Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

1,542

Total CVEs

1,542

CISA KEV

35

Known Exploits

9.3

Avg CVSS Score

Severity Distribution

HIGH 1542

Showing 20 of 1,542 CVEs · HIGH

CVE-2018-0798KEV
High

Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0802.

MicrosoftEPSS 94.1%
CVE-2021-1675KEV
High

Microsoft Windows Print Spooler contains an unspecified vulnerability that allows for remote code execution.

MicrosoftEPSS 94.3%
CVE-2021-36942KEV
High

Microsoft Windows Local Security Authority (LSA) contains a spoofing vulnerability allowing an unauthenticated attacker to call a method on the LSARPC interface and coerce the domain controller to authenticate against another server using NTLM.

MicrosoftEPSS 93.6%
CVE-2019-1215KEV
High

Microsoft Windows contains an unspecified vulnerability due to the way ws2ifsl.sys (Winsock) handles objects in memory, allowing for privilege escalation. Successful exploitation allows an attacker to execute code with elevated privileges.

MicrosoftEPSS 7.7%
CVE-2016-3235KEV
High

Microsoft Office Object Linking & Embedding (OLE) dynamic link library (DLL) contains a side loading vulnerability due to it improperly validating input before loading libraries. Successful exploitation allows for remote code execution.

MicrosoftEPSS 81.2%
CVE-2012-0158KEV
High

Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.

MicrosoftEPSS 94.3%
CVE-2020-1054KEV
High

Microsoft Win32k contains a privilege escalation vulnerability when the Windows kernel-mode driver fails to properly handle objects in memory. Successful exploitation allows an attacker to execute code in kernel mode.

MicrosoftEPSS 80.9%
CVE-2019-0541KEV
High

Microsoft MSHTML engine contains an improper input validation vulnerability that allows for remote code execution vulnerability.

MicrosoftEPSS 80.9%
CVE-2021-34448KEV
High

Microsoft Windows Scripting Engine contains an unspecified vulnerability that allows for memory corruption.

MicrosoftEPSS 2.0%
CVE-2019-0863KEV
High

Microsoft Windows Error Reporting (WER) contains a privilege escalation vulnerability due to the way it handles files, allowing for code execution in kernel mode.

MicrosoftEPSS 6.4%
CVE-2021-26855KEV
High

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution. This vulnerability is part of the ProxyLogon exploit chain.

MicrosoftEPSS 94.3%
CVE-2018-8653KEV
High

Microsoft Internet Explorer contains a memory corruption vulnerability due to how the Scripting Engine handles objects in memory, leading to remote code execution.

MicrosoftEPSS 23.0%
CVE-2021-27085KEV
High

Microsoft Internet Explorer contains an unspecified vulnerability that allows for remote code execution.

MicrosoftEPSS 1.6%
CVE-2018-0802KEV
High

Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0798.

MicrosoftEPSS 94.1%
CVE-2015-4852KEV
High

Oracle WebLogic Server contains a deserialization of untrusted data vulnerability within Apache Commons, which can allow for for remote code execution.

OracleEPSS 92.7%
CVE-2020-0601KEV
High

Microsoft Windows CryptoAPI (Crypt32.dll) contains a spoofing vulnerability in the way it validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. The vulnerability is also known under the moniker of CurveBall.

MicrosoftEPSS 94.1%
CVE-2020-6819KEV
High

Mozilla Firefox and Thunderbird contain a race condition vulnerability when running the nsDocShell destructor under certain conditions. The race condition creates a use-after-free vulnerability, causing unspecified impacts.

MozillaEPSS 0.3%
CVE-2020-6820KEV
High

Mozilla Firefox and Thunderbird contain a race condition vulnerability when handling a ReadableStream under certain conditions. The race condition creates a use-after-free vulnerability, causing unspecified impacts.

MozillaEPSS 5.0%
CVE-2020-0646KEV
High

Microsoft .NET Framework contains an improper input validation vulnerability that allows for remote code execution.

MicrosoftEPSS 93.9%
CVE-2020-3452KEV
High

Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an improper input validation vulnerability when HTTP requests process URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device.

CiscoEPSS 94.5%