CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,539
Total CVEs
1,539
CISA KEV
1539
Critical & High
Mar 9, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2022-21445 | High | OracleADF Faces | Oracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution. | Sep 18, 2024 | KEV |
| CVE-2020-14644 | High | OracleWebLogic Server | Oracle WebLogic Server, a product within the Fusion Middleware suite, contains a deserialization vulnerability. Unauthenticated attackers with network access via T3 or IIOP can exploit this vulnerability to achieve remote code execution. | Sep 18, 2024 | KEV |
| CVE-2020-0618 | High | MicrosoftSQL Server | Microsoft SQL Server Reporting Services contains a deserialization vulnerability when handling page requests incorrectly. An authenticated attacker can exploit this vulnerability to execute code in the context of the Report Server service account. | Sep 18, 2024 | KEV |
| CVE-2024-27348 | High | ApacheHugeGraph-Server | Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code. | Sep 18, 2024 | KEV |
| CVE-2013-0643 | High | AdobeFlash Player | Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content. | Sep 17, 2024 | KEV |
| CVE-2014-0502 | High | AdobeFlash Player | Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code. | Sep 17, 2024 | KEV |
| CVE-2013-0648 | High | AdobeFlash Player | Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content. | Sep 17, 2024 | KEV |
| CVE-2014-0497 | High | AdobeFlash Player | Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code. | Sep 17, 2024 | KEV |
| CVE-2024-6670 | High | ProgressWhatsUp Gold | Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user. | Sep 16, 2024 | KEV |
| CVE-2024-43461 | High | MicrosoftWindows | Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to spoof a web page. This vulnerability was exploited in conjunction with CVE-2024-38112. | Sep 16, 2024 | KEV |
| CVE-2024-8190 | High | IvantiCloud Services Appliance | Ivanti Cloud Services Appliance (CSA) contains an OS command injection vulnerability in the administrative console which can allow an authenticated attacker with application admin privileges to pass commands to the underlying OS. | Sep 13, 2024 | KEV |
| CVE-2024-38217 | High | MicrosoftWindows | Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. This can result in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging. | Sep 10, 2024 | KEV |
| CVE-2024-38014 | High | MicrosoftWindows | Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges. | Sep 10, 2024 | KEV |
| CVE-2024-38226 | High | MicrosoftPublisher | Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted or malicious files. | Sep 10, 2024 | KEV |
| CVE-2024-40766 | High | SonicWallSonicOS | SonicWall SonicOS contains an improper access control vulnerability that could lead to unauthorized resource access and, under certain conditions, may cause the firewall to crash. | Sep 9, 2024 | KEV |
| CVE-2017-1000253 | High | LinuxKernel | Linux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges. | Sep 9, 2024 | KEV |
| CVE-2016-3714 | High | ImageMagickImageMagick | ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image. | Sep 9, 2024 | KEV |
| CVE-2021-20124 | High | DrayTekVigorConnect | Draytek VigorConnect contains a path traversal vulnerability in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. | Sep 3, 2024 | KEV |
| CVE-2024-7262 | High | KingsoftWPS Office | Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library. | Sep 3, 2024 | KEV |
| CVE-2021-20123 | High | DrayTekVigorConnect | Draytek VigorConnect contains a path traversal vulnerability in the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. | Sep 3, 2024 | KEV |