CINXE.COM

NVD - Home

<!DOCTYPE html> <html lang="en"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://nvd.nist.gov/","20211209155948","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1639065588"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>NVD - Home</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/css/base-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/css/media-resize.css" type="text/css" rel="stylesheet"/> <meta name="theme-color" content="#000000"> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-media/js/forms.js" type="text/javascript"></script> <!-- <script th:src="@{/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true}" type="text/javascript" id="_fed_an_js_tag"></script> --> <script src="/web/20211209155948js_/https://nvd.nist.gov/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout( tryForward(), 5000); } function tryForward(){ top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/web/20211209155948cs_/https://nvd.nist.gov/site-media/css/nvd-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16"/> <link href="/web/20211209155948/https://nvd.nist.gov/site-media/images/favicons/manifest.json" rel="manifest"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon"/> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon"/> <link href="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon"/> <meta charset="UTF-8"> <meta charset="UTF-8"> </head> <body> <div> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20211209155948/https://nvd.nist.gov/">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20211209155948/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/general"> General <span class="expander fa fa-plus" id="main-menu-expander-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/general/news">News</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/general/email-list">Email List</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/general/visualizations">Visualizations</a> </p> </div> </div> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="main-menu-expander-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/search">Search &amp; Statistics</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/full-listing">Full Listing</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/categories">Categories</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/data-feeds">Data Feeds</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="main-menu-expander-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="main-menu-expander-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/products/cpe">CPE Dictionary</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/web/20211209155948/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="main-menu-expander-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/developers">Start Here</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/web/20211209155948/https://nvd.nist.gov/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/web/20211209155948/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="main-menu-expander-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20211209155948/https://ncp.nist.gov/">Checklist (NCP) Repository</a> </p> <p> <a href="https://web.archive.org/web/20211209155948/https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="main-menu-expander-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/itl" target="_blank">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/web/20211209155948/https://nvd.nist.gov/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg">National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center">NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;"><img class="nvd-header-logo" alt="NVD Logo" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/NVD-white-55.png"/></a> </div> </div> </div> </section> </div> <div id="body-section" class="container"> <div> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav"> <li><a href="/web/20211209155948/https://nvd.nist.gov/general">General<span class="expander fa fa-plus" id="main-menu-expander-general" data-expander-name="generalSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="generalSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/general/news">News</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/general/email-list">Email List</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/general/faq">FAQ</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/general/visualizations">Visualizations</a></li> </ul> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="main-menu-expander-vulnerabilities" data-expander-name="vulnerabilitiesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilitiesSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/search">Search &amp; Statistics</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/full-listing">Full Listing</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/categories">Categories</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/data-feeds">Data Feeds</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/cvmap">CVMAP</a></li> </ul> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="main-menu-expander-metrics" data-expander-name="metricsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metricsSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a></li> </ul> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="main-menu-expander-products" data-expander-name="productsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="productsSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/products/cpe">CPE Dictionary</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/search">CPE Search</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products/swid">SWID</a></li> </ul> </div></li> <li> <a href="/web/20211209155948/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="main-menu-expander-developers" data-expander-name="developersSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developersSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/developers">Start Here</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/developers/products">Products</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a></li> </ul> </div> </li> <li><a href="/web/20211209155948/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="main-menu-expander-othersites" data-expander-name="otherSitesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSitesSide"> <ul> <li><a