CINXE.COM
NVD - Home
<!DOCTYPE html> <html lang="en"> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://nvd.nist.gov/","20220122105702","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1642849022"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>NVD - Home</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/css/base-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/css/media-resize.css" type="text/css" rel="stylesheet"/> <meta name="theme-color" content="#000000"> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-media/js/forms.js" type="text/javascript"></script> <!-- <script th:src="@{/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true}" type="text/javascript" id="_fed_an_js_tag"></script> --> <script src="/web/20220122105702js_/https://nvd.nist.gov/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <style id="antiClickjack"> body > * { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body > * { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout( tryForward(), 5000); } function tryForward(){ top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/web/20220122105702cs_/https://nvd.nist.gov/site-media/css/nvd-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16"/> <link href="/web/20220122105702/https://nvd.nist.gov/site-media/images/favicons/manifest.json" rel="manifest"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon"/> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon"/> <link href="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon"/> <meta charset="UTF-8"> <meta charset="UTF-8"> </head> <body> <div> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20220122105702/https://nvd.nist.gov/">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="true" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header"> <a class="navbar-brand" href="https://web.archive.org/web/20220122105702/https://www.nist.gov/" target="_blank" id="navbar-brand-image"> <img src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/svg/nist-logo.svg" alt="National Institute of Standards and Technology" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/general"> General <span class="expander fa fa-plus" id="main-menu-expander-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/general/news">News</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/general/email-list">Email List</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/general/visualizations">Visualizations</a> </p> </div> </div> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="main-menu-expander-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/search">Search & Statistics</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/full-listing">Full Listing</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/categories">Categories</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/data-feeds">Data Feeds</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="main-menu-expander-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="main-menu-expander-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/products/cpe">CPE Dictionary</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/web/20220122105702/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="main-menu-expander-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/developers">Start Here</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/web/20220122105702/https://nvd.nist.gov/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/web/20220122105702/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="main-menu-expander-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20220122105702/https://ncp.nist.gov/">Checklist (NCP) Repository</a> </p> <p> <a href="https://web.archive.org/web/20220122105702/https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="main-menu-expander-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/itl" target="_blank">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/web/20220122105702/https://nvd.nist.gov/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg">National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center">NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;"><img class="nvd-header-logo" alt="NVD Logo" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/NVD-white-55.png"/></a> </div> </div> </div> </section> </div> <div id="body-section" class="container"> <div> <div class="row"> <div class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav"> <li><a href="/web/20220122105702/https://nvd.nist.gov/general">General<span class="expander fa fa-plus" id="main-menu-expander-general" data-expander-name="generalSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="generalSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/general/news">News</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/general/email-list">Email List</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/general/faq">FAQ</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/general/visualizations">Visualizations</a></li> </ul> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="main-menu-expander-vulnerabilities" data-expander-name="vulnerabilitiesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilitiesSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/search">Search & Statistics</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/full-listing">Full Listing</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/categories">Categories</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/data-feeds">Data Feeds</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/cvmap">CVMAP</a></li> </ul> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="main-menu-expander-metrics" data-expander-name="metricsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metricsSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a></li> </ul> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="main-menu-expander-products" data-expander-name="productsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="productsSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/products/cpe">CPE