CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
2,234
Total CVEs
1,589
CISA KEV
41
Known Exploits
8.8
Avg CVSS Score
Showing 20 of 2,234 CVEs
Microsoft Windows contains a link following vulnerability that allows for privilege escalation
Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.
Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation
Adobe Acrobat contains a use-after-free vulnerability that allows for code execution
Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.
Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.
Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.
Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Referenced in article: WAGO GmbH & Co. KG Industrial Managed Switches
Referenced in article: OpenCode Systems OC Messaging and USSD Gateway
Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software
Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software
Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software
Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software
Referenced in article: LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Referenced in article: LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Referenced in article: LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Referenced in article: EV2GO ev2go.io
Referenced in article: EV2GO ev2go.io