38 CISA Known Exploited Vulnerabilities from 2013
Oracle Java Runtime Environment (JRE) — Oracle JRE Remote Code Execution Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE Unspecified Vulnerability
CVSS 9.8Adobe Reader and Acrobat — Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability
CVSS 9.8Apache Struts — Apache Struts Improper Input Validation Vulnerability
CVSS 9.8Hewlett Packard (HP) ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management — HP Multiple Products Remote Code Execution Vulnerability
CVSS 9.8Adobe ColdFusion — Adobe ColdFusion Authentication Bypass Vulnerability
CVSS 9.8Adobe ColdFusion — Adobe ColdFusion Authentication Bypass Vulnerability
CVSS 9.8Adobe Reader and Acrobat — Adobe Reader and Acrobat Memory Corruption Vulnerability
CVSS 9.8Microsoft Windows — Microsoft Windows Out-of-Bounds Write Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Resource Management Errors Vulnerability
CVSS 8.8Adobe Flash Player — Adobe Flash Player Incorrect Default Permissions Vulnerability
CVSS 8.8Adobe Flash Player — Adobe Flash Player Code Execution Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Memory Corruption Vulnerability
CVSS 8.8Linux Kernel — Linux Kernel Improper Input Validation Vulnerability
CVSS 8.8Mozilla Firefox and Thunderbird — Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Use-After-Free Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Remote Code Execution Vulnerability
CVSS 8.8Microsoft Internet Explorer — Microsoft Internet Explorer Use-After-Free Vulnerability
CVSS 8.8Linux Kernel — perf_swevent_enabled Out-of-Bounds Write via Unchecked attr.config for Local Privilege Escalation
CVSS 8.4Code Aurora ACDB Audio Driver — Code Aurora ACDB Audio Driver Stack-based Buffer Overflow Vulnerability
CVSS 8.4Linux Kernel — Linux Kernel Integer Overflow Vulnerability
CVSS 7.8Microsoft Office — Microsoft Office Buffer Overflow Vulnerability
CVSS 7.8Microsoft Silverlight — Microsoft Silverlight Double Dereference Vulnerability
CVSS 7.8Microsoft Win32k — Microsoft Win32k Privilege Escalation Vulnerability
CVSS 7.8Adobe Reader and Acrobat — Adobe Reader and Acrobat Memory Corruption Vulnerability
CVSS 7.8Adobe Reader — Adobe Reader Buffer Overflow Vulnerability
CVSS 7.8Microsoft Windows — Microsoft Windows Kernel Privilege Escalation Vulnerability
CVSS 7.8Microsoft Graphics Component — Microsoft Graphics Component Memory Corruption Vulnerability
CVSS 7.8Adobe ColdFusion — Adobe ColdFusion Directory Traversal Vulnerability
CVSS 7.5Adobe ColdFusion — Adobe ColdFusion Information Disclosure Vulnerability
CVSS 7.5IBM InfoSphere BigInsights — IBM InfoSphere BigInsights Invalid Input Vulnerability
CVSS 6.5Microsoft Internet Explorer — Microsoft Internet Explorer Information Disclosure Vulnerability
CVSS 6.5Mozilla Firefox — Mozilla Firefox Information Disclosure Vulnerability
CVSS 6.5Microsoft Silverlight — Microsoft Silverlight Information Disclosure Vulnerability
CVSS 5.5Microsoft WinVerifyTrust function — Microsoft WinVerifyTrust function Remote Code Execution
CVSS 5.5D-Link DSL-2760U — D-Link DSL-2760U Gateway Cross-Site Scripting Vulnerability
CVSS 5.4Oracle Java Runtime Environment (JRE) — Oracle JRE Sandbox Bypass Vulnerability
CVSS 5.3Oracle Java Runtime Environment (JRE) — Oracle JRE Unspecified Vulnerability
CVSS 3.7