Dictionary</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/search">CPE Search</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products/swid">SWID</a></li> </ul> </div></li> <li> <a href="/web/20220122105702/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="main-menu-expander-developers" data-expander-name="developersSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developersSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/developers">Start Here</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/developers/products">Products</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a></li> </ul> </div> </li> <li><a href="/web/20220122105702/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="main-menu-expander-othersites" data-expander-name="otherSitesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSitesSide"> <ul> <li><a href="https://web.archive.org/web/20220122105702/https://ncp.nist.gov/">Checklist (NCP) Repository</a></li> <li><a href="https://web.archive.org/web/20220122105702/https://ncp.nist.gov/cce">Configurations (CCE)</a></li> <li><a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53">800-53 Controls</a></li> <li><a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a></li> <li><a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a></li> <li><a href="https://web.archive.org/web/20220122105702/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a></li> </ul> </div></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="main-menu-expander-search" data-expander-name="searchSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="searchSide"> <ul> <li><a href="/web/20220122105702/https://nvd.nist.gov/vuln/search">Vulnerability Search</a></li> <li><a href="/web/20220122105702/https://nvd.nist.gov/products/cpe/search">CPE Search</a></li> </ul> </div></li> </ul> </div> <div id="page-content" class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <!-- begin dynamic carousel --> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent0"><br/><br/><img alt="NVD API Key Logo" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/NVD API Key Logo.png?ext=.png" width="100%" height="90%"></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle0"><strong><a href="/web/20220122105702/https://nvd.nist.gov/general/news/API-Key-Announcement">NVD API Key</a></strong></span> </div> </div> </div> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent1"><img alt="Collaborative Vulnerability Metadata Acceptance Process" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/CVMAP_logo.png?ext=.png" width="100%" height="100%"></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle1"><strong><a href="/web/20220122105702/https://nvd.nist.gov/General/News/NVD-Release-of-CVMAP">NVD Release of CVMAP </a></strong></span> </div> </div> </div> <div class="col-sm-4 col-xs-12 carousel-item"> <div class="row"> <div class="col-sm-12 col-xs-6" id="carouselContent2"><img alt="New NVD CVE/CPE API and Legacy SOAP Service Retirement!" src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/fa-download-triple.png?ext=.png" width="100%" height="100%"/></div> <div class="text-center col-sm-12 col-xs-6"> <span class="carousel-title" id="carouselTitle2"><strong><a href="/web/20220122105702/https://nvd.nist.gov/General/News/New-NVD-CVE-CPE-API-and-SOAP-Retirement">New NVD CVE/CPE API and Legacy SOAP Service Retirement!</a></strong></span> </div> </div> </div> <!-- end dynamic carousel --> <br/> <br/> <span>The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.</span> <br/> <br/> <div> <div class="row"> <div class="col-md-12 col-sm-12"> <div id="vulnResultsPanel"> <!-- Results Panel --> <div id="latestVulnsArea"> <div id="latestVulnsTitleRow" class="row"> <span class="hidden-md col-lg-9"> <strong class="h4Size">Last 20 Scored Vulnerability IDs & Summaries</strong> </span> <span class="hidden-md col-lg-3"> <strong class="h4Size">CVSS Severity </strong> </span> </div> <ul id="latestVulns"> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34995" id="cveDetailAnchor-0">CVE-2021-34995</a></strong> - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34995#vulnDescriptionTitle">read CVE-2021-34995</a><br> <strong>Published:</strong> January 13, 2022; 5:15:13 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-0"> <span id="cvss3-link-0"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-34995&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-0">8.8 HIGH</a><br/> </span> <span id="cvss2-link-0"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-34995&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-0">6.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34996" id="cveDetailAnchor-1">CVE-2021-34996</a></strong> - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34996#vulnDescriptionTitle">read CVE-2021-34996</a><br> <strong>Published:</strong> January 13, 2022; 5:15:13 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-1"> <span id="cvss3-link-1"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-34996&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-1">8.8 HIGH</a><br/> </span> <span id="cvss2-link-1"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-34996&vector=(AV:N/AC:L/Au:S/C:C/I:C/A:C)&version=2.0&source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-1">9.0 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34997" id="cveDetailAnchor-2">CVE-2021-34997</a></strong> - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34997#vulnDescriptionTitle">read CVE-2021-34997</a><br> <strong>Published:</strong> January 13, 2022; 5:15:13 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-2"> <span id="cvss3-link-2"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-34997&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-2">8.8 HIGH</a><br/> </span> <span id="cvss2-link-2"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-34997&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-2">6.