Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 1,600 CVEs · HIGH

CVE-2014-6352KEV
High

Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.

MicrosoftEPSS 90.7%
CVE-2022-23134KEV
High

Malicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.

ZabbixEPSS 93.1%
CVE-2022-23131KEV
High

Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.

ZabbixEPSS 94.3%
CVE-2022-0609KEV
High

Google Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 39.5%
CVE-2018-20250KEV
High

WinRAR Absolute Path Traversal vulnerability leads to Remote Code Execution

RARLABEPSS 93.5%
CVE-2013-3906KEV
High

Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.

MicrosoftEPSS 92.7%
CVE-2018-15982KEV
High

Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability

AdobeEPSS 93.8%
CVE-2019-0752KEV
High

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer

MicrosoftEPSS 92.0%
CVE-2022-24086KEV
High

Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.

AdobeEPSS 93.5%
CVE-2017-9841KEV
High

PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

PHPUnitEPSS 94.2%
CVE-2018-8174KEV
High

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution"

MicrosoftEPSS 94.3%
CVE-2014-1761KEV
High

Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.

MicrosoftEPSS 93.1%
CVE-2022-22620KEV
High

Apple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.

AppleEPSS 4.0%
CVE-2017-0262KEV
High

A remote code execution vulnerability exists in Microsoft Office.

MicrosoftEPSS 65.1%
CVE-2017-0145KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 93.3%
CVE-2017-0144KEV
High

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

MicrosoftEPSS 94.3%
CVE-2017-8464KEV
High

Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file

MicrosoftEPSS 93.9%
CVE-2014-4404KEV
High

Heap-based buffer overflow in IOHIDFamily in Apple OS X, which affects, iOS before 8 and Apple TV before 7, allows attackers to execute arbitrary code in a privileged context.

AppleEPSS 62.0%
CVE-2017-9791KEV
High

The Struts 1 plugin in Apache Struts might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.

ApacheEPSS 94.2%
CVE-2020-0796KEV
High

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

MicrosoftEPSS 94.4%