www.cisa.gov Open in urlscan Pro
2a02:26f0:480:58c::447a  Public Scan

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Submission: On May 22 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   Locally
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Contact Us
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home

Share:




KNOWN EXPLOITED VULNERABILITIES CATALOG



Download CSV version

Download JSON version

Download JSON schema

Subscribe to the Known Exploited Vulnerabilities Catalog Update Bulletin(link is
external)

Back to previous page for background on known exploited vulnerabilities

Show 102550100 entries
Search:

CVEVendor/ProjectProductVulnerability NameDate Added to CatalogShort
DescriptionActionDue DateNotesCVE-2023-32409 Apple Webkit Multiple Products
Apple Multiple Products WebKit Sandbox Escape Vulnerability 2023-05-22 Apple
iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified
vulnerability that can allow a remote attacker to break out of the Web Content
sandbox. Apply updates per vendor instructions. 2023-06-12
https://support.apple.com/HT213757, https://support.apple.com/HT213758,
https://support.apple.com/HT213761, https://support.apple.com/HT213762,
https://support.apple.com/HT213764, https://support.apple.com/HT213765
CVE-2023-28204 Apple Webkit Multiple Products Apple Multiple Products WebKit
Out-of-Bounds Read Vulnerability 2023-05-22 Apple iOS, iPadOS, macOS, tvOS,
watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may
disclose sensitive information. Apply updates per vendor instructions.
2023-06-12 https://support.apple.com/HT213757,
https://support.apple.com/HT213758, https://support.apple.com/HT213761,
https://support.apple.com/HT213762, https://support.apple.com/HT213764,
https://support.apple.com/HT213765 CVE-2023-32373 Apple Webkit Multiple Products
Apple Multiple Products WebKit Use-After-Free Vulnerability 2023-05-22 Apple
iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free
vulnerability that leads to code execution. Apply updates per vendor
instructions. 2023-06-12 https://support.apple.com/HT213757,
https://support.apple.com/HT213758, https://support.apple.com/HT213761,
https://support.apple.com/HT213762, https://support.apple.com/HT213764,
https://support.apple.com/HT213765 CVE-2004-1464 Cisco IOS Cisco IOS
Denial-of-Service Vulnerability 2023-05-19 Cisco IOS contains an unspecified
vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH),
Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP)
access to the Cisco device. Apply updates per vendor instructions. 2023-06-09
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet
CVE-2016-6415 Cisco IOS, IOS XR, and IOS XE Cisco IOS, IOS XR, and IOS XE IKEv1
Information Disclosure Vulnerability 2023-05-19 Cisco IOS, IOS XR, and IOS XE
contain insufficient condition checks in the part of the code that handles
Internet Key Exchange version 1 (IKEv1) security negotiation requests. contains
an information disclosure vulnerability in the Internet Key Exchange version 1
(IKEv1) that could allow an attacker to retrieve memory contents. Successful
exploitation could allow the attacker to retrieve memory contents, which can
lead to information disclosure. Apply updates per vendor instructions.
2023-06-09
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1
CVE-2023-21492 Samsung Mobile Devices Samsung Mobile Devices Insertion of
Sensitive Information Into Log File Vulnerability 2023-05-19 Samsung mobile
devices running Android 11, 12, and 13 contain an insertion of sensitive
information into log file vulnerability that allows a privileged, local attacker
to conduct an address space layout randomization (ASLR) bypass. Apply updates
per vendor instructions. 2023-06-09
https://security.samsungmobile.com/securityUpdate.smsb CVE-2023-25717 Ruckus
Wireless Multiple Products Multiple Ruckus Wireless Products CSRF and RCE
Vulnerability 2023-05-12 Ruckus Wireless Access Point (AP) software contains an
unspecified vulnerability in the web services component. If the web services
component is enabled on the AP, an attacker can perform cross-site request
forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus
ZoneDirector, SmartZone, and Solo APs. Apply updates per vendor instructions or
disconnect product if it is end-of-life. 2023-06-02
https://support.ruckuswireless.com/security_bulletins/315 CVE-2021-3560 Red Hat
Polkit Red Hat Polkit Incorrect Authorization Vulnerability 2023-05-12 Red Hat
Polkit contains an incorrect authorization vulnerability through the bypassing
of credential checks for D-Bus requests, allowing for privilege escalation.
Apply updates per vendor instructions. 2023-06-02
https://bugzilla.redhat.com/show_bug.cgi?id=1961710 CVE-2014-0196 Linux Kernel
Linux Kernel Race Condition Vulnerability 2023-05-12 Linux Kernel contains a
race condition vulnerability within the n_tty_write function that allows local
users to cause a denial-of-service or gain privileges via read and write
operations with long strings. The impacted product is end-of-life and should be
disconnected if still in use. 2023-06-02
https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html CVE-2010-3904 Linux
Kernel Linux Kernel Improper Input Validation Vulnerability 2023-05-12 Linux
Kernel contains an improper input validation vulnerability in the Reliable
Datagram Sockets (RDS) protocol implementation that allows local users to gain
privileges via crafted use of the sendmsg and recvmsg system calls. The impacted
product is end-of-life and should be disconnected if still in use. 2023-06-02
https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html

Showing 1 to 10 of 939 entries
Previous12345…94Next

Back to top


Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback