CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,540
Total CVEs
1,540
CISA KEV
1540
Critical & High
Mar 11, 2026
Last KEV Update
| CVE ID | Severity | Vendor | Description | Published | KEV |
|---|---|---|---|---|---|
| CVE-2007-5659 | High | AdobeAcrobat and Reader | Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods. | Jun 8, 2022 | KEV |
| CVE-2006-2492 | High | MicrosoftWord | Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code. | Jun 8, 2022 | KEV |
| CVE-2022-26134 | High | AtlassianConfluence Server/Data Center | Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution. | Jun 2, 2022 | KEV |
| CVE-2014-2817 | High | MicrosoftInternet Explorer | Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site. | May 25, 2022 | KEV |
| CVE-2014-4077 | High | MicrosoftInput Method Editor (IME) Japanese | Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation. | May 25, 2022 | KEV |
| CVE-2013-7331 | High | MicrosoftInternet Explorer | An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications. | May 25, 2022 | KEV |
| CVE-2013-3993 | High | IBMInfoSphere BigInsights | Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data. | May 25, 2022 | KEV |
| CVE-2013-3896 | High | MicrosoftSilverlight | Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application. | May 25, 2022 | KEV |
| CVE-2013-2423 | High | OracleJava Runtime Environment (JRE) | Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity. | May 25, 2022 | KEV |
| CVE-2013-0431 | High | OracleJava Runtime Environment (JRE) | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox. | May 25, 2022 | KEV |
| CVE-2013-0422 | High | OracleJava Runtime Environment (JRE) | A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system. | May 25, 2022 | KEV |
| CVE-2013-0074 | High | MicrosoftSilverlight | Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application. | May 25, 2022 | KEV |
| CVE-2012-1710 | High | OracleFusion Middleware | Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer. | May 25, 2022 | KEV |
| CVE-2010-1428 | High | Red HatJBoss | Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information. | May 25, 2022 | KEV |
| CVE-2010-0840 | High | OracleJava Runtime Environment (JRE) | Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors. | May 25, 2022 | KEV |
| CVE-2010-0738 | High | Red HatJBoss | The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. | May 25, 2022 | KEV |
| CVE-2019-3010 | High | OracleSolaris | Oracle Solaris component: XScreenSaver contains an unspecified vulnerability that allows for privilege escalation. | May 25, 2022 | KEV |
| CVE-2016-3393 | High | MicrosoftWindows | A remote code execution vulnerability exists due to the way the Windows GDI component handles objects in the memory. An attacker who successfully exploits this vulnerability could take control of the affected system. | May 25, 2022 | KEV |
| CVE-2016-7256 | High | MicrosoftWindows | A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system. | May 25, 2022 | KEV |
| CVE-2016-1010 | High | AdobeFlash Player and AIR | Integer overflow vulnerability in Adobe Flash Player and AIR allows attackers to execute code. | May 25, 2022 | KEV |