CVE Tracker
Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.
1,542
Total CVEs
1,542
CISA KEV
1542
Critical & High
35
With Known Exploits
| CVE ID | Severity | EPSS | Vendor | Description | Status |
|---|---|---|---|---|---|
| CVE-2017-12234 | High | 6.5% | CiscoIOS software | There is a vulnerability in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service. | KEV |
| CVE-2017-6627 | High | 10.8% | CiscoIOS and IOS XE Software | A vulnerability in the UDP processing code of Cisco IOS and IOS XE could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and denial of service. | KEV |
| CVE-2017-12232 | High | 1.0% | CiscoIOS software | A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service. | KEV |
| CVE-2017-6736 | High | 89.0% | CiscoIOS and IOS XE Software | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code. | KEV |
| CVE-2017-0261 | High | 92.9% | MicrosoftOffice | Microsoft Office contains a use-after-free vulnerability which can allow for remote code execution. | KEV |
| CVE-2017-6743 | High | 28.8% | CiscoIOS and IOS XE Software | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code. | KEV |
| CVE-2017-6738 | High | 28.8% | CiscoIOS and IOS XE Software | The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code. | KEV |
| CVE-2009-1123 | High | 4.3% | MicrosoftWindows | The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application. | KEV |
| CVE-2015-1701 | High | 89.7% | MicrosoftWin32k | An unspecified vulnerability exists in the Win32k.sys kernel-mode driver in Microsoft Windows Server that allows a local attacker to execute arbitrary code with elevated privileges. | KEV |
| CVE-2016-1019 | High | 72.4% | AdobeFlash Player | Adobe Flash Player allows remote attackers to cause a denial of service or possibly execute arbitrary code. | KEV |
| CVE-2016-7262 | High | 87.1% | MicrosoftExcel | A security feature bypass vulnerability exists when Microsoft Office improperly handles input. An attacker who successfully exploited the vulnerability could execute arbitrary commands. | KEV |
| CVE-2016-7193 | High | 71.2% | MicrosoftOffice | Microsoft Office contains a memory corruption vulnerability which can allow for remote code execution. | KEV |
| CVE-2009-3129 | High | 91.6% | MicrosoftExcel | Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset. | KEV |
| CVE-2015-2545 | High | 93.4% | MicrosoftOffice | Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image. | KEV |
| CVE-2016-5195 | High | 94.2% | LinuxKernel | Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges. | KEV |
| CVE-2015-5119 | High | 93.2% | AdobeFlash Player | A use-after-free vulnerability exists within the ActionScript 3 ByteArray class in Adobe Flash Player that allows an attacker to perform remote code execution. | KEV |
| CVE-2013-3897 | High | 88.2% | MicrosoftInternet Explorer | A use-after-free vulnerability exists within CDisplayPointer in Microsoft Internet Explorer that allows an attacker to remotely execute arbitrary code. | KEV |
| CVE-2016-4117 | High | 93.1% | AdobeFlash Player | An access of resource using incompatible type vulnerability exists within Adobe Flash Player that allows an attacker to perform remote code execution. | KEV |
| CVE-2015-4902 | High | 7.7% | OracleJava SE | Unspecified vulnerability in Oracle Java SE allows remote attackers to affect integrity via Unknown vectors related to deployment. | KEV |
| CVE-2012-0507 | High | 93.6% | OracleJava SE | An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code. | KEV |