www.cisa.gov Open in urlscan Pro
2a02:26f0:7100:1b8::447a  Public Scan

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Submission: On June 13 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here's how you know
 * REPORT
 * SUBSCRIBE
 * CONTACT
 * SITE MAP

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.
×

search
 



--------------------------------------------------------------------------------


Toggle navigation
×

search
 


CISA NAVIGATION

 * 
 * 
 * 
 * 
 * 
 * 

--------------------------------------------------------------------------------

TLP:WHITE
TLP:WHITE


KNOWN EXPLOITED VULNERABILITIES CATALOG

Download CSV version

Download JSON version

Download JSON schema

Subscribe to the Known Exploited Vulnerabilities Catalog Update Bulletin

Back to previous page for background on known exploited vulnerabilities

Show 102550100 entries
Search:

CVEVendor/ProjectProductVulnerability NameDate Added to CatalogShort
DescriptionActionDue DateNotesCVE-2021-27104 Accellion
FTA Accellion FTA OS Command Injection Vulnerability 2021-11-03 Accellion FTA
9_12_370 and earlier is affected by OS command execution via a crafted POST
request to various admin endpoints. Apply updates per vendor instructions.
2021-11-17   CVE-2021-27102 Accellion
FTA Accellion FTA OS Command Injection Vulnerability 2021-11-03 Accellion FTA
9_12_411 and earlier is affected by OS command execution via a local web service
call. Apply updates per vendor instructions. 2021-11-17   CVE-2021-27101
Accellion
FTA Accellion FTA SQL Injection Vulnerability 2021-11-03 Accellion FTA 9_12_370
and earlier is affected by SQL injection via a crafted Host header in a request
to document_root.html. Apply updates per vendor instructions. 2021-11-17  
CVE-2021-27103 Accellion
FTA Accellion FTA SSRF Vulnerability 2021-11-03 Accellion FTA 9_12_411 and
earlier is affected by SSRF via a crafted POST request to wmProgressstat.html.
Apply updates per vendor instructions. 2021-11-17   CVE-2021-21017 Adobe
Acrobat and Reader Adobe Acrobat and Reader Heap-based Buffer Overflow
Vulnerability 2021-11-03 Acrobat Reader DC versions versions 2020.013.20074 (and
earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are
affected by a heap-based buffer overflow vulnerability. An unauthenticated
attacker could leverage this vulnerability to achieve arbitrary code execution
in the context of the current user. Exploitation of this issue requires user
interaction in that a victim must open a malicious file. Apply updates per
vendor instructions. 2021-11-17   CVE-2021-28550 Adobe
Acrobat and Reader Adobe Acrobat and Reader Use-After-Free Vulnerability
2021-11-03 Acrobat Reader DC versions versions 2021.001.20150 (and earlier),
2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a
Use After Free vulnerability. An unauthenticated attacker could leverage this
vulnerability to achieve arbitrary code execution in the context of the current
user. Exploitation of this issue requires user interaction in that a victim must
open a malicious file. Apply updates per vendor instructions. 2021-11-17  
CVE-2018-4939 Adobe
ColdFusion Adobe ColdFusion Deserialization of Untrusted Data vulnerability
2021-11-03 Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update
13 and earlier versions have an exploitable Deserialization of Untrusted Data
vulnerability. Successful exploitation could lead to arbitrary code execution.
Apply updates per vendor instructions. 2022-05-03   CVE-2018-15961 Adobe
ColdFusion Adobe ColdFusion Remote Code Execution 2021-11-03 Adobe ColdFusion
versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14
and earlier have an unrestricted file upload vulnerability. Successful
exploitation could lead to arbitrary code execution. Apply updates per vendor
instructions. 2022-05-03   CVE-2018-4878 Adobe
Flash Player Adobe Flash Player Use-After-Free Vulnerability 2021-11-03 A
use-after-free vulnerability was discovered in Adobe Flash Player before
28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime
SDK related to media player handling of listener objects. A successful attack
can lead to arbitrary code execution. This was exploited in the wild in January
and February 2018. The impacted product is end-of-life and should be
disconnected if still in use. 2022-05-03   CVE-2020-5735 Amcrest
Cameras and Network Video Recorder (NVR) Amcrest Camera and NVR Buffer Overflow
Vulnerability 2021-11-03 Amcrest cameras and NVR are vulnerable to a stack-based
buffer overflow over port 37777. An authenticated remote attacker can abuse this
issue to crash the device and possibly execute arbitrary code. Apply updates per
vendor instructions. 2022-05-03  

Showing 1 to 10 of 777 entries
Previous12345…78Next
Back to top
Cybersecurity & Infrastructure Security Agency
CONTACT SUBSCRIBE
        
REPORT
 

Need CISA’s help but don’t know where to start? Contact CISA Central(link sends
email)

 
Accountability   Privacy Policy   FOIA   No Fear Act   Accessibility   Plain
Writing   Plug-ins   Inspector General   DHS   The White House   USA.gov