| CVE-2020-1027 | High | MicrosoftWindows | An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. | May 23, 2022 | KEV |
| CVE-2020-0638 | High | MicrosoftUpdate Notification Manager | Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation. | May 23, 2022 | KEV |
| CVE-2019-7286 | High | AppleMultiple Products | Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation. | May 23, 2022 | KEV |
| CVE-2022-20821 | High | CiscoIOS XR | Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container. | May 23, 2022 | KEV |
| CVE-2019-7287 | High | AppleiOS | Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution. | May 23, 2022 | KEV |
| CVE-2019-18426 | High | Meta PlatformsWhatsApp | A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading. | May 23, 2022 | KEV |
| CVE-2019-1385 | High | MicrosoftWindows | A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. | May 23, 2022 | KEV |
| CVE-2019-1130 | High | MicrosoftWindows | A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. | May 23, 2022 | KEV |
| CVE-2018-5002 | High | AdobeFlash Player | Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution. | May 23, 2022 | KEV |
| CVE-2018-8589 | High | MicrosoftWin32k | A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system. | May 23, 2022 | KEV |
| CVE-2019-0676 | High | MicrosoftInternet Explorer | An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. | May 23, 2022 | KEV |
| CVE-2019-5786 | High | GoogleChrome Blink | Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page. | May 23, 2022 | KEV |
| CVE-2019-0703 | High | MicrosoftWindows | An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server. | May 23, 2022 | KEV |
| CVE-2019-0880 | High | MicrosoftWindows | A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. | May 23, 2022 | KEV |
| CVE-2019-13720 | High | GoogleChrome WebAudio | Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. | May 23, 2022 | KEV |
| CVE-2019-11707 | High | MozillaFirefox and Thunderbird | Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash. | May 23, 2022 | KEV |
| CVE-2019-11708 | High | MozillaFirefox and Thunderbird | Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution. | May 23, 2022 | KEV |
| CVE-2019-8720 | High | WebKitGTKWebKitGTK | WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution. | May 23, 2022 | KEV |
| CVE-2022-30525 | High | ZyxelMultiple Firewalls | A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device. | May 16, 2022 | KEV |
| CVE-2022-22947 | High | VMwareSpring Cloud Gateway | Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. | May 16, 2022 | KEV |