Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2010-4344 KEV |
|
[KEV] Buffer Overflow in exim (CVE-2010-4344)
vulnerability in exim (CVE-2010-4344). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-3035 KEV |
|
[KEV] Vulnerability in Cisco ios-xr (CVE-2010-3035)
vulnerability in Cisco ios-xr (CVE-2010-3035). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2010-2861 KEV |
|
[KEV] Path Traversal in Adobe coldfusion (CVE-2010-2861)
path traversal in Adobe coldfusion (CVE-2010-2861). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-2055 KEV |
|
[KEV] Vulnerability in Cisco ios-xr (CVE-2009-2055)
vulnerability in Cisco ios-xr (CVE-2009-2055). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-1151 KEV |
|
[KEV] Code Injection in phpmyadmin (CVE-2009-1151)
code injection in phpmyadmin (CVE-2009-1151). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-0927 KEV |
|
[KEV] Vulnerability in Adobe reader-and-acrobat (CVE-2009-0927)
vulnerability in Adobe reader-and-acrobat (CVE-2009-0927). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2005-2773 KEV |
|
[KEV] Vulnerability in Hewlett packard (hp) hewlett-packard-hp (CVE-2005-2773)
vulnerability in Hewlett packard (hp) hewlett-packard-hp (CVE-2005-2773). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2020-5135 KEV |
|
[KEV] Vulnerability in Sonicwall sonicos (CVE-2020-5135)
vulnerability in Sonicwall sonicos (CVE-2020-5135). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1405 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1405)
vulnerability in Microsoft windows (CVE-2019-1405). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1322 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1322)
vulnerability in Microsoft windows (CVE-2019-1322). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1315 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1315)
vulnerability in Microsoft windows (CVE-2019-1315). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1253 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1253)
vulnerability in Microsoft windows (CVE-2019-1253). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1132 KEV |
|
[KEV] Vulnerability in Microsoft win32k (CVE-2019-1132)
vulnerability in Microsoft win32k (CVE-2019-1132). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1129 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1129)
vulnerability in Microsoft windows (CVE-2019-1129). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1069 KEV |
|
[KEV] Vulnerability in Microsoft task-scheduler (CVE-2019-1069)
vulnerability in Microsoft task-scheduler (CVE-2019-1069). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1064 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-1064)
vulnerability in Microsoft windows (CVE-2019-1064). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-0841 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2019-0841)
vulnerability in Microsoft windows (CVE-2019-0841). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-0543 KEV |
|
[KEV] Authentication Bypass in Microsoft windows (CVE-2019-0543)
authentication bypass in Microsoft windows (CVE-2019-0543). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-8120 KEV |
|
[KEV] Vulnerability in Microsoft win32k (CVE-2018-8120)
vulnerability in Microsoft win32k (CVE-2018-8120). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-0101 KEV |
|
[KEV] Buffer Overflow in Microsoft windows (CVE-2017-0101)
vulnerability in Microsoft windows (CVE-2017-0101). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-3309 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2016-3309)
vulnerability in Microsoft windows (CVE-2016-3309). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2015-2546 KEV |
|
[KEV] Buffer Overflow in Microsoft win32k (CVE-2015-2546)
vulnerability in Microsoft win32k (CVE-2015-2546). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-26486 KEV |
|
[KEV] Use-After-Free in Mozilla firefox (CVE-2022-26486)
vulnerability in Mozilla firefox (CVE-2022-26486). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-26485 KEV |
|
[KEV] Use-After-Free in Mozilla firefox (CVE-2022-26485)
vulnerability in Mozilla firefox (CVE-2022-26485). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-21973 KEV |
|
[KEV] Vulnerability in Vmware vcenter-server-and-cloud-foundation (CVE-2021-21973)
vulnerability in Vmware vcenter-server-and-cloud-foundation (CVE-2021-21973). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2020-8218 KEV |
|
[KEV] Code Injection in Pulse secure pulse-secure (CVE-2020-8218)
code injection in Pulse secure pulse-secure (CVE-2020-8218). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-11581 KEV |
