Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 2,235 CVEs

CVE-2016-5198KEV
High

Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to perform read/write operations, leading to code execution, via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 77.9%
CVE-2012-0754KEV
High

Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 91.5%
CVE-2013-1331KEV
High

Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via crafted PNG data in an Office document.

MicrosoftEPSS 88.9%
CVE-2018-4990KEV
High

Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution.

AdobeEPSS 62.0%
CVE-2009-0557KEV
High

Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.

MicrosoftEPSS 86.4%
CVE-2006-2492KEV
High

Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.

MicrosoftEPSS 83.2%
CVE-2009-1862KEV
High

Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 58.6%
CVE-2011-2462KEV
High

The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 91.9%
CVE-2018-17480KEV
High

Google Chromium V8 Engine contains out-of-bounds write vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 27.0%
CVE-2009-3953KEV
High

Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.

AdobeEPSS 90.5%
CVE-2009-0563KEV
High

Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.

MicrosoftEPSS 79.9%
CVE-2018-17463KEV
High

Google Chromium V8 Engine contains an unspecified vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

GoogleEPSS 92.2%
CVE-2009-4324KEV
High

Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.

AdobeEPSS 92.9%
CVE-2010-1297KEV
High

Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

AdobeEPSS 93.0%
CVE-2010-2572KEV
High

Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.

MicrosoftEPSS 74.7%
CVE-2008-0655KEV
High

Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.

AdobeEPSS 68.8%
CVE-2019-7193KEV
High

QNAP QTS contains an improper input validation vulnerability allowing remote attackers to inject code on the system.

QNAPEPSS 25.8%
CVE-2022-26134KEV
High

Atlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.

AtlassianCVSS 9.8EPSS 94.4%
Exploit
CVE-2013-0074KEV
High

Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application.

MicrosoftEPSS 93.1%
CVE-2013-3896KEV
High

Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.

MicrosoftEPSS 81.6%