CISA Known Exploited Vulnerabilities
1568
Total KEV

Known Exploited Vulnerabilities

Track actively exploited CVEs from the CISA catalog with remediation deadlines

1558
Overdue

Showing 50 of 1558 KEV entries

View official CISA catalog

CVE-2017-8464

8.8 ⚠️ OVERDUE

Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-8464

CVE-2017-9791

9.8 ⚠️ OVERDUE

The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.

apache
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-9791

CVE-2017-10271

7.5 ⚠️ OVERDUE 💀 Ransomware

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

oracle
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-10271

CVE-2018-1000861

9.8 ⚠️ OVERDUE

A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.

jenkins redhat
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-1000861

CVE-2020-0796

10.0 ⚠️ OVERDUE 💀 Ransomware

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-08-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0796

CVE-2021-36934

7.8 ⚠️ OVERDUE

<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p>

microsoft
Added to KEV
2022-02-10
Remediation Deadline
2022-02-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-36934

CVE-2022-21882

7.0 ⚠️ OVERDUE

Win32k Elevation of Privilege Vulnerability

microsoft
Added to KEV
2022-02-04
Remediation Deadline
2022-02-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-21882

CVE-2014-1776

9.8 ⚠️ OVERDUE

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."

microsoft
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776

CVE-2014-6271

9.8 ⚠️ OVERDUE

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

oracle gnu canonical +14
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-6271

CVE-2014-7169

9.8 ⚠️ OVERDUE

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

oracle gnu canonical +14
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-7169

CVE-2017-5689

9.8 ⚠️ OVERDUE

An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).

hpe siemens intel
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-5689

CVE-2020-0787

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.

microsoft
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-0787

CVE-2020-5722

9.8 ⚠️ OVERDUE

The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.

grandstream
Added to KEV
2022-01-28
Remediation Deadline
2022-07-28

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-5722

CVE-2021-20038

9.8 ⚠️ OVERDUE 💀 Ransomware

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.

sonicwall
Added to KEV
2022-01-28
Remediation Deadline
2022-02-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-20038

CVE-2022-22587

9.8 ⚠️ OVERDUE

A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, macOS Big Sur 11.6.3, macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..

apple
Added to KEV
2022-01-28
Remediation Deadline
2022-02-11

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-22587

CVE-2006-1547

7.5 ⚠️ OVERDUE

ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.

apache
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2006-1547

CVE-2012-0391

9.8 ⚠️ OVERDUE

The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.

apache
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2012-0391

CVE-2018-8453

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

microsoft
Added to KEV
2022-01-21
Remediation Deadline
2022-07-21

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-8453

CVE-2021-35247

4.3 ⚠️ OVERDUE

Serv-U web login screen to LDAP authentication was allowing characters that were not sufficiently sanitized. SolarWinds has updated the input mechanism to perform additional validation and sanitization. Please Note: No downstream affect has been detected as the LDAP servers ignored improper characters. To insure proper input validation is completed in all environments. SolarWinds recommends scheduling an update to the latest version of Serv-U.

solarwinds
Added to KEV
2022-01-21
Remediation Deadline
2022-02-04

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-35247

CVE-2020-11978

8.8 ⚠️ OVERDUE

An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.

apache
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-11978

CVE-2020-14864

7.5 ⚠️ OVERDUE

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Installation). Supported versions that are affected are 5.5.0.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

oracle
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-14864

CVE-2020-13927

9.8 ⚠️ OVERDUE

The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default

apache
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-13927

CVE-2020-13671

8.8 ⚠️ OVERDUE

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.

drupal fedoraproject
Added to KEV
2022-01-18
Remediation Deadline
2022-07-18

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-13671

CVE-2021-25296

8.8 ⚠️ OVERDUE

Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

nagios
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-25296

CVE-2021-25297

8.8 ⚠️ OVERDUE

Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

nagios
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-25297

CVE-2021-25298

8.8 ⚠️ OVERDUE

Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

nagios
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-25298

CVE-2021-21315

7.1 ⚠️ OVERDUE

The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

systeminformation apache
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21315

CVE-2021-21975

7.5 ⚠️ OVERDUE 💀 Ransomware

Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.

vmware
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-21975

CVE-2021-22991

9.8 ⚠️ OVERDUE

On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

f5
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22991

CVE-2021-33766

7.3 ⚠️ OVERDUE

Microsoft Exchange Server Information Disclosure Vulnerability

microsoft
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-33766

CVE-2021-32648

8.2 ⚠️ OVERDUE

octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.

octobercms
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-32648

CVE-2021-40870

9.8 ⚠️ OVERDUE

An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.

aviatrix
Added to KEV
2022-01-18
Remediation Deadline
2022-02-01

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-40870

CVE-2013-3900

5.5 ⚠️ OVERDUE

Why is Microsoft republishing a CVE from 2013? We are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013, Microsoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software. Vulnerability Description A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900

microsoft
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2013-3900

CVE-2015-7450

9.8 ⚠️ OVERDUE

Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library.

ibm
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2015-7450

CVE-2017-1000486

9.8 ⚠️ OVERDUE

Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution

primetek
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-1000486

CVE-2019-7609

10.0 ⚠️ OVERDUE

Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.

elastic redhat
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-7609

CVE-2019-2725

9.8 ⚠️ OVERDUE 💀 Ransomware

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

oracle
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-2725

CVE-2018-13383

4.3 ⚠️ OVERDUE 💀 Ransomware

A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.

fortinet
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-13383

CVE-2019-9670

9.8 ⚠️ OVERDUE

mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.

synacor
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-9670

CVE-2018-13382

9.1 ⚠️ OVERDUE 💀 Ransomware

An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests

fortinet
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2018-13382

CVE-2019-10149

9.8 ⚠️ OVERDUE

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.

debian exim canonical
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-10149

CVE-2019-1579

8.1 ⚠️ OVERDUE 💀 Ransomware

Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.

paloaltonetworks
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1579

CVE-2019-1458

7.8 ⚠️ OVERDUE 💀 Ransomware

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

microsoft
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2019-1458

CVE-2020-6572

8.8 ⚠️ OVERDUE

Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.

google
Added to KEV
2022-01-10
Remediation Deadline
2022-07-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2020-6572

CVE-2021-36260

9.8 ⚠️ OVERDUE

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

hikvision
Added to KEV
2022-01-10
Remediation Deadline
2022-01-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-36260

CVE-2021-22017

5.3 ⚠️ OVERDUE

Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to bypass proxy leading to internal endpoints being accessed.

vmware
Added to KEV
2022-01-10
Remediation Deadline
2022-01-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-22017

CVE-2021-27860

9.8 ⚠️ OVERDUE

A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.

fatpipeinc
Added to KEV
2022-01-10
Remediation Deadline
2022-01-24

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-27860

CVE-2021-43890

7.1 ⚠️ OVERDUE 💀 Ransomware

We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader. An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section. Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability. December 27 2023 Update: In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.

microsoft
Added to KEV
2021-12-15
Remediation Deadline
2021-12-29

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-43890

CVE-2021-4102

8.8 ⚠️ OVERDUE

Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

google
Added to KEV
2021-12-15
Remediation Deadline
2021-12-29

Notes: https://nvd.nist.gov/vuln/detail/CVE-2021-4102

CVE-2010-1871

8.8 ⚠️ OVERDUE

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.

netapp redhat
Added to KEV
2021-12-10
Remediation Deadline
2022-06-10

Notes: https://nvd.nist.gov/vuln/detail/CVE-2010-1871