CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,539
Total CVEs
1,539
CISA KEV
1539
Critical & High
Mar 9, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2023-45249 | High | AcronisCyber Infrastructure (ACI) | Acronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords. | Jul 29, 2024 | KEV |
| CVE-2024-5217 | High | ServiceNowUtah, Vancouver, and Washington DC Now Platform | ServiceNow Washington DC, Vancouver, and earlier Now Platform releases contain an incomplete list of disallowed inputs vulnerability in the GlideExpression script. An unauthenticated user could exploit this vulnerability to execute code remotely. | Jul 29, 2024 | KEV |
| CVE-2024-4879 | High | ServiceNowUtah, Vancouver, and Washington DC Now Platform | ServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely. | Jul 29, 2024 | KEV |
| CVE-2024-39891 | High | TwilioAuthy | Twilio Authy contains an information disclosure vulnerability in its API that allows an unauthenticated endpoint to accept a request containing a phone number and respond with information about whether the phone number was registered with Authy. | Jul 23, 2024 | KEV |
| CVE-2012-4792 | High | MicrosoftInternet Explorer | Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object. | Jul 23, 2024 | KEV |
| CVE-2022-22948 | High | VMwarevCenter Server | VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information. | Jul 17, 2024 | KEV |
| CVE-2024-28995 | High | SolarWindsServ-U | SolarWinds Serv-U contains a path traversal vulnerability that allows an attacker access to read sensitive files on the host machine. | Jul 17, 2024 | KEV |
| CVE-2024-34102 | High | AdobeCommerce and Magento Open Source | Adobe Commerce and Magento Open Source contain an improper restriction of XML external entity reference (XXE) vulnerability that allows for remote code execution. | Jul 17, 2024 | KEV |
| CVE-2024-36401 | High | OSGeoGeoServer | OSGeo GeoServer GeoTools contains an improper neutralization of directives in dynamically evaluated code vulnerability due to unsafely evaluating property names as XPath expressions. This allows unauthenticated attackers to conduct remote code execution via specially crafted input. | Jul 15, 2024 | KEV |
| CVE-2024-38080 | High | MicrosoftWindows | Microsoft Windows Hyper-V contains a privilege escalation vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges. | Jul 9, 2024 | KEV |
| CVE-2024-23692 | High | RejettoHTTP File Server | Rejetto HTTP File Server contains an improper neutralization of special elements used in a template engine vulnerability. This allows a remote, unauthenticated attacker to execute commands on the affected system by sending a specially crafted HTTP request. | Jul 9, 2024 | KEV |
| CVE-2024-38112 | High | MicrosoftWindows | Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability. | Jul 9, 2024 | KEV |
| CVE-2024-20399 | High | CiscoNX-OS | Cisco NX-OS contains a command injection vulnerability in the command line interface (CLI) that could allow an authenticated, local attacker to execute commands as root on the underlying operating system of an affected device. | Jul 2, 2024 | KEV |
| CVE-2020-13965 | High | RoundcubeWebmail | Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to manipulate data via a malicious XML attachment. | Jun 26, 2024 | KEV |
| CVE-2022-2586 | High | LinuxKernel | Linux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges. | Jun 26, 2024 | KEV |
| CVE-2022-24816 | High | OSGeoJAI-EXT | OSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution. | Jun 26, 2024 | KEV |
| CVE-2024-4358 | High | ProgressTelerik Report Server | Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access. | Jun 13, 2024 | KEV |
| CVE-2024-26169 | High | MicrosoftWindows | Microsoft Windows Error Reporting Service contains an improper privilege management vulnerability that allows a local attacker with user permissions to gain SYSTEM privileges. | Jun 13, 2024 | KEV |
| CVE-2024-32896 | High | AndroidPixel | Android Pixel contains an unspecified vulnerability in the firmware that allows for privilege escalation. | Jun 13, 2024 | KEV |
| CVE-2024-4577 | High | PHP GroupPHP | PHP, specifically Windows-based PHP used in CGI mode, contains an OS command injection vulnerability that allows for arbitrary code execution. This vulnerability is a patch bypass for CVE-2012-1823. | Jun 12, 2024 | KEV |