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34994" id="cveDetailAnchor-3">CVE-2021-34994</a></strong> - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34994#vulnDescriptionTitle">read CVE-2021-34994</a><br> <strong>Published:</strong> January 13, 2022; 5:15:12 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-3"> <span id="cvss3-link-3"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-34994&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-3">8.8 HIGH</a><br/> </span> <span id="cvss2-link-3"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-34994&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-3">6.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34993" id="cveDetailAnchor-4">CVE-2021-34993</a></strong> - This vulnerability allows remote attackers to bypass authentication on affected installations of Commvault CommCell 11.22.22. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CVSearchService service... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-34993#vulnDescriptionTitle">read CVE-2021-34993</a><br> <strong>Published:</strong> January 13, 2022; 5:15:12 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-4"> <span id="cvss3-link-4"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-34993&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-4">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-4"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-34993&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-4">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-4164" id="cveDetailAnchor-5">CVE-2021-4164</a></strong> - calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) <br> <strong>Published:</strong> January 17, 2022; 8:15:08 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-5"> <span id="cvss3-link-5"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-4164&vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-5">8.8 HIGH</a><br/> </span> <span id="cvss2-link-5"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-4164&vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-5">6.8 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-0239" id="cveDetailAnchor-6">CVE-2022-0239</a></strong> - corenlp is vulnerable to Improper Restriction of XML External Entity Reference <br> <strong>Published:</strong> January 17, 2022; 2:15:06 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-6"> <span id="cvss3-link-6"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-0239&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-6">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-6"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-0239&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&version=2.0&source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-6">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21254" id="cveDetailAnchor-7">CVE-2022-21254</a></strong> - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21254#vulnDescriptionTitle">read CVE-2022-21254</a><br> <strong>Published:</strong> January 19, 2022; 7:15:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-7"> <span id="cvss3-link-7"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21254&vector=AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-7">5.3 MEDIUM</a><br/> </span> <span id="cvss2-link-7"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21254&vector=(AV:N/AC:M/Au:S/C:N/I:N/A:C)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-7">6.3 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21255" id="cveDetailAnchor-8">CVE-2022-21255</a></strong> - Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: UI Servlet). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via H... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21255#vulnDescriptionTitle">read CVE-2022-21255</a><br> <strong>Published:</strong> January 19, 2022; 7:15:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-8"> <span id="cvss3-link-8"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21255&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&version=3.1&source=Oracle" class="label label-danger" data-testid="vuln-cvss3-link-8">8.1 HIGH</a><br/> </span> <span id="cvss2-link-8"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21255&vector=(AV:N/AC:L/Au:S/C:P/I:P/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-8">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21252" id="cveDetailAnchor-9">CVE-2022-21252</a></strong> - Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21252#vulnDescriptionTitle">read CVE-2022-21252</a><br> <strong>Published:</strong> January 19, 2022; 7:15:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-9"> <span id="cvss3-link-9"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21252&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-9">6.5 MEDIUM</a><br/> </span> <span id="cvss2-link-9"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21252&vector=(AV:N/AC:L/Au:N/C:P/I:P/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-9">6.4 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-33040" id="cveDetailAnchor-10">CVE-2021-33040</a></strong> - managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS. <br> <strong>Published:</strong> January 17, 2022; 12:15:07 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-10"> <span id="cvss3-link-10"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-33040&vector=AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N&version=3.1&source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-10">6.1 MEDIUM</a><br/> </span> <span id="cvss2-link-10"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-33040&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-10">4.3 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21247" id="cveDetailAnchor-11">CVE-2022-21247</a></strong> - Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.2.0.1 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Session, Execute Catalog Role privilege ... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21247#vulnDescriptionTitle">read CVE-2022-21247</a><br> <strong>Published:</strong> January 19, 2022; 7:15:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-11"> <span id="cvss3-link-11"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21247&vector=AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N&version=3.1&source=Oracle" class="label label-low" data-testid="vuln-cvss3-link-11">2.7 LOW</a><br/> </span> <span id="cvss2-link-11"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21247&vector=(AV:N/AC:L/Au:S/C:P/I:N/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-11">4.