Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2021-38163 KEV |
|
[KEV] Vulnerability in Sap netweaver (CVE-2021-38163)
vulnerability in Sap netweaver (CVE-2021-38163). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-2386 KEV |
|
[KEV] SQL Injection in Sap netweaver (CVE-2016-2386)
SQL injection in Sap netweaver (CVE-2016-2386). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-2388 KEV |
|
[KEV] Information Disclosure in Sap netweaver (CVE-2016-2388)
vulnerability in Sap netweaver (CVE-2016-2388). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-7195 KEV |
|
[KEV] Path Traversal in Qnap photo-station (CVE-2019-7195)
path traversal in Qnap photo-station (CVE-2019-7195). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-7194 KEV |
|
[KEV] Path Traversal in Qnap photo-station (CVE-2019-7194)
path traversal in Qnap photo-station (CVE-2019-7194). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-7193 KEV |
|
[KEV] Vulnerability in Qnap qts (CVE-2019-7193)
vulnerability in Qnap qts (CVE-2019-7193). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-7192 KEV |
|
[KEV] Authorization Flaw in Qnap photo-station (CVE-2019-7192)
vulnerability in Qnap photo-station (CVE-2019-7192). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-5825 KEV |
|
[KEV] Out-of-Bounds Write in Google chromium-v8 (CVE-2019-5825)
out-of-bounds write in Google chromium-v8 (CVE-2019-5825). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-15271 KEV |
|
[KEV] Unsafe Deserialization in Cisco rv-series-routers (CVE-2019-15271)
vulnerability in Cisco rv-series-routers (CVE-2019-15271). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-6065 KEV |
|
[KEV] Vulnerability in Google chromium-v8 (CVE-2018-6065)
vulnerability in Google chromium-v8 (CVE-2018-6065). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-4990 KEV |
|
[KEV] Vulnerability in Adobe acrobat-and-reader (CVE-2018-4990)
vulnerability in Adobe acrobat-and-reader (CVE-2018-4990). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-17480 KEV |
|
[KEV] Out-of-Bounds Write in Google chromium-v8 (CVE-2018-17480)
out-of-bounds write in Google chromium-v8 (CVE-2018-17480). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-17463 KEV |
|
[KEV] Vulnerability in Google chromium-v8 (CVE-2018-17463)
vulnerability in Google chromium-v8 (CVE-2018-17463). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-6862 KEV |
|
[KEV] Buffer Overflow in Netgear multiple-devices (CVE-2017-6862)
vulnerability in Netgear multiple-devices (CVE-2017-6862). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-5070 KEV |
|
[KEV] Vulnerability in Google chromium-v8 (CVE-2017-5070)
vulnerability in Google chromium-v8 (CVE-2017-5070). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-5030 KEV |
|
[KEV] Out-of-Bounds Read in Google chromium-v8 (CVE-2017-5030)
vulnerability in Google chromium-v8 (CVE-2017-5030). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-5198 KEV |
|
[KEV] Out-of-Bounds Read in Google chromium-v8 (CVE-2016-5198)
vulnerability in Google chromium-v8 (CVE-2016-5198). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-1646 KEV |
|
[KEV] Buffer Overflow in Google chromium-v8 (CVE-2016-1646)
vulnerability in Google chromium-v8 (CVE-2016-1646). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-1331 KEV |
|
[KEV] Buffer Overflow in Microsoft office (CVE-2013-1331)
vulnerability in Microsoft office (CVE-2013-1331). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-5054 KEV |
|
[KEV] Vulnerability in Adobe flash-player (CVE-2012-5054)
vulnerability in Adobe flash-player (CVE-2012-5054). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-4969 KEV |
|
[KEV] Vulnerability in Microsoft internet-explorer (CVE-2012-4969)
vulnerability in Microsoft internet-explorer (CVE-2012-4969). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-1889 KEV |
|
[KEV] Buffer Overflow in Microsoft xml-core-services (CVE-2012-1889)
vulnerability in Microsoft xml-core-services (CVE-2012-1889). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-0767 KEV |
|
[KEV] Cross-Site Scripting (XSS) in Adobe flash-player (CVE-2012-0767)
cross-site scripting in Adobe flash-player (CVE-2012-0767). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-0754 KEV |
|
[KEV] Out-of-Bounds Write in Adobe flash-player (CVE-2012-0754)
out-of-bounds write in Adobe flash-player (CVE-2012-0754). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2012-0151 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2012-0151)
vulnerability in Microsoft windows (CVE-2012-0151). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2011-2462 KEV |
