CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,540
Total CVEs
1,540
CISA KEV
1540
Critical & High
Mar 11, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2024-21410 | High | MicrosoftExchange Server | Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. | Feb 15, 2024 | KEV |
| CVE-2024-21412 | High | MicrosoftWindows | Microsoft Windows Internet Shortcut Files contains an unspecified vulnerability that allows for a security feature bypass. | Feb 13, 2024 | KEV |
| CVE-2024-21351 | High | MicrosoftWindows | Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience and inject code to potentially gain code execution, which could lead to some data exposure, lack of system availability, or both. | Feb 13, 2024 | KEV |
| CVE-2023-43770 | High | RoundcubeWebmail | Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages. | Feb 12, 2024 | KEV |
| CVE-2024-21762 | High | FortinetFortiOS | Fortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests. | Feb 9, 2024 | KEV |
| CVE-2023-4762 | High | GoogleChromium V8 | Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Feb 6, 2024 | KEV |
| CVE-2022-48618 | High | AppleMultiple Products | Apple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication. | Jan 31, 2024 | KEV |
| CVE-2024-21893 | High | IvantiConnect Secure, Policy Secure, and Neurons | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure), Ivanti Policy Secure, and Ivanti Neurons contain a server-side request forgery (SSRF) vulnerability in the SAML component that allows an attacker to access certain restricted resources without authentication. | Jan 31, 2024 | KEV |
| CVE-2023-22527 | High | AtlassianConfluence Data Center and Server | Atlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution. | Jan 24, 2024 | KEV |
| CVE-2024-23222 | High | AppleMultiple Products | Apple iOS, iPadOS, macOS, tvOS, and Safari WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing. | Jan 23, 2024 | KEV |
| CVE-2023-34048 | High | VMwarevCenter Server | VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution. | Jan 22, 2024 | KEV |
| CVE-2023-35082 | High | IvantiEndpoint Manager Mobile (EPMM) and MobileIron Core | Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application. | Jan 18, 2024 | KEV |
| CVE-2024-0519 | High | GoogleChromium V8 | Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. | Jan 17, 2024 | KEV |
| CVE-2023-6549 | High | CitrixNetScaler ADC and NetScaler Gateway | Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. | Jan 17, 2024 | KEV |
| CVE-2023-6548 | High | CitrixNetScaler ADC and NetScaler Gateway | Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP. | Jan 17, 2024 | KEV |
| CVE-2018-15133 | High | LaravelLaravel Framework | Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable). | Jan 16, 2024 | KEV |
| CVE-2023-29357 | High | MicrosoftSharePoint Server | Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges. | Jan 10, 2024 | KEV |
| CVE-2023-46805 | High | IvantiConnect Secure and Policy Secure | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability. | Jan 10, 2024 | KEV |
| CVE-2024-21887 | High | IvantiConnect Secure and Policy Secure | Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue. | Jan 10, 2024 | KEV |
| CVE-2023-23752 | High | Joomla!Joomla! | Joomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints. | Jan 8, 2024 | KEV |