|
[KEV] Vulnerability in Atlassian jira-server-and-data-center (CVE-2019-11581)
vulnerability in Atlassian jira-server-and-data-center (CVE-2019-11581). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2017-6077 KEV |
|
[KEV] OS Command Injection in Netgear wireless-router-dgn2200 (CVE-2017-6077)
OS command injection in Netgear wireless-router-dgn2200 (CVE-2017-6077). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2016-6277 KEV |
|
[KEV] Cross-Site Request Forgery (CSRF) in Netgear multiple-routers (CVE-2016-6277)
vulnerability in Netgear multiple-routers (CVE-2016-6277). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-0631 KEV |
|
[KEV] Information Disclosure in Adobe coldfusion (CVE-2013-0631)
vulnerability in Adobe coldfusion (CVE-2013-0631). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-0629 KEV |
|
[KEV] Vulnerability in Adobe coldfusion (CVE-2013-0629)
vulnerability in Adobe coldfusion (CVE-2013-0629). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2013-0625 KEV |
|
[KEV] Vulnerability in Adobe coldfusion (CVE-2013-0625)
vulnerability in Adobe coldfusion (CVE-2013-0625). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2009-3960 KEV |
|
[KEV] Vulnerability in Adobe blazeds (CVE-2009-3960)
vulnerability in Adobe blazeds (CVE-2009-3960). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-20708 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv160 (CVE-2022-20708)
vulnerability in Cisco small-business-rv160 (CVE-2022-20708). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-20703 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv160 (CVE-2022-20703)
vulnerability in Cisco small-business-rv160 (CVE-2022-20703). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-20701 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv160 (CVE-2022-20701)
vulnerability in Cisco small-business-rv160 (CVE-2022-20701). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-20700 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv160 (CVE-2022-20700)
vulnerability in Cisco small-business-rv160 (CVE-2022-20700). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2022-20699 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv160 (CVE-2022-20699)
vulnerability in Cisco small-business-rv160 (CVE-2022-20699). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2021-41379 KEV |
|
[KEV] Vulnerability in Microsoft windows (CVE-2021-41379)
vulnerability in Microsoft windows (CVE-2021-41379). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2020-1938 KEV |
|
[KEV] Vulnerability in Apache tomcat (CVE-2020-1938)
vulnerability in Apache tomcat (CVE-2020-1938). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2020-11899 KEV |
|
[KEV] Out-of-Bounds Read in Treck tcp/ip stack treck-tcpip-stack (CVE-2020-11899)
vulnerability in Treck tcp/ip stack treck-tcpip-stack (CVE-2020-11899). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-16928 KEV |
|
[KEV] Out-of-Bounds Write in exim (CVE-2019-16928)
out-of-bounds write in exim (CVE-2019-16928). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1652 KEV |
|
[KEV] Vulnerability in Cisco small-business-rv320-and-rv325-dual-gigabit-wan-vpn-routers (CVE-2019-1652)
vulnerability in Cisco small-business-rv320-and-rv325-dual-gigabit-wan-vpn-routers (CVE-2019-1652). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2019-1297 KEV |
|
[KEV] Vulnerability in Microsoft excel (CVE-2019-1297)
vulnerability in Microsoft excel (CVE-2019-1297). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-8581 KEV |
|
[KEV] Vulnerability in Microsoft exchange-server (CVE-2018-8581)
vulnerability in Microsoft exchange-server (CVE-2018-8581). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-8298 KEV |
|
[KEV] Vulnerability in chakracore (CVE-2018-8298)
vulnerability in chakracore (CVE-2018-8298). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-0180 KEV |
|
[KEV] Vulnerability in Cisco ios-software (CVE-2018-0180)
vulnerability in Cisco ios-software (CVE-2018-0180). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-0179 KEV |
|
[KEV] Vulnerability in Cisco ios-software (CVE-2018-0179)
vulnerability in Cisco ios-software (CVE-2018-0179). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-0175 KEV |
|
[KEV] Buffer Overflow in Cisco ios (CVE-2018-0175)
vulnerability in Cisco ios (CVE-2018-0175). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|
| CVE-2018-0174 KEV |
|
[KEV] Vulnerability in Cisco ios-xe-software (CVE-2018-0174)
vulnerability in Cisco ios-xe-software (CVE-2018-0174). Risk of unauthorized operations or information disclosure. Listed in CISA KEV — actively exploited.
|