Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,590 CVEs · CISA KEV

CVE-2013-2597KEV
High

The Code Aurora audio calibration database (acdb) audio driver contains a stack-based buffer overflow vulnerability that allows for privilege escalation. Code Aurora is used in third-party products such as Qualcomm and Android.

Code AuroraEPSS 6.7%
CVE-2022-40139KEV
High

Trend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution.

Trend MicroEPSS 12.9%
CVE-2013-2094KEV
High

Linux kernel fails to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Explotation allows for privilege escalation.

LinuxEPSS 58.5%
CVE-2013-6282KEV
High

The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.

LinuxEPSS 67.7%
CVE-2013-2596KEV
High

Linux kernel fb_mmap function in drivers/video/fbmem.c contains an integer overflow vulnerability that allows for privilege escalation.

LinuxEPSS 2.7%
CVE-2010-2568KEV
High

Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.

MicrosoftEPSS 92.1%
CVE-2022-32917KEV
High

Apple kernel, which is included in iOS, iPadOS, and macOS, contains an unspecified vulnerability where an application may be able to execute code with kernel privileges.

AppleEPSS 0.5%
CVE-2022-37969KEV
High

Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.

MicrosoftEPSS 12.1%
CVE-2018-6530KEV
High

Multiple D-Link routers contain an unspecified vulnerability that allows for execution of OS commands.

D-LinkEPSS 94.3%
CVE-2011-4723KEV
High

The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.

D-LinkEPSS 12.7%
CVE-2017-5521KEV
High

Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.

NETGEAREPSS 93.8%
CVE-2018-2628KEV
High

Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.

OracleEPSS 94.4%
CVE-2018-13374KEV
High

Fortinet FortiOS and FortiADC contain an improper access control vulnerability that allows attackers to obtain the LDAP server login credentials configured in FortiGate by pointing a LDAP server connectivity test request to a rogue LDAP server.

FortinetEPSS 3.8%
CVE-2011-1823KEV
High

The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.

AndroidEPSS 34.4%
CVE-2020-9934KEV
High

Apple iOS, iPadOS, and macOS contain an unspecified vulnerability involving input validation which can allow a local attacker to view sensitive user information.

AppleEPSS 2.4%
CVE-2022-26258KEV
High

D-Link DIR-820L contains an unspecified vulnerability in Device Name parameter in /lan.asp which allows for remote code execution.

D-LinkEPSS 87.6%
CVE-2022-27593KEV
High

Certain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.

QNAPEPSS 93.0%
CVE-2022-3075KEV
High

Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 2.1%
CVE-2018-7445KEV
High

In MikroTik RouterOS, a stack-based buffer overflow occurs when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system.

MikroTikEPSS 85.9%
CVE-2021-38406KEV
High

Delta Electronics DOPSoft 2 lacks proper validation of user-supplied data when parsing specific project files (improper input validation) resulting in an out-of-bounds write that allows for code execution.

Delta ElectronicsEPSS 70.4%