Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutives
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    Reporting Employee and Contractor Misconduct
    CISA GitHub
    2023YIR
    Contact Us
Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
  1. Home
Share:

Filters

What are you looking for?

  • Accellion
  • Qlik
  • Unitronics
  • FXC
  • Spreadsheet::ParseExcel
  • Google Chromium
  • Joomla!
  • ownCloud
  • Adobe
  • Alcatel
  • Amcrest
  • Android
  • Apache
  • Apple
  • Arcadyan
  • Arcserve
  • Arm
  • Artifex
  • Atlassian
  • Aviatrix
  • Barracuda Networks
  • BQE
  • Cacti
  • ChakraCore
  • Checkbox
  • Cisco
  • CIsco
  • Citrix
  • Code Aurora
  • Crestron
  • CWP
  • D-Link
  • D-Link and TRENDnet
  • Dasan
  • Dell
  • Delta Electronics
  • Docker
  • dotCMS
  • DotNetNuke (DNN)
  • DrayTek
  • Drupal
  • Elastic
  • Embedthis
  • Exim
  • EyesOfNetwork
  • F5
  • FatPipe
  • ForgeRock
  • Fortinet
  • Fortra
  • Fuel CMS
  • GIGABYTE
  • GitLab
  • GNU
  • Google
  • Grafana Labs
  • Grandstream
  • Hewlett Packard (HP)
  • Hikvision
  • IBM
  • IETF
  • Ignite Realtime
  • ImageMagick
  • InduSoft
  • Intel
  • Ivanti
  • Jenkins
  • JetBrains
  • Juniper
  • Kaseya
  • Kentico
  • Laravel
  • LG
  • Liferay
  • Linux
  • McAfee
  • MediaTek
  • Meta Platforms
  • Micro Focus
  • Microsoft
  • MikroTik
  • MinIO
  • Mitel
  • MongoDB
  • Mozilla
  • Nagios
  • NETGEAR
  • Netis
  • Netwrix
  • Novi Survey
  • Npm package
  • October CMS
  • OpenBSD
  • OpenSSL
  • Oracle
  • Palo Alto Networks
  • PaperCut
  • PEAR
  • Perl
  • PHP
  • phpMyAdmin
  • PHPUnit
  • Pi-hole
  • PlaySMS
  • Plex
  • Primetek
  • Progress
  • Pulse Secure
  • QNAP
  • QNAP Systems
  • Qualcomm
  • Quest
  • Rails
  • RARLAB
  • rConfig
  • Realtek
  • Red Hat
  • Redis
  • Rejetto
  • Roundcube
  • Ruckus Wireless
  • SaltStack
  • Samba
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • SIMalliance
  • Sitecore
  • SolarView
  • SolarWinds
  • Sonatype
  • SonicWall
  • Sophos
  • Sudo
  • SugarCRM
  • Sumavision
  • Symantec
  • Synacor
  • SysAid
  • TeamViewer
  • Teclib
  • Telerik
  • Tenda
  • TerraMaster
  • ThinkPHP
  • TIBCO
  • TP-Link
  • Treck TCP/IP stack
  • Trend Micro
  • Trihedral
  • TVT
  • Ubiquiti
  • Unraid
  • vBulletin
  • Veeam
  • Veritas
  • VMware
  • VMware Tanzu
  • WatchGuard
  • WebKitGTK
  • Webmin
  • WebRTC
  • WordPress
  • WSO2
  • XStream
  • Yealink
  • Zabbix
  • Zimbra
  • ZK Framework
  • Zoho
  • Zyxel
No result
Reset

Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.

How to use the KEV Catalog

The KEV catalog is also available in the following formats:

CSV
JSON
JSON Schema


Showing 1 - 20 of 1070
VMware | vCenter Server

CVE-2023-34048

VMware vCenter Server Out-of-Bounds Write Vulnerability
VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-22
  • Due Date: 2024-02-12
Resources and Notes
https://www.vmware.com/security/advisories/VMSA-2023-0023.html
Ivanti | Endpoint Manager Mobile (EPMM) and MobileIron Core

CVE-2023-35082

Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability
Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-18
  • Due Date: 2024-02-08
Resources and Notes
https://forums.ivanti.com/s/article/CVE-2023-35082-Remote-Unauthenticated-API-Access-Vulnerability-in-MobileIron-Core-11-2-and-older
Citrix | NetScaler ADC and NetScaler Gateway

CVE-2023-6548

Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-17
  • Due Date: 2024-01-24
Resources and Notes
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
Citrix | NetScaler ADC and NetScaler Gateway

CVE-2023-6549

Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for a denial-of-service when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-17
  • Due Date: 2024-02-07
Resources and Notes
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
Google | Chromium V8

