21 CISA Known Exploited Vulnerabilities from 2010
SAP NetWeaver — SAP NetWeaver Remote Code Execution Vulnerability
CVSS 10Mozilla Multiple Products — Mozilla Multiple Products Remote Code Execution Vulnerability
CVSS 9.8Oracle Java Runtime Environment (JRE) — Oracle JRE Unspecified Vulnerability
CVSS 9.8Ubiquiti AirOS — Ubiquiti AirOS Command Injection Vulnerability
CVSS 9.8Adobe ColdFusion — Adobe ColdFusion Directory Traversal Vulnerability
CVSS 9.8Exim Exim — Exim Heap-Based Buffer Overflow Vulnerability
CVSS 9.8Red Hat JBoss Seam 2 — Red Hat Linux JBoss Seam 2 Remote Code Execution Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability
CVSS 8.1Linux Kernel — Linux Kernel Improper Input Validation Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Remote Code Execution Vulnerability
CVSS 7.8Adobe Flash Player — Adobe Flash Player Memory Corruption Vulnerability
CVSS 7.8Microsoft PowerPoint — Microsoft PowerPoint Buffer Overflow Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Kernel Stack-Based Buffer Overflow Vulnerability
CVSS 7.8Exim Exim — Exim Privilege Escalation Vulnerability
CVSS 7.8Adobe Reader and Acrobat — Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Kernel Exception Handler Vulnerability
CVSS 7.8Microsoft Office — Microsoft Office Stack-based Buffer Overflow Vulnerability
CVSS 7.8Red Hat JBoss — Red Hat JBoss Information Disclosure Vulnerability
CVSS 7.5Cisco IOS XR — Cisco IOS XR Border Gateway Protocol (BGP) Denial-of-Service Vulnerability
CVSS 7.5Adobe Acrobat and Reader — Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability
CVSS 7.3Red Hat JBoss — Red Hat JBoss Authentication Bypass Vulnerability
CVSS 5.3