Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,590 CVEs · CISA KEV

CVE-2008-3431KEV
High

An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.

OracleEPSS 5.4%
CVE-2014-4114KEV
High

A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object.

MicrosoftEPSS 92.1%
CVE-2010-0232KEV
High

The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.

MicrosoftEPSS 72.6%
CVE-2012-1535KEV
High

Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.

AdobeEPSS 91.4%
CVE-2011-3544KEV
High

An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

OracleEPSS 92.6%
CVE-2011-0611KEV
High

Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.

AdobeEPSS 93.6%
CVE-2012-1856KEV
High

The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.

MicrosoftEPSS 91.9%
CVE-2015-3043KEV
High

A memory corruption vulnerability exists in Adobe Flash Player that allows an attacker to perform remote code execution.

AdobeEPSS 83.9%
CVE-2012-1723KEV
High

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.

OracleEPSS 94.1%
CVE-2020-1938KEV
High

Apache Tomcat treats Apache JServ Protocol (AJP) connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited.

ApacheCVSS 9.8EPSS 94.5%
Exploit
CVE-2013-0632KEV
High

An authentication bypass vulnerability exists in Adobe ColdFusion which could result in an unauthorized user gaining administrative access.

AdobeEPSS 92.7%
CVE-2012-4681KEV
High

The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.

OracleEPSS 94.1%
CVE-2013-1347KEV
High

This vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.

MicrosoftEPSS 88.0%
CVE-2013-0641KEV
High

A buffer overflow vulnerability exists in Adobe Reader which allows an attacker to perform remote code execution.

AdobeEPSS 88.0%
CVE-2021-41379KEV
High

Microsoft Windows Installer contains an unspecified vulnerability that allows for privilege escalation.

MicrosoftEPSS 1.2%
CVE-2010-3333KEV
High

A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.

MicrosoftEPSS 93.8%
CVE-2013-0640KEV
High

An memory corruption vulnerability exists in the acroform.dll in Adobe Reader that allows an attacker to perform remote code execution.

AdobeEPSS 92.4%
CVE-2015-2590KEV
High

An unspecified vulnerability exists within Oracle Java Runtime Environment that allows an attacker to perform remote code execution.

OracleEPSS 61.5%
CVE-2015-7645KEV
High

Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.

AdobeEPSS 84.5%
CVE-2011-1889KEV
High

A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.

MicrosoftEPSS 85.4%