Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 81 CVEs matching "Perl" · HIGH

CVE-2021-22204KEV
High

Improper neutralization of user data in the DjVu file format in Exiftool versions 7.44 and up allows arbitrary code execution when parsing the malicious image

PerlEPSS 92.8%
CVE-2017-11774KEV
High

Microsoft Office Outlook contains a security feature bypass vulnerability due to improperly handling objects in memory. Successful exploitation allows an attacker to execute commands.

MicrosoftEPSS 82.9%
CVE-2019-0797KEV
High

Microsoft Win32k contains a privilege escalation vulnerability when the Win32k component fails to properly handle objects in memory. Successful exploitation allows an attacker to execute code in kernel mode.

MicrosoftEPSS 6.1%
CVE-2020-1464KEV
High

Microsoft Windows contains a spoofing vulnerability when Windows incorrectly validates file signatures, allowing an attacker to bypass security features and load improperly signed files.

MicrosoftEPSS 12.6%
CVE-2019-0859KEV
High

Microsoft Win32k fails to properly handle objects in memory causing privilege escalation. Successful exploitation allows an attacker to run code in kernel mode.

MicrosoftEPSS 9.9%
CVE-2016-3235KEV
High

Microsoft Office Object Linking & Embedding (OLE) dynamic link library (DLL) contains a side loading vulnerability due to it improperly validating input before loading libraries. Successful exploitation allows for remote code execution.

MicrosoftEPSS 81.2%
CVE-2020-1054KEV
High

Microsoft Win32k contains a privilege escalation vulnerability when the Windows kernel-mode driver fails to properly handle objects in memory. Successful exploitation allows an attacker to execute code in kernel mode.

MicrosoftEPSS 80.9%
CVE-2019-0808KEV
High

Microsoft Win32k contains a privilege escalation vulnerability due to the component failing to properly handle objects in memory. Successful exploitation allows an attacker to run code in kernel mode.

MicrosoftEPSS 74.2%
CVE-2019-1214KEV
High

Microsoft Windows Common Log File System (CLFS) driver improperly handles objects in memory which can allow for privilege escalation.

MicrosoftEPSS 3.7%
CVE-2020-11651KEV
High

SaltStack Salt contains an authentication bypass vulnerability in the salt-master process ClearFuncs due to improperly validating method calls. The vulnerability allows a remote user to access some methods without authentication, which can be used to retrieve user tokens from the salt master and/or run commands on salt minions. Salt users who follow fundamental internet security guidelines and best practices are not affected by this vulnerability.

SaltStackEPSS 94.4%
CVE-2015-1641KEV
High

Microsoft Office contains a memory corruption vulnerability due to failure to properly handle rich text format files in memory. Successful exploitation allows for remote code execution in the context of the current user.

MicrosoftEPSS 93.6%
CVE-2020-1350KEV
High

Microsoft Windows DNS Servers fail to properly handle requests, allowing an attacker to perform remote code execution in the context of the Local System Account. The vulnerability is also known under the moniker of SIGRed.

MicrosoftEPSS 93.8%
CVE-2021-22205KEV
High

GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.

GitLabCVSS 10EPSS 94.5%
Exploit
CVE-2021-34527KEV
High

Microsoft Windows Print Spooler contains an unspecified vulnerability due to the Windows Print Spooler service improperly performing privileged file operations. Successful exploitation allows an attacker to perform remote code execution with SYSTEM privileges. The vulnerability is also known under the moniker of PrintNightmare.

MicrosoftEPSS 94.3%
CVE-2020-1040KEV
High

Microsoft Hyper-V RemoteFX vGPU contains an improper input validation vulnerability due to the host server failing to properly validate input from an authenticated user on a guest operating system. Successful exploitation allows for remote code execution on the host operating system.

MicrosoftEPSS 0.2%
CVE-2019-0803KEV
High

Microsoft Win32k contains an unspecified vulnerability due to it failing to properly handle objects in memory causing privilege escalation. Successful exploitation allows an attacker to run code in kernel mode.

MicrosoftEPSS 89.8%
CVE-2020-17144KEV
High

Microsoft Exchange Server improperly validates cmdlet arguments which allow an attacker to perform remote code execution.

MicrosoftEPSS 92.7%
CVE-2020-0688KEV
High

Microsoft Exchange Server Validation Key fails to properly create unique keys at install time, allowing for remote code execution.

MicrosoftEPSS 94.4%
CVE-2016-7255KEV
High

Microsoft Win32k kernel-mode driver fails to properly handle objects in memory which allows for privilege escalation. Successful exploitation allows an attacker to run code in kernel mode.

MicrosoftEPSS 89.3%
CVE-2018-0171KEV
High

Cisco IOS and IOS XE Software improperly validates packet data, allowing an unauthenticated, remote attacker to trigger a reload of an affected device, cause a denial-of-service (DoS) condition, or perform code execution on the affected device.

CiscoEPSS 93.0%