Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 81 CVEs matching "Perl" · HIGH · CISA KEV

CVE-2026-20127KEV
High

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

CiscoEPSS 2.6%
CVE-2024-7694KEV
High

TeamT5 ThreatSonar Anti-Ransomware contains an unrestricted upload of file with dangerous type vulnerability. ThreatSonar Anti-Ransomware does not properly validate the content of uploaded files. Remote attackers with administrator privileges on the product platform can upload malicious files, which can be used to execute arbitrary system commands on the server.

TeamT5EPSS 1.6%
CVE-2025-47827KEV
High

IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

IGELEPSS 1.8%
CVE-2012-4792KEV
High

Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.

MicrosoftEPSS 91.8%
CVE-2021-3493KEV
High

The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation.

LinuxEPSS 76.8%
CVE-2012-0151KEV
High

The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.

MicrosoftEPSS 89.0%
CVE-2016-7256KEV
High

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system.

MicrosoftEPSS 65.1%
CVE-2015-1769KEV
High

A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic links.

MicrosoftEPSS 31.8%
CVE-2015-0310KEV
High

Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the address space layout randomization (ASLR) protection mechanism.

AdobeEPSS 5.4%
CVE-2013-3896KEV
High

Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.

MicrosoftEPSS 81.6%
CVE-2013-0074KEV
High

Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application.

MicrosoftEPSS 93.1%
CVE-2015-1671KEV
High

A remote code execution vulnerability exists when components of Windows, .NET Framework, Office, Lync, and Silverlight fail to properly handle TrueType fonts.

MicrosoftEPSS 85.9%
CVE-2014-4148KEV
High

A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.

MicrosoftEPSS 53.1%
CVE-2017-0022KEV
High

Microsoft XML Core Services (MSXML) improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site.

MicrosoftEPSS 44.1%
CVE-2016-0162KEV
High

An information disclosure vulnerability exists when Internet Explorer does not properly handle JavaScript. The vulnerability could allow an attacker to detect specific files on the user's computer.

MicrosoftEPSS 38.0%
CVE-2018-8611KEV
High

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory.

MicrosoftEPSS 16.4%
CVE-2016-3298KEV
High

An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow the attacker to test for the presence of files on disk.

MicrosoftEPSS 27.7%
CVE-2017-0210KEV
High

A privilege escalation vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information.

MicrosoftEPSS 38.0%
CVE-2019-1130KEV
High

A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links.

MicrosoftEPSS 1.9%
CVE-2019-1385KEV
High

A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.

MicrosoftEPSS 0.4%
Previous
Next