline
2022-03-08

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-23134

CVE-2013-3906

7.8 ⚠️ OVERDUE

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3906

CVE-2014-1761

7.8 ⚠️ OVERDUE

Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-1761

CVE-2017-9841

9.8 ⚠️ OVERDUE

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

phpunit_project oracle
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-9841

CVE-2018-8174

7.5 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8174

CVE-2018-15982

7.8 ⚠️ OVERDUE 💀 Ransomware

Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.

redhat adobe linux +3
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-15982

CVE-2018-20250

7.8 ⚠️ OVERDUE 💀 Ransomware

In WinRAR versions prior to and including 5.61, There is path traversal vulnerability when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path.

rarlab
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-20250

CVE-2019-0752

7.5 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0739, CVE-2019-0753, CVE-2019-0862.

microsoft
Added to KEV
2022-02-15
Remediation Deadline
2022-08-15

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-0752

CVE-2022-24086

9.8 ⚠️ OVERDUE

Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.

adobe
Added to KEV
2022-02-15
Remediation Deadline
2022-03-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-24086

CVE-2022-0609

8.8 ⚠️ OVERDUE

Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google
Added to KEV
2022-02-15
Remediation Deadline
2022-03-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-0609

CVE-2022-22620

8.8 ⚠️ OVERDUE

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..

apple
Added to KEV
2022-02-11
Remediation Deadline
2022-02-25

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-22620

CVE-2014-4404

7.8 ⚠️ OVERDUE

Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 allows attackers to execute arbitrary code in a privileged context via an application that provides crafted key-mapping properties.

apple
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-4404

CVE-2015-2051

9.8 ⚠️ OVERDUE

The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.

dlink
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-2051

CVE-2015-1130

7.8 ⚠️ OVERDUE

The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.

apple
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-1130

CVE-2015-1635

9.8 ⚠️ OVERDUE

HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-1635

CVE-2016-3088

9.8 ⚠️ OVERDUE

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

apache
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-3088

CVE-2017-0144

8.8 ⚠️ OVERDUE 💀 Ransomware

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148.

siemens microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0144

CVE-2017-0145

8.8 ⚠️ OVERDUE 💀 Ransomware

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.

siemens microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0145

CVE-2017-0262

7.8 ⚠️ OVERDUE

Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0262

CVE-2017-0263

7.8 ⚠️ OVERDUE

The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-0263

CVE-2017-8464

8.8 ⚠️ OVERDUE

Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-8464

CVE-2017-9791

9.8 ⚠️ OVERDUE

The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.

apache
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-9791

CVE-2017-10271

7.5 ⚠️ OVERDUE 💀 Ransomware

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

oracle
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-10271

CVE-2018-1000861

9.8 ⚠️ OVERDUE

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

redhat jenkins
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-1000861

CVE-2020-0796

10.0 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0796

CVE-2021-36934

7.8 ⚠️ OVERDUE

<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p>

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-02-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-36934

CVE-2022-21882

7.0 ⚠️ OVERDUE

Win32k Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-02-04
Remediation Deadline
2022-02-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-21882

CVE-2014-1776

9.8 ⚠️ OVERDUE

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."

microsoft
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776

CVE-2014-6271

9.8 ⚠️ OVERDUE

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

suse redhat canonical +14
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-6271

CVE-2014-7169

9.8 ⚠️ OVERDUE

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

suse redhat canonical +14
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-7169

CVE-2017-5689

9.8 ⚠️ OVERDUE

An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).

intel hpe siemens
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5689

CVE-2020-0787

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.

microsoft
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0787

CVE-2020-5722

9.8 ⚠️ OVERDUE

The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.

grandstream
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-5722

CVE-2021-20038

9.8 ⚠️ OVERDUE 💀 Ransomware

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.

sonicwall
Added to KEV
2022-01-28
Remediation Deadline
2022-02-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20038

CVE-2022-22587

9.8 ⚠️ OVERDUE

A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..

apple
Added to KEV
2022-01-28
Remediation Deadline
2022-02-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-22587

CVE-2006-1547

7.5 ⚠️ OVERDUE

ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.

apache
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2006-1547

CVE-2012-0391

9.8 ⚠️ OVERDUE

The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.

apache
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0391

CVE-2018-8453

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

microsoft
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8453

CVE-2021-35247

4.3 ⚠️ OVERDUE

Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.

solarwinds
Added to KEV
2022-01-21
Remediation Deadline
2022-02-04

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-35247

CVE-2020-11978

8.8 ⚠️ OVERDUE

An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.

apache
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-11978

CVE-2020-14864

7.5 ⚠️ OVERDUE

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

oracle
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14864

CVE-2020-13927

9.8 ⚠️ OVERDUE

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

apache
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-13927

CVE-2020-13671

8.8 ⚠️ OVERDUE

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.

fedoraproject drupal
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-13671

CVE-2021-25296

8.8 ⚠️ OVERDUE

Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

nagios
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-25296

CVE-2021-25297

8.8 ⚠️ OVERDUE

Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

nagios
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-25297