Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,600 CVEs · HIGH

CVE-2020-9934KEV
High

Apple iOS, iPadOS, and macOS contain an unspecified vulnerability involving input validation which can allow a local attacker to view sensitive user information.

AppleEPSS 2.4%
CVE-2011-4723KEV
High

The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.

D-LinkEPSS 12.7%
CVE-2018-7445KEV
High

In MikroTik RouterOS, a stack-based buffer overflow occurs when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system.

MikroTikEPSS 85.9%
CVE-2022-3075KEV
High

Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 2.1%
CVE-2022-27593KEV
High

Certain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.

QNAPEPSS 93.0%
CVE-2018-6530KEV
High

Multiple D-Link routers contain an unspecified vulnerability that allows for execution of OS commands.

D-LinkEPSS 94.3%
CVE-2022-26258KEV
High

D-Link DIR-820L contains an unspecified vulnerability in Device Name parameter in /lan.asp which allows for remote code execution.

D-LinkEPSS 87.6%
CVE-2017-5521KEV
High

Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.

NETGEAREPSS 93.8%
CVE-2018-2628KEV
High

Oracle WebLogic Server contains an unspecified vulnerability which can allow an unauthenticated attacker with T3 network access to compromise the server.

OracleEPSS 94.4%
CVE-2022-2294KEV
High

WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.

WebRTCEPSS 1.2%
CVE-2022-24112KEV
High

Apache APISIX contains an authentication bypass vulnerability that allows for remote code execution.

ApacheEPSS 94.4%
CVE-2021-39226KEV
High

Grafana contains an authentication bypass vulnerability that allows authenticated and unauthenticated users to view and delete all snapshot data, potentially resulting in complete snapshot data loss.

Grafana LabsEPSS 94.3%
CVE-2022-22963KEV
High

When using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

VMware TanzuEPSS 94.5%
CVE-2021-38406KEV
High

Delta Electronics DOPSoft 2 lacks proper validation of user-supplied data when parsing specific project files (improper input validation) resulting in an out-of-bounds write that allows for code execution.

Delta ElectronicsEPSS 70.4%
CVE-2022-24706KEV
High

Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.

ApacheEPSS 94.4%
CVE-2020-36193KEV
High

PEAR Archive_Tar Tar.php allows write operations with directory traversal due to inadequate checking of symbolic links. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

PEAREPSS 71.1%
CVE-2020-28949KEV
High

PEAR Archive_Tar allows an unserialization attack because phar: is blocked but PHAR: is not blocked. PEAR stands for PHP Extension and Application Repository and it is an open-source framework and distribution system for reusable PHP components with known usage in third-party products such as Drupal Core and Red Hat Linux.

PEAREPSS 93.0%
CVE-2022-26352KEV
High

dotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage location. Exploitation allows for remote code execution.

dotCMSEPSS 94.3%
CVE-2021-31010KEV
High

In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions.

AppleEPSS 1.0%
CVE-2022-0028KEV
High

A Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.

Palo Alto NetworksEPSS 4.7%