|
[KEV] Out-of-Bounds Write in Adobe reader-and-acrobat (CVE-2011-2462)
out-of-bounds write in Adobe reader-and-acrobat (CVE-2011-2462). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2011-0609 KEV |
|
[KEV] Vulnerability in Adobe flash-player (CVE-2011-0609)
vulnerability in Adobe flash-player (CVE-2011-0609). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-2883 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2010-2883)
vulnerability in Adobe acrobat-and-reader (CVE-2010-2883). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-2572 KEV |
|
[KEV] Buffer Overflow in Microsoft powerpoint (CVE-2010-2572)
vulnerability in Microsoft powerpoint (CVE-2010-2572). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-1297 KEV |
|
[KEV] Out-of-Bounds Write in Adobe flash-player (CVE-2010-1297)
out-of-bounds write in Adobe flash-player (CVE-2010-1297). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-4324 KEV |
|
[KEV] Vulnerability in Adobe acrobat-and-reader (CVE-2009-4324)
vulnerability in Adobe acrobat-and-reader (CVE-2009-4324). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-3953 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2009-3953)
vulnerability in Adobe acrobat-and-reader (CVE-2009-3953). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-1862 KEV |
|
[KEV] Code Injection in Adobe acrobat-and-reader (CVE-2009-1862)
code injection in Adobe acrobat-and-reader (CVE-2009-1862). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-0563 KEV |
|
[KEV] Buffer Overflow in Microsoft office (CVE-2009-0563)
vulnerability in Microsoft office (CVE-2009-0563). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-0557 KEV |
|
[KEV] Code Injection in Microsoft office (CVE-2009-0557)
code injection in Microsoft office (CVE-2009-0557). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2008-0655 KEV |
|
[KEV] Vulnerability in Adobe acrobat-and-reader (CVE-2008-0655)
vulnerability in Adobe acrobat-and-reader (CVE-2008-0655). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2007-5659 KEV |
|
[KEV] Buffer Overflow in Adobe acrobat-and-reader (CVE-2007-5659)
vulnerability in Adobe acrobat-and-reader (CVE-2007-5659). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2006-2492 KEV |
|
[KEV] Vulnerability in Microsoft word (CVE-2006-2492)
vulnerability in Microsoft word (CVE-2006-2492). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-26134 KEV |
|
[KEV] Vulnerability in Atlassian confluence-serverdata-center (CVE-2022-26134)
vulnerability in Atlassian confluence-serverdata-center (CVE-2022-26134). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-3010 KEV |
|
[KEV] Vulnerability in Oracle solaris (CVE-2019-3010)
vulnerability in Oracle solaris (CVE-2019-3010). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-3393 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2016-3393)
vulnerability in Microsoft windows (CVE-2016-3393). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-7256 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2016-7256)
vulnerability in Microsoft windows (CVE-2016-7256). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-1010 KEV |
|
[KEV] Vulnerability in Adobe flash-player-and-air (CVE-2016-1010)
vulnerability in Adobe flash-player-and-air (CVE-2016-1010). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-0984 KEV |
|
[KEV] Use-After-Free in Adobe flash-player-and-air (CVE-2016-0984)
vulnerability in Adobe flash-player-and-air (CVE-2016-0984). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-0034 KEV |
|
[KEV] Vulnerability in Microsoft silverlight (CVE-2016-0034)
vulnerability in Microsoft silverlight (CVE-2016-0034). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-0310 KEV |
|
[KEV] Vulnerability in Adobe flash-player (CVE-2015-0310)
vulnerability in Adobe flash-player (CVE-2015-0310). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-0016 KEV |
|
[KEV] Path Traversal in Microsoft windows (CVE-2015-0016)
path traversal in Microsoft windows (CVE-2015-0016). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-0071 KEV |
|
[KEV] Vulnerability in Microsoft internet-explorer (CVE-2015-0071)
vulnerability in Microsoft internet-explorer (CVE-2015-0071). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2360 KEV |
|
[KEV] Buffer Overflow in Microsoft win32k (CVE-2015-2360)
vulnerability in Microsoft win32k (CVE-2015-2360). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2425 KEV |
|
[KEV] Buffer Overflow in Microsoft internet-explorer (CVE-2015-2425)
vulnerability in Microsoft internet-explorer (CVE-2015-2425). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|