Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 20 of 1,542 CVEs · HIGH · CISA KEV

CVE-2020-15415KEV
High

DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used.

DrayTekEPSS 93.0%
CVE-2024-7593KEV
High

Ivanti Virtual Traffic Manager contains an authentication bypass vulnerability that allows a remote, unauthenticated attacker to create a chosen administrator account.

IvantiEPSS 94.4%
CVE-2024-8963KEV
High

Ivanti Cloud Services Appliance (CSA) contains a path traversal vulnerability that could allow a remote, unauthenticated attacker to access restricted functionality. If CVE-2024-8963 is used in conjunction with CVE-2024-8190, an attacker could bypass admin authentication and execute arbitrary commands on the appliance.

IvantiEPSS 94.2%
CVE-2022-21445KEV
High

Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.

OracleEPSS 92.0%
CVE-2020-0618KEV
High

Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account.

MicrosoftEPSS 94.3%
CVE-2020-14644KEV
High

Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution.

OracleEPSS 93.6%
CVE-2024-27348KEV
High

Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.

ApacheEPSS 94.3%
CVE-2013-0643KEV
High

Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content.

AdobeEPSS 57.9%
CVE-2013-0648KEV
High

Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.

AdobeEPSS 54.7%
CVE-2014-0502KEV
High

Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.

AdobeEPSS 89.0%
CVE-2014-0497KEV
High

Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.

AdobeEPSS 92.9%
CVE-2024-43461KEV
High

Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112.

MicrosoftEPSS 9.8%
CVE-2024-6670KEV
High

Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user.

ProgressCVSS 9.8EPSS 94.5%
CVE-2024-8190KEV
High

Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS.

IvantiEPSS 91.9%
CVE-2024-38217KEV
High

Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.

MicrosoftEPSS 13.2%
CVE-2024-38226KEV
High

Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files.

MicrosoftEPSS 1.4%
CVE-2024-38014KEV
High

Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.

MicrosoftEPSS 12.8%
CVE-2024-40766KEV
High

SonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash.

SonicWallEPSS 3.4%
CVE-2017-1000253KEV
High

Linux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges.

LinuxEPSS 54.2%
CVE-2016-3714KEV
High

ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.

ImageMagickEPSS 93.7%