CISA Known Exploited Vulnerabilities

This dashboard displays the latest vulnerabilities published by the Cybersecurity & Infrastructure Security Agency (CISA).

CVE-2017-0037

Microsoft Edge and Internet Explorer Type Confusion Vulnerability

Vendor: Microsoft

Product: Edge and Internet Explorer

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Microsoft Edge and Internet Explorer have a type confusion vulnerability in mshtml.dll, which allows remote code execution.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-704

CVE-2016-7201

Microsoft Edge Memory Corruption Vulnerability

Vendor: Microsoft

Product: Edge

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2016-7200

Microsoft Edge Memory Corruption Vulnerability

Vendor: Microsoft

Product: Edge

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2016-0189

Microsoft Internet Explorer Memory Corruption Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The Microsoft JScript nd VBScript engines, as used in Internet Explorer and other products, allow attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2016-0151

Ransomware

Microsoft Windows CSRSS Security Feature Bypass Vulnerability

Vendor: Microsoft

Product: Client-Server Run-time Subsystem (CSRSS)

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The Client-Server Run-time Subsystem (CSRSS) in Microsoft mismanages process tokens, which allows local users to gain privileges via a crafted application.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-264

CVE-2016-0040

Microsoft Windows Kernel Privilege Escalation Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The kernel in Microsoft Windows allows local users to gain privileges via a crafted application.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-264

CVE-2015-2426

Microsoft Windows Adobe Type Manager Library Remote Code Execution Vulnerability

Vendor: Microsoft

Product: Windows

Added: 2022-03-28

Due Date: 2022-04-18

Description:

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2015-2419

Microsoft Internet Explorer Memory Corruption Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Added: 2022-03-28

Due Date: 2022-04-18

Description:

JScript in Microsoft Internet Explorer allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2015-1770

Microsoft Office Uninitialized Memory Use Vulnerability

Vendor: Microsoft

Product: Office

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Microsoft Office allows remote attackers to execute arbitrary code via a crafted Office document.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-19

CVE-2013-3660

Microsoft Win32k Privilege Escalation Vulnerability

Vendor: Microsoft

Product: Win32k

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft does not properly initialize a pointer for the next object in a certain list, which allows local users to gain privileges.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2013-2729

Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability

Vendor: Adobe

Product: Reader and Acrobat

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Integer overflow vulnerability in Adobe Reader and Acrobat allows attackers to execute remote code.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-189

CVE-2013-2551

Ransomware

Microsoft Internet Explorer Use-After-Free Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute remote code via a crafted web site that triggers access to a deleted object.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-416

CVE-2013-2465

Ransomware

Oracle Java SE Unspecified Vulnerability

Vendor: Oracle

Product: Java SE

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to 2D

Required Action:

Apply updates per vendor instructions.

CVE-2013-1690

Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability

Vendor: Mozilla

Product: Firefox and Thunderbird

Added: 2022-03-28

Due Date: 2022-04-18

Description:

Mozilla Firefox and Thunderbird do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial-of-service (DoS) or possibly execute malicious code via a crafted web site.

Required Action:

Apply updates per vendor instructions.

CWEs:

CWE-119

CVE-2012-5076

Oracle Java SE Sandbox Bypass Vulnerability

Vendor: Oracle

Product: Java SE

Added: 2022-03-28

Due Date: 2022-04-18

Description:

The default Java security properties configuration did not restrict access to the com.sun.org.glassfish.external and com.sun.org.glassfish.gmbal packages. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions.

Required Action:

Apply updates per vendor instructions.