CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,540
Total CVEs
1,540
CISA KEV
1540
Critical & High
Mar 11, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2018-19320 | High | GIGABYTEMultiple Products | The GDrv low-level driver in GIGABYTE App Center, AORUS Graphics Engine, XTREME Gaming Engine, and OC GURU II exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system. | Oct 24, 2022 | KEV |
| CVE-2022-41352 | High | SynacorZimbra Collaboration Suite (ZCS) | Synacor Zimbra Collaboration Suite (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts. | Oct 20, 2022 | KEV |
| CVE-2021-3493 | High | LinuxKernel | The overlayfs stacking file system in Linux kernel does not properly validate the application of file capabilities against user namespaces, which could lead to privilege escalation. | Oct 20, 2022 | KEV |
| CVE-2022-40684 | High | FortinetMultiple Products | Fortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests. | Oct 11, 2022 | KEV |
| CVE-2022-41033 | High | MicrosoftWindows COM+ Event System Service | Microsoft Windows COM+ Event System Service contains an unspecified vulnerability that allows for privilege escalation. | Oct 11, 2022 | KEV |
| CVE-2022-41082 | High | MicrosoftExchange Server | Microsoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution. | Sep 30, 2022 | KEV |
| CVE-2022-41040 | High | MicrosoftExchange Server | Microsoft Exchange Server allows for server-side request forgery. Dubbed "ProxyNotShell," this vulnerability is chainable with CVE-2022-41082 which allows for remote code execution. | Sep 30, 2022 | KEV |
| CVE-2022-36804 | High | AtlassianBitbucket Server and Data Center | Multiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request. | Sep 30, 2022 | KEV |
| CVE-2022-3236 | High | SophosFirewall | A code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution. | Sep 23, 2022 | KEV |
| CVE-2022-35405 | High | ZohoManageEngine | Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus contain an unspecified vulnerability that allows for remote code execution. | Sep 22, 2022 | KEV |
| CVE-2022-40139 | High | Trend MicroApex One and Apex One as a Service | Trend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution. | Sep 15, 2022 | KEV |
| CVE-2013-6282 | High | LinuxKernel | The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation. | Sep 15, 2022 | KEV |
| CVE-2013-2597 | High | Code AuroraACDB Audio Driver | The Code Aurora audio calibration database (acdb) audio driver contains a stack-based buffer overflow vulnerability that allows for privilege escalation. Code Aurora is used in third-party products such as Qualcomm and Android. | Sep 15, 2022 | KEV |
| CVE-2013-2596 | High | LinuxKernel | Linux kernel fb_mmap function in drivers/video/fbmem.c contains an integer overflow vulnerability that allows for privilege escalation. | Sep 15, 2022 | KEV |
| CVE-2013-2094 | High | LinuxKernel | Linux kernel fails to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Explotation allows for privilege escalation. | Sep 15, 2022 | KEV |
| CVE-2010-2568 | High | MicrosoftWindows | Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user. | Sep 15, 2022 | KEV |
| CVE-2022-37969 | High | MicrosoftWindows | Microsoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation. | Sep 14, 2022 | KEV |
| CVE-2022-32917 | High | AppleiOS, iPadOS, and macOS | Apple kernel, which is included in iOS, iPadOS, and macOS, contains an unspecified vulnerability where an application may be able to execute code with kernel privileges. | Sep 14, 2022 | KEV |
| CVE-2018-6530 | High | D-LinkMultiple Routers | Multiple D-Link routers contain an unspecified vulnerability that allows for execution of OS commands. | Sep 8, 2022 | KEV |
| CVE-2018-7445 | High | MikroTikRouterOS | In MikroTik RouterOS, a stack-based buffer overflow occurs when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. | Sep 8, 2022 | KEV |