href="https://web.archive.org/web/20211209155948/https://ncp.nist.gov/">Checklist (NCP) Repository</a></li> <li><a href="https://web.archive.org/web/20211209155948/https://ncp.nist.gov/cce">Configurations (CCE)</a></li> <li><a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53">800-53 Controls</a></li> <li><a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a></li> <li><a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a></li> <li><a href="https://web.archive.org/web/20211209155948/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a></li> </ul> </div></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="main-menu-expander-search" data-expander-name="searchSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="searchSide"> <ul> <li><a href="/web/20211209155948/https://nvd.nist.gov/vuln/search">Vulnerability Search</a></li> <li><a href="/web/20211209155948/https://nvd.nist.gov/products/cpe/search">CPE Search</a></li> </ul> </div></li> </ul> </div> <div id="page-content" class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <!-- begin dynamic carousel --> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent0"><br/><br/><img alt="NVD API Key Logo" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/NVD API Key Logo.png?ext=.png" width="100%" height="90%"></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle0"><strong><a href="/web/20211209155948/https://nvd.nist.gov/general/news/API-Key-Announcement">NVD API Key</a></strong></span> </div> </div> </div> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent1"><img alt="Collaborative Vulnerability Metadata Acceptance Process" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/CVMAP_logo.png?ext=.png" width="100%" height="100%"></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle1"><strong><a href="/web/20211209155948/https://nvd.nist.gov/General/News/NVD-Release-of-CVMAP">NVD Release of CVMAP </a></strong></span> </div> </div> </div> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent2"><img alt="New NVD CVE/CPE API and Legacy SOAP Service Retirement!" src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/fa-download-triple.png?ext=.png" width="100%" height="100%"/></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle2"><strong><a href="/web/20211209155948/https://nvd.nist.gov/General/News/New-NVD-CVE-CPE-API-and-SOAP-Retirement">New NVD CVE/CPE API and Legacy SOAP Service Retirement!</a></strong></span> </div> </div> </div> <!-- end dynamic carousel --> <br/> <br/> <span>The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.</span> <br/> <br/> <div> <div class="row"> <div class="col-md-12 col-sm-12"> <div id="vulnResultsPanel"> <!-- Results Panel --> <div id="latestVulnsArea"> <div id="latestVulnsTitleRow" class="row"> <span class="hidden-md col-lg-9"> <strong class="h4Size">Last 20 Scored Vulnerability IDs &amp; Summaries</strong> </span> <span class="hidden-md col-lg-3"> <strong class="h4Size">CVSS Severity </strong> </span> </div> <ul id="latestVulns"> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42993" id="cveDetailAnchor-0">CVE-2021-42993</a></strong> - FlexiHub For Windows is affected by Integer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption ... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42993#vulnDescriptionTitle">read CVE-2021-42993</a><br> <strong>Published:</strong> December 07, 2021; 3:15:07 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-0"> <span id="cvss3-link-0"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-42993&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-0">8.8 HIGH</a><br/> </span> <span id="cvss2-link-0"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-42993&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-0">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37084" id="cveDetailAnchor-1">CVE-2021-37084</a></strong> - There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages. <br> <strong>Published:</strong> December 07, 2021; 12:15:09 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-1"> <span id="cvss3-link-1"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37084&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-1">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-1"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37084&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-1">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-31850" id="cveDetailAnchor-2">CVE-2021-31850</a></strong> - A denial-of-service vulnerability in Database Security (DBS) prior to 4.8.4 allows a remote authenticated administrator to trigger a denial-of-service attack against the DBS server. The configuration of Archiving through the User interface incorre... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-31850#vulnDescriptionTitle">read CVE-2021-31850</a><br> <strong>Published:</strong> December 08, 2021; 6:15:11 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-2"> <span id="cvss3-link-2"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-31850&amp;vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-2">6.5 MEDIUM</a><br/> </span> <span id="cvss2-link-2"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-31850&amp;vector=(AV:N/AC:L/Au:S/C:N/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-2">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37054" id="cveDetailAnchor-3">CVE-2021-37054</a></strong> - There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-3"> <span id="cvss3-link-3"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37054&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-3">7.5 HIGH</a><br/> </span> <span id="cvss2-link-3"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37054&amp;vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-3">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-26110" id="cveDetailAnchor-4">CVE-2021-26110</a></strong> - An improper access control vulnerability [CWE-284] in FortiOS autod daemon 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below and FortiProxy 2.0.1 and below, 1.2.9 and below may allow an authenticated low-privileged attacker to escalate the... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-26110#vulnDescriptionTitle">read CVE-2021-26110</a><br> <strong>Published:</strong> December 08, 2021; 6:15:11 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-4"> <span id="cvss3-link-4"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-26110&amp;vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-4">7.8 HIGH</a><br/> </span> <span id="cvss2-link-4"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-26110&amp;vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-4">4.6 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43175" id="cveDetailAnchor-5">CVE-2021-43175</a></strong> - The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial va... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43175#vulnDescriptionTitle">read CVE-2021-43175</a><br> <strong>Published:</strong> December 07, 2021; 1:15:06 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-5"> <span id="cvss3-link-5"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43175&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-5">7.5 HIGH</a><br/> </span> <span id="cvss2-link-5"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43175&amp;vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-5">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43067" id="cveDetailAnchor-6">CVE-2021-43067</a></strong> - A exposure of sensitive information to an unauthorized actor in Fortinet FortiAuthenticator version 6.4.0, version 6.3.2 and below, version 6.2.1 and below, version 6.1.2 and below, version 6.0.7 to 6.0.1 allows attacker to duplicate a target LDAP... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43067#vulnDescriptionTitle">read CVE-2021-43067</a><br> <strong>Published:</strong> December 08, 2021; 7:15:07 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-6"> <span id="cvss3-link-6"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43067&amp;vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-6">6.5 MEDIUM</a><br/> </span> <span id="cvss2-link-6"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43067&amp;vector=(AV:N/AC:M/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-6">4.3 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37053" id="cveDetailAnchor-7">CVE-2021-37053</a></strong> - There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-7"> <span id="cvss3-link-7"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37053&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-7">7.5 HIGH</a><br/> </span> <span id="cvss2-link-7"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37053&amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-7">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37052" id="cveDetailAnchor-8">CVE-2021-37052</a></strong> - There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-8"> <span id="cvss3-link-8"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37052&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-8">7.5 HIGH</a><br/> </span> <span id="cvss2-link-8"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37052&amp;vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-8">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37051" id="cveDetailAnchor-9">CVE-2021-37051</a></strong> - There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-9"> <span id="cvss3-link-9"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37051&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-9">9.1 CRITICAL</a><br/> </span> <span id="cvss2-link-9"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37051&amp;vector=(AV:N/AC:L/Au:N/C:P/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-9">6.4 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37092" id="cveDetailAnchor-10">CVE-2021-37092</a></strong> - There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-10"> <span id="cvss3-link-10"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37092&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-10">7.5 HIGH</a><br/> </span> <span id="cvss2-link-10"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37092&amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-10">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42687" id="cveDetailAnchor-11">CVE-2021-42687</a></strong> - A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) ... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42687#vulnDescriptionTitle">read CVE-2021-42687</a><br> <strong>Published:</strong> December 07, 2021; 4:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-11"> <span id="cvss3-link-11"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-42687&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-11">8.8 HIGH</a><br/> </span> <span id="cvss2-link-11"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-42687&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-11">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37050" id="cveDetailAnchor-12">CVE-2021-37050</a></strong> - There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-12"> <span id="cvss3-link-12"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37050&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-12">7.5 HIGH</a><br/> </span> <span id="cvss2-link-12"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37050&amp;vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-12">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37049" id="cveDetailAnchor-13">CVE-2021-37049</a></strong> - There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-13"> <span id="cvss3-link-13"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37049&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-13">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-13"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37049&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-13">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43638" id="cveDetailAnchor-14">CVE-2021-43638</a></strong> - Amazon Amazon WorkSpaces agent is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amazon WorkSpaces agent below v1.0.1.1537 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption ... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43638#vulnDescriptionTitle">read CVE-2021-43638</a><br> <strong>Published:</strong> December 07, 2021; 3:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-14"> <span id="cvss3-link-14"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43638&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-14">8.8 HIGH</a><br/> </span> <span id="cvss2-link-14"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43638&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-14">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43637" id="cveDetailAnchor-15">CVE-2021-43637</a></strong> - Amazon WorkSpaces agent is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amazon WorkSpaces agent below v1.0.1.1537 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS c... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-43637#vulnDescriptionTitle">read CVE-2021-43637</a><br> <strong>Published:</strong> December 07, 2021; 3:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-15"> <span id="cvss3-link-15"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-43637&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-15">8.8 HIGH</a><br/> </span> <span id="cvss2-link-15"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-43637&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-15">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42683" id="cveDetailAnchor-16">CVE-2021-42683</a></strong> - A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) ... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42683#vulnDescriptionTitle">read CVE-2021-42683</a><br> <strong>Published:</strong> December 07, 2021; 4:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-16"> <span id="cvss3-link-16"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-42683&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-16">8.8 HIGH</a><br/> </span> <span id="cvss2-link-16"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-42683&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-16">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42688" id="cveDetailAnchor-17">CVE-2021-42688</a></strong> - An Integer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or ... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42688#vulnDescriptionTitle">read CVE-2021-42688</a><br> <strong>Published:</strong> December 07, 2021; 4:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-17"> <span id="cvss3-link-17"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-42688&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-17">8.8 HIGH</a><br/> </span> <span id="cvss2-link-17"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-42688&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-17">7.2 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-37045" id="cveDetailAnchor-18">CVE-2021-37045</a></strong> - There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. <br> <strong>Published:</strong> December 08, 2021; 10:15:09 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-18"> <span id="cvss3-link-18"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-37045&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-18">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-18"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-37045&amp;vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-18">10.0 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42686" id="cveDetailAnchor-19">CVE-2021-42686</a></strong> - An Integer Overflow exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial... <a href="/web/20211209155948/https://nvd.nist.gov/vuln/detail/CVE-2021-42686#vulnDescriptionTitle">read CVE-2021-42686</a><br> <strong>Published:</strong> December 07, 2021; 4:15:08 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-19"> <span id="cvss3-link-19"> <em>V3.1:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-42686&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-19">8.8 HIGH</a><br/> </span> <span id="cvss2-link-19"> <em> V2.0:</em> <a href="/web/20211209155948/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-42686&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-19">7.2 HIGH</a><br/> </span> </p> </div> </li> </ul> </div> </div> </div> </div> </div> </div> </div> </div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://web.archive.org/web/20211209155948/https://twitter.com/NISTCyber" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://web.archive.org/web/20211209155948/https://www.facebook.com/NIST" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://web.archive.org/web/20211209155948/https://www.linkedin.com/company/nist" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://web.archive.org/web/20211209155948/https://www.youtube.com/user/USNISTGOV" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://web.archive.org/web/20211209155948/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/logo_rev.png" alt="National Institute of Standards and Technology logo"/> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo"> <img src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/logo_rev.png" alt="National Institute of Standards and Technology logo"/> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="https://web.archive.org/web/20211209155948/tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="https://web.archive.org/web/20211209155948/mailto:nvd@nist.gov">Webmaster</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="https://web.archive.org/web/20211209155948/mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 <br> <span style="display: inline-block; text-align: left; margin-left: 0; margin-right: 0;"> <strong style="float: right">Sponsored by</strong> <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="https://web.archive.org/web/20211209155948/https://www.cisa.gov/" target="_blank">CISA</a> </span> <a style="float: right; width: 68px;"> <img src="/web/20211209155948im_/https://nvd.nist.gov/site-media/images/cisa-thumbnail.png" alt="CISA"/> </a> </div> </div> </div> <div class="row"> <div class="row footer-bottom-links-container" role="navigation"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/privacy-policy">Site Privacy</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://web.archive.org/web/20211209155948/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/foia">FOIA</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://web.archive.org/web/20211209155948/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://web.archive.org/web/20211209155948/https://www.commerce.gov/">Commerce.gov</a> | <a href="https://web.archive.org/web/20211209155948/http://www.science.gov/">Science.gov</a> | <a href="https://web.archive.org/web/20211209155948/http://www.usa.gov/">USA.gov</a> </p> </div> </div> </div> </footer> </body> </html><!-- FILE ARCHIVED ON 15:59:48 Dec 09, 2021 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 05:40:47 Feb 27, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.521 exclusion.robots: 0.022 exclusion.robots.policy: 0.013 esindex: 0.009 cdx.remote: 6.781 LoadShardBlock: 1055.545 (6) PetaboxLoader3.datanode: 976.404 (7) PetaboxLoader3.resolve: 155.0 (2) load_resource: 93.034 -->

Pages: 1 2 3 4 5 6 7 8 9 10