22 CISA Known Exploited Vulnerabilities from 2012
Oracle Fusion Middleware — Oracle Fusion Middleware Unspecified Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE Sandbox Bypass Vulnerability
CVSS 9.8PHP PHP — PHP-CGI Query String Parameter Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
CVSS 9.8Oracle Java SE — Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability
CVSS 9.8Apache Struts 2 — Apache Struts 2 Improper Input Validation Vulnerability
CVSS 9.8Oracle Fusion Middleware — Oracle Fusion Middleware Unspecified Vulnerability
CVSS 9.1Microsoft Internet Explorer — Microsoft Internet Explorer Use-After-Free Vulnerability
CVSS 8.8Microsoft XML Core Services — Microsoft XML Core Services Memory Corruption Vulnerability
CVSS 8.8Adobe Flash Player — Adobe Flash Player Integer Overflow Vulnerability
CVSS 8.8Microsoft Office — Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability
CVSS 8.8Microsoft MSCOMCTL.OCX — Microsoft MSCOMCTL.OCX Remote Code Execution Vulnerability
CVSS 8.8Adobe Flash Player — Adobe Flash Player Memory Corruption Vulnerability
CVSS 8.1Microsoft Internet Explorer — Microsoft Internet Explorer Use-After-Free Vulnerability
CVSS 8.1Microsoft VBA — DLL Hijacking via Untrusted Search Path in Office Applications
CVSS 7.8Microsoft Windows — Microsoft Windows Authenticode Signature Verification Remote Code Execution Vulnerability
CVSS 7.8Microsoft Word — Microsoft Word Remote Code Execution Vulnerability
CVSS 7.8Adobe Flash Player — Adobe Flash Player Arbitrary Code Execution Vulnerability
CVSS 7.8Adobe Flash Player — Adobe Flash Player Memory Corruption Vulnerability
CVSS 7.5Adobe Flash Player — Adobe Flash Player Cross-Site Scripting (XSS) Vulnerability
CVSS 6.1Oracle Fusion Middleware — Oracle Fusion Middleware Unspecified Vulnerability
CVSS 4.7