CVE-2024-0519

Google Chromium V8 Out-of-Bounds Memory Access Vulnerability
Google Chromium V8 contains an out-of-bounds memory access vulnerability. Specific impacts from exploitation are not available at this time.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-17
  • Due Date: 2024-02-07
Resources and Notes
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
Laravel | Laravel Framework

CVE-2018-15133

Laravel Deserialization of Untrusted Data Vulnerability
Laravel Framework contains a deserialization of untrusted data vulnerability, allowing for remote command execution. This vulnerability may only be exploited if a malicious user has accessed the application encryption key (APP_KEY environment variable).
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-16
  • Due Date: 2024-02-06
Resources and Notes
https://laravel.com/docs/5.6/upgrade#upgrade-5.6.30
Ivanti | Connect Secure and Policy Secure

CVE-2024-21887

Ivanti Connect Secure and Policy Secure Command Injection Vulnerability
Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-10
  • Due Date: 2024-01-22
Resources and Notes
Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
Ivanti | Connect Secure and Policy Secure

CVE-2023-46805

Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability
Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-10
  • Due Date: 2024-01-22
Resources and Notes
Please apply mitigations per vendor instructions. For more information, please see: https://forums.ivanti.com/s/article/CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US
Microsoft | SharePoint Server

CVE-2023-29357

Microsoft SharePoint Server Privilege Escalation Vulnerability
Microsoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-10
  • Due Date: 2024-01-31
Resources and Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357
Adobe | ColdFusion

CVE-2023-38203

Adobe ColdFusion Deserialization of Untrusted Data Vulnerability
Adobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html
Adobe | ColdFusion

CVE-2023-29300

Adobe ColdFusion Deserialization of Untrusted Data Vulnerability
Adobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html
Apache | Superset

CVE-2023-27524

Apache Superset Insecure Default Initialization of Resource Vulnerability
Apache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk
Apple | Multiple Products

CVE-2023-41990

Apple Multiple Products Code Execution Vulnerability
Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://support.apple.com/en-us/HT213599, https://support.apple.com/en-us/HT213601, https://support.apple.com/en-us/HT213605, https://support.apple.com/en-us/HT213606, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213844, https://support.apple.com/en-us/HT213845
D-Link | DSL-2750B Devices

CVE-2016-20017

D-Link DSL-2750B Devices Command Injection Vulnerability
D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088
Joomla! | Joomla!

CVE-2023-23752

Joomla! Improper Access Control Vulnerability
Joomla! contains an improper access control vulnerability that allows unauthorized access to webservice endpoints.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-08
  • Due Date: 2024-01-29
Resources and Notes
https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html
Google Chromium | WebRTC

CVE-2023-7024

Google Chromium WebRTC Heap Buffer Overflow Vulnerability
Google Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to cause crashes or code execution. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-02
  • Due Date: 2024-01-23
Resources and Notes
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
Spreadsheet::ParseExcel | Spreadsheet::ParseExcel

CVE-2023-7101

Spreadsheet::ParseExcel Remote Code Execution Vulnerability
Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2024-01-02
  • Due Date: 2024-01-23
Resources and Notes
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://metacpan.org/dist/Spreadsheet-ParseExcel and Barracuda's specific implementation and fix for their downstream issue CVE-2023-7102 at https://www.barracuda.com/company/legal/esg-vulnerability
QNAP | VioStor NVR

CVE-2023-47565

QNAP VioStor NVR OS Command Injection Vulnerability
QNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-12-21
  • Due Date: 2024-01-11
Resources and Notes
https://www.qnap.com/en/security-advisory/qsa-23-48
FXC | AE1021, AE1021PE

CVE-2023-49897

FXC AE1021, AE1021PE OS Command Injection Vulnerability
FXC AE1021 and AE1021PE contain an OS command injection vulnerability that allows authenticated users to execute commands via a network.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-12-21
  • Due Date: 2024-01-11
Resources and Notes
https://www.fxc.jp/news/20231206
Unitronics | Vision PLC and HMI

CVE-2023-6448

Unitronics Vision PLC and HMI Insecure Default Password Vulnerability
Unitronics Vision Series PLCs and HMIs ship with an insecure default password, which if left unchanged, can allow attackers to execute remote commands.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-12-11
  • Due Date: 2023-12-18
Resources and Notes
Note that while it is possible to change the default password, implementors are encouraged to remove affected controllers from public networks and update the affected firmware: https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf
  • Currently on page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Go to next pageNext
  • Go to last pageLast

Subscribe to the KEV Catalog Updates

Stay up to date on the latest known exploited vulnerabilities.

Subscribe Now
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback