Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutives
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    Reporting Employee and Contractor Misconduct
    CISA GitHub
    Contact Us
Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
  1. Home
Share:

Filters

What are you looking for?

  • Accellion
  • ownCloud
  • Adobe
  • Alcatel
  • Amcrest
  • Android
  • Apache
  • Apple
  • Arcadyan
  • Arcserve
  • Arm
  • Artifex
  • Atlassian
  • Aviatrix
  • Barracuda Networks
  • BQE
  • Cacti
  • ChakraCore
  • Checkbox
  • Cisco
  • CIsco
  • Citrix
  • Code Aurora
  • Crestron
  • CWP
  • D-Link
  • D-Link and TRENDnet
  • Dasan
  • Dell
  • Delta Electronics
  • Docker
  • dotCMS
  • DotNetNuke (DNN)
  • DrayTek
  • Drupal
  • Elastic
  • Embedthis
  • Exim
  • EyesOfNetwork
  • F5
  • FatPipe
  • ForgeRock
  • Fortinet
  • Fortra
  • Fuel CMS
  • GIGABYTE
  • GitLab
  • GNU
  • Google
  • Grafana Labs
  • Grandstream
  • Hewlett Packard (HP)
  • Hikvision
  • IBM
  • IETF
  • Ignite Realtime
  • ImageMagick
  • InduSoft
  • Intel
  • Ivanti
  • Jenkins
  • JetBrains
  • Juniper
  • Kaseya
  • Kentico
  • Laravel
  • LG
  • Liferay
  • Linux
  • McAfee
  • MediaTek
  • Meta Platforms
  • Micro Focus
  • Microsoft
  • MikroTik
  • MinIO
  • Mitel
  • MongoDB
  • Mozilla
  • Nagios
  • NETGEAR
  • Netis
  • Netwrix
  • Novi Survey
  • Npm package
  • October CMS
  • OpenBSD
  • OpenSSL
  • Oracle
  • Palo Alto Networks
  • PaperCut
  • PEAR
  • Perl
  • PHP
  • phpMyAdmin
  • PHPUnit
  • Pi-hole
  • PlaySMS
  • Plex
  • Primetek
  • Progress
  • Pulse Secure
  • QNAP
  • QNAP Systems
  • Qualcomm
  • Quest
  • Rails
  • RARLAB
  • rConfig
  • Realtek
  • Red Hat
  • Redis
  • Rejetto
  • Roundcube
  • Ruckus Wireless
  • SaltStack
  • Samba
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • SIMalliance
  • Sitecore
  • SolarView
  • SolarWinds
  • Sonatype
  • SonicWall
  • Sophos
  • Sudo
  • SugarCRM
  • Sumavision
  • Symantec
  • Synacor
  • SysAid
  • TeamViewer
  • Teclib
  • Telerik
  • Tenda
  • TerraMaster
  • ThinkPHP
  • TIBCO
  • TP-Link
  • Treck TCP/IP stack
  • Trend Micro
  • Trihedral
  • TVT
  • Ubiquiti
  • Unraid
  • vBulletin
  • Veeam
  • Veritas
  • VMware
  • VMware Tanzu
  • WatchGuard
  • WebKitGTK
  • Webmin
  • WebRTC
  • WordPress
  • WSO2
  • XStream
  • Yealink
  • Zabbix
  • Zimbra
  • ZK Framework
  • Zoho
  • Zyxel
No result
Reset

Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.

How to use the KEV Catalog

The KEV catalog is also available in the following formats:

CSV
JSON
JSON Schema


Showing 61 - 80 of 1048
Apache | RocketMQ

CVE-2023-33246

Apache RocketMQ Command Execution Vulnerability
Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-09-06
  • Due Date: 2023-09-27
Resources and Notes
https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp
RARLAB | WinRAR

CVE-2023-38831

RARLAB WinRAR Code Execution Vulnerability
RARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-24
  • Due Date: 2023-09-14
Resources and Notes
http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa
Ignite Realtime | Openfire

CVE-2023-32315

Ignite Realtime Openfire Path Traversal Vulnerability
Ignite Realtime Openfire contains a path traversal vulnerability that allows an unauthenticated attacker to access restricted pages in the Openfire Admin Console reserved for administrative users.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-24
  • Due Date: 2023-09-14
Resources and Notes
https://www.igniterealtime.org/downloads/#openfire
Ivanti | Sentry

CVE-2023-38035

Ivanti Sentry Authentication Bypass Vulnerability
Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-22
  • Due Date: 2023-09-12
Resources and Notes
https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US
Veeam | Backup & Replication

CVE-2023-27532

Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability
Veeam Backup & Replication Cloud Connect component contains a missing authentication for critical function vulnerability that allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Known
  • Date Added: 2023-08-22
  • Due Date: 2023-09-12
Resources and Notes
https://www.veeam.com/kb4424
Adobe | ColdFusion

CVE-2023-26359

Adobe ColdFusion Deserialization of Untrusted Data Vulnerability
Adobe ColdFusion contains a deserialization of untrusted data vulnerability that could result in code execution in the context of the current user.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-21
  • Due Date: 2023-09-11
Resources and Notes
https://helpx.adobe.com/security/products/coldfusion/apsb23-25.html
Citrix | Content Collaboration

CVE-2023-24489

Citrix Content Collaboration ShareFile Improper Access Control Vulnerability
Citrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-16
  • Due Date: 2023-09-06
Resources and Notes
https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489
Microsoft | .NET Core and Visual Studio

CVE-2023-38180

Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability
Microsoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-09
  • Due Date: 2023-08-30
Resources and Notes
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-38180
Zyxel | P660HN-T1A Routers

CVE-2017-18368

Zyxel P660HN-T1A Routers Command Injection Vulnerability
Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-08-07
  • Due Date: 2023-08-28
Resources and Notes
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-a-new-variant-of-gafgyt-malware; https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-p660hn-t1a-dsl-cpe
Ivanti | Endpoint Manager Mobile (EPMM)

CVE-2023-35081

Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability
Ivanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-31
  • Due Date: 2023-08-21
Resources and Notes
https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US
Zimbra | Collaboration (ZCS)

CVE-2023-37580

Zimbra Collaboration (ZCS) Cross-Site Scripting (XSS) Vulnerability
Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-27
  • Due Date: 2023-08-17
Resources and Notes
https://wiki.zimbra.com/wiki/Security_Center
Apple | Multiple Products

CVE-2023-38606

Apple Multiple Products Kernel Unspecified Vulnerability
Apple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability allowing an app to modify a sensitive kernel state.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-26
  • Due Date: 2023-08-16
Resources and Notes
https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213842, https://support.apple.com/en-us/HT213843,https://support.apple.com/en-us/HT213844,https://support.apple.com/en-us/HT213845,https://support.apple.com/en-us/HT213846,https://support.apple.com/en-us/HT213848
Ivanti | Endpoint Manager Mobile (EPMM)

CVE-2023-35078

Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability
Ivanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker can also make other configuration changes including installing software and modifying security profiles on registered devices.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Known
  • Date Added: 2023-07-25
  • Due Date: 2023-08-15
Resources and Notes
https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US
Adobe | ColdFusion

CVE-2023-29298

Adobe ColdFusion Improper Access Control Vulnerability
Adobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-20
  • Due Date: 2023-08-10
Resources and Notes
https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html
Adobe | ColdFusion

CVE-2023-38205

Adobe ColdFusion Improper Access Control Vulnerability
Adobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-20
  • Due Date: 2023-08-10
Resources and Notes
https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
Citrix | NetScaler ADC and NetScaler Gateway

CVE-2023-3519

Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Known
  • Date Added: 2023-07-19
  • Due Date: 2023-08-09
Resources and Notes
https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
Microsoft | Windows

CVE-2023-36884

Microsoft Windows Search Remote Code Execution Vulnerability
Microsoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.
  • Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Known
  • Date Added: 2023-07-17
  • Due Date: 2023-08-29
Resources and Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
SolarView | Compact

CVE-2022-29303

SolarView Compact Command Injection Vulnerability
SolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.
  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-13
  • Due Date: 2023-08-03
Resources and Notes
https://jvn.jp/en/vu/JVNVU92327282/
Apple | Multiple Products

CVE-2023-37450

Apple Multiple Products WebKit Code Execution Vulnerability
Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that can allow an attacker to execute code when processing web content.
  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-13
  • Due Date: 2023-08-03
Resources and Notes
https://support.apple.com/en-us/HT213826, https://support.apple.com/en-us/HT213841, https://support.apple.com/en-us/HT213843, https://support.apple.com/en-us/HT213846, https://support.apple.com/en-us/HT213848
Microsoft | Windows

CVE-2023-32046

Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability
Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.
  • Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.
  • Known To Be Used in Ransomware Campaigns?: Unknown
  • Date Added: 2023-07-11
  • Due Date: 2023-08-01
Resources and Notes
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32046
  • Go to first pageFirst
  • Go to previous pagePrevious
  • Page 1
  • Page 2
  • Page 3
  • Currently on page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Go to next pageNext
  • Go to last pageLast

Subscribe to the KEV Catalog Updates

Stay up to date on the latest known exploited vulnerabilities.

Subscribe Now
Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback