Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,590 CVEs · CISA KEV

CVE-2022-0609KEV
High

Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 39.5%
CVE-2013-3906KEV
High

Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

MicrosoftEPSS 92.7%
CVE-2022-22620KEV
High

Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

AppleEPSS 4.0%
CVE-2017-9791KEV
High

The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.

ApacheEPSS 94.2%
CVE-2015-1130KEV
High

The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges.

AppleEPSS 21.1%
CVE-2017-0263KEV
High

Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.

MicrosoftEPSS 17.8%
CVE-2021-36934KEV
High

If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.

MicrosoftEPSS 89.9%
CVE-2018-1000861KEV
High

A code execution vulnerability exists in the Stapler web framework used by Jenkins

JenkinsCVSS 9.8EPSS 94.5%
CVE-2017-0145KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 93.3%
CVE-2017-10271KEV
High

Oracle Corporation WebLogic Server contains a vulnerability that allows for remote code execution.

OracleEPSS 94.4%
CVE-2015-1635KEV
High

Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.

MicrosoftEPSS 94.3%
CVE-2017-0144KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 94.3%
CVE-2014-4404KEV
High

Heap-based buffer overflow in IOHIDFamily in Apple OS X, which affects, iOS before 8 and Apple TV before 7, allows attackers to execute arbitrary code in a privileged context.

AppleEPSS 62.0%
CVE-2017-8464KEV
High

Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file

MicrosoftEPSS 93.9%
CVE-2015-2051KEV
High

D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.

D-LinkEPSS 93.2%
CVE-2016-3088KEV
High

The Fileserver web application in Apache ActiveMQ allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request

ApacheEPSS 94.3%
CVE-2017-0262KEV
High

A remote code execution vulnerability exists in Microsoft Office.

MicrosoftEPSS 65.1%
CVE-2020-0796KEV
High

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

MicrosoftEPSS 94.4%
CVE-2022-21882KEV
High

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

MicrosoftEPSS 89.4%
CVE-2014-6271KEV
High

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.

GNUEPSS 94.2%