Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 20 of 1,542 CVEs · HIGH · CISA KEV

CVE-2021-30883KEV
High

Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution.

AppleEPSS 0.6%
CVE-2019-7286KEV
High

Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation.

AppleEPSS 1.5%
CVE-2020-1027KEV
High

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.

MicrosoftEPSS 11.9%
CVE-2021-1048KEV
High

Android kernel contains a use-after-free vulnerability that allows for privilege escalation.

AndroidEPSS 1.7%
CVE-2021-0920KEV
High

Android kernel contains a race condition, which allows for a use-after-free vulnerability. Exploitation can allow for privilege escalation.

AndroidEPSS 0.9%
CVE-2019-18426KEV
High

A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading.

Meta PlatformsEPSS 55.3%
CVE-2019-1130KEV
High

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links.

MicrosoftEPSS 1.9%
CVE-2019-1385KEV
High

A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.

MicrosoftEPSS 0.4%
CVE-2018-5002KEV
High

Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution.

AdobeEPSS 45.0%
CVE-2019-7287KEV
High

Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution.

AppleEPSS 4.9%
CVE-2019-0880KEV
High

A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.

MicrosoftEPSS 4.1%
CVE-2019-11708KEV
High

Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.

MozillaEPSS 68.9%
CVE-2019-0703KEV
High

An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server.

MicrosoftEPSS 23.2%
CVE-2019-8720KEV
High

WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution.

WebKitGTKEPSS 7.8%
CVE-2019-5786KEV
High

Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page.

GoogleEPSS 89.5%
CVE-2019-0676KEV
High

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.

MicrosoftEPSS 23.8%
CVE-2019-11707KEV
High

Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.

MozillaEPSS 84.4%
CVE-2019-13720KEV
High

Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.

GoogleEPSS 88.2%
CVE-2022-20821KEV
High

Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.

CiscoEPSS 20.4%
CVE-2018-8589KEV
High

A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system.

MicrosoftEPSS 46.3%