Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,585 CVEs · HIGH · CISA KEV

CVE-2011-3544KEV
High

An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.

OracleEPSS 92.6%
CVE-2011-0611KEV
High

Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.

AdobeEPSS 93.6%
CVE-2022-24682KEV
High

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability in the Calendar feature that allows an attacker to execute arbitrary code.

SynacorEPSS 88.0%
CVE-2017-8570KEV
High

A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory.

MicrosoftEPSS 94.2%
CVE-2014-6352KEV
High

Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.

MicrosoftEPSS 90.7%
CVE-2017-0222KEV
High

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.

MicrosoftEPSS 62.0%
CVE-2022-23134KEV
High

Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.

ZabbixEPSS 93.1%
CVE-2022-23131KEV
High

Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.

ZabbixEPSS 94.3%
CVE-2017-9841KEV
High

PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

PHPUnitEPSS 94.2%
CVE-2019-0752KEV
High

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer

MicrosoftEPSS 92.0%
CVE-2022-24086KEV
High

Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.

AdobeEPSS 93.5%
CVE-2018-20250KEV
High

WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution

RARLABEPSS 93.5%
CVE-2014-1761KEV
High

Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.

MicrosoftEPSS 93.1%
CVE-2018-8174KEV
High

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"

MicrosoftEPSS 94.3%
CVE-2013-3906KEV
High

Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

MicrosoftEPSS 92.7%
CVE-2018-15982KEV
High

Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability

AdobeEPSS 93.8%
CVE-2022-0609KEV
High

Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 39.5%
CVE-2022-22620KEV
High

Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

AppleEPSS 4.0%
CVE-2018-1000861KEV
High

A code execution vulnerability exists in the Stapler web framework used by Jenkins

JenkinsCVSS 9.8EPSS 94.5%
CVE-2020-0796KEV
High

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

MicrosoftEPSS 94.4%