Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 2,235 CVEs

CVE-2016-2386KEV
High

SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

SAPEPSS 44.0%
CVE-2016-2388KEV
High

The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request.

SAPEPSS 62.3%
CVE-2007-5659KEV
High

Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.

AdobeEPSS 93.1%
CVE-2010-2883KEV
High

Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 93.2%
CVE-2019-7195KEV
High

QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files.

QNAPEPSS 94.1%
CVE-2019-7194KEV
High

QNAP devices running Photo Station contain an external control of file name or path vulnerability allowing remote attackers to access or modify system files.

QNAPEPSS 93.9%
CVE-2019-5825KEV
High

Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 73.7%
CVE-2019-7192KEV
High

QNAP NAS devices running Photo Station contain an improper access control vulnerability allowing remote attackers to gain unauthorized access to the system.

QNAPEPSS 94.3%
CVE-2012-0151KEV
High

The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.

MicrosoftEPSS 89.0%
CVE-2016-1646KEV
High

Google Chromium V8 Engine contains an out-of-bounds read vulnerability that allows a remote attacker to cause a denial of service or possibly have another unspecified impact via crafted JavaScript code. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 66.5%
CVE-2017-6862KEV
High

Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code execution.

NETGEAREPSS 37.5%
CVE-2019-15271KEV
High

A deserialization of untrusted data vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an attacker to execute code with root privileges.

CiscoEPSS 5.6%
CVE-2012-1889KEV
High

Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.

MicrosoftEPSS 92.9%
CVE-2012-5054KEV
High

Adobe Flash Player contains an integer overflow vulnerability that allows remote attackers to execute code via malformed arguments.

AdobeEPSS 76.6%
CVE-2017-5070KEV
High

Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 71.1%
CVE-2012-0767KEV
High

Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.

AdobeEPSS 16.3%
CVE-2018-6065KEV
High

Google Chromium V8 Engine contains an integer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 88.8%
CVE-2017-5030KEV
High

Google Chromium V8 Engine contains a memory corruption vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 50.7%
CVE-2012-4969KEV
High

Microsoft Internet Explorer contains a use-after-free vulnerability that allows remote attackers to execute code via a crafted web site.

MicrosoftEPSS 91.8%
CVE-2011-0609KEV
High

Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 92.0%