Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,585 CVEs · HIGH · CISA KEV

CVE-2007-5659KEV
High

Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.

AdobeEPSS 93.1%
CVE-2009-3953KEV
High

Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.

AdobeEPSS 90.5%
CVE-2009-4324KEV
High

Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.

AdobeEPSS 92.9%
CVE-2008-0655KEV
High

Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.

AdobeEPSS 68.8%
CVE-2019-7192KEV
High

QNAP NAS devices running Photo Station contain an improper access control vulnerability allowing remote attackers to gain unauthorized access to the system.

QNAPEPSS 94.3%
CVE-2019-5825KEV
High

Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 73.7%
CVE-2019-7194KEV
High

QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files.

QNAPEPSS 93.9%
CVE-2022-26134KEV
High

Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.

AtlassianCVSS 9.8EPSS 94.4%
Exploit
CVE-2013-0074KEV
High

Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application.

MicrosoftEPSS 93.1%
CVE-2014-4077KEV
High

Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation.

MicrosoftEPSS 34.3%
CVE-2013-7331KEV
High

An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications.

MicrosoftEPSS 81.8%
CVE-2013-0431KEV
High

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.

OracleEPSS 91.6%
CVE-2013-3896KEV
High

Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.

MicrosoftEPSS 81.6%
CVE-2014-2817KEV
High

Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

MicrosoftEPSS 26.4%
CVE-2013-0422KEV
High

A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.

OracleEPSS 93.8%
CVE-2010-0840KEV
High

Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.

OracleEPSS 92.1%
CVE-2010-0738KEV
High

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

Red HatEPSS 90.9%
CVE-2015-1769KEV
High

A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic links.

MicrosoftEPSS 31.8%
CVE-2015-2360KEV
High

Win32k.sys in the kernel-mode drivers in Microsoft Windows allows local users to gain privileges or cause denial-of-service (DoS).

MicrosoftEPSS 13.2%
CVE-2015-6175KEV
High

The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application.

MicrosoftEPSS 2.8%