Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,235

Total CVEs

1,590

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1600
MEDIUM 7
INFO 620

Showing 20 of 2,235 CVEs

CVE-2014-2817KEV
High

Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

MicrosoftEPSS 26.4%
CVE-2015-0071KEV
High

Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web site.

MicrosoftEPSS 37.0%
CVE-2013-0422KEV
High

A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.

OracleEPSS 93.8%
CVE-2016-7256KEV
High

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system.

MicrosoftEPSS 65.1%
CVE-2015-6175KEV
High

The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application.

MicrosoftEPSS 2.8%
CVE-2014-8439KEV
High

Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.

AdobeEPSS 27.1%
CVE-2010-1428KEV
High

Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.

Red HatEPSS 65.3%
CVE-2015-1671KEV
High

A remote code execution vulnerability exists when components of Windows, .NET Framework, Office, Lync, and Silverlight fail to properly handle TrueType fonts.

MicrosoftEPSS 85.9%
CVE-2014-3153KEV
High

The futex_requeue function in kernel/futex.c in Linux kernel does not ensure that calls have two different futex addresses, which allows local users to gain privileges.

LinuxEPSS 68.9%
CVE-2013-2423KEV
High

Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.

OracleEPSS 93.4%
CVE-2014-4148KEV
High

A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.

MicrosoftEPSS 53.1%
CVE-2010-0738KEV
High

The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.

Red HatEPSS 90.9%
CVE-2015-0310KEV
High

Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the address space layout randomization (ASLR) protection mechanism.

AdobeEPSS 5.4%
CVE-2016-0034KEV
High

Microsoft Silverlight mishandles negative offsets during decoding, which allows attackers to execute remote code or cause a denial-of-service (DoS).

MicrosoftEPSS 40.5%
CVE-2015-2425KEV
High

Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).

MicrosoftEPSS 34.1%
CVE-2014-4123KEV
High

Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.

MicrosoftEPSS 53.6%
CVE-2016-0984KEV
High

Use-after-free vulnerability in Adobe Flash Player and Adobe AIR allows attackers to execute code.

AdobeEPSS 75.9%
CVE-2015-0016KEV
High

Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers to escalate privileges.

MicrosoftEPSS 92.1%
CVE-2015-4495KEV
High

Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.

MozillaEPSS 71.6%
CVE-2014-0546KEV
High

Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

AdobeEPSS 29.7%