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21248" id="cveDetailAnchor-12">CVE-2022-21248</a></strong> - Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: ... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21248#vulnDescriptionTitle">read CVE-2022-21248</a><br> <strong>Published:</strong> January 19, 2022; 7:15:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-12"> <span id="cvss3-link-12"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21248&vector=AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N&version=3.1&source=Oracle" class="label label-low" data-testid="vuln-cvss3-link-12">3.7 LOW</a><br/> </span> <span id="cvss2-link-12"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21248&vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-12">4.3 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2021-38965" id="cveDetailAnchor-13">CVE-2021-38965</a></strong> - IBM FileNet Content Manager 5.5.4, 5.5.6, and 5.5.7 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 212346. <br> <strong>Published:</strong> January 17, 2022; 1:15:07 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-13"> <span id="cvss3-link-13"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2021-38965&vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-13">8.8 HIGH</a><br/> </span> <span id="cvss2-link-13"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2021-38965&vector=(AV:N/AC:L/Au:S/C:C/I:C/A:C)&version=2.0&source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-13">9.0 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21304" id="cveDetailAnchor-14">CVE-2022-21304</a></strong> - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network ac... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21304#vulnDescriptionTitle">read CVE-2022-21304</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-14"> <span id="cvss3-link-14"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21304&vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-14">4.9 MEDIUM</a><br/> </span> <span id="cvss2-link-14"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21304&vector=(AV:N/AC:L/Au:S/C:N/I:N/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-14">4.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21302" id="cveDetailAnchor-15">CVE-2022-21302</a></strong> - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols ... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21302#vulnDescriptionTitle">read CVE-2022-21302</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-15"> <span id="cvss3-link-15"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21302&vector=AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-15">5.3 MEDIUM</a><br/> </span> <span id="cvss2-link-15"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21302&vector=(AV:N/AC:M/Au:S/C:N/I:N/A:P)&version=2.0&source=NIST" class="label label-low" data-testid="vuln-cvss2-link-15">3.5 LOW</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21301" id="cveDetailAnchor-16">CVE-2022-21301</a></strong> - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protoc... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21301#vulnDescriptionTitle">read CVE-2022-21301</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-16"> <span id="cvss3-link-16"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21301&vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-16">5.5 MEDIUM</a><br/> </span> <span id="cvss2-link-16"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21301&vector=(AV:N/AC:L/Au:S/C:N/I:P/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-16">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21300" id="cveDetailAnchor-17">CVE-2022-21300</a></strong> - Vulnerability in the PeopleSoft Enterprise CS SA Integration Pack product of Oracle PeopleSoft (component: Snapshot Integration). Supported versions that are affected are 9.0 and 9.2. Easily exploitable vulnerability allows unauthenticated attacke... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21300#vulnDescriptionTitle">read CVE-2022-21300</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-17"> <span id="cvss3-link-17"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21300&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N&version=3.1&source=Oracle" class="label label-danger" data-testid="vuln-cvss3-link-17">7.5 HIGH</a><br/> </span> <span id="cvss2-link-17"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21300&vector=(AV:N/AC:L/Au:N/C:P/I:N/A:N)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-17">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21298" id="cveDetailAnchor-18">CVE-2022-21298</a></strong> - Vulnerability in the Oracle Solaris product of Oracle Systems (component: Install). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21298#vulnDescriptionTitle">read CVE-2022-21298</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-18"> <span id="cvss3-link-18"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21298&vector=AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L&version=3.1&source=Oracle" class="label label-low" data-testid="vuln-cvss3-link-18">3.9 LOW</a><br/> </span> <span id="cvss2-link-18"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21298&vector=(AV:L/AC:M/Au:N/C:N/I:P/A:P)&version=2.0&source=NIST" class="label label-low" data-testid="vuln-cvss2-link-18">3.3 LOW</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21297" id="cveDetailAnchor-19">CVE-2022-21297</a></strong> - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple ... <a href="/web/20220122105702/https://nvd.nist.gov/vuln/detail/CVE-2022-21297#vulnDescriptionTitle">read CVE-2022-21297</a><br> <strong>Published:</strong> January 19, 2022; 7:15:12 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-19"> <span id="cvss3-link-19"> <em>V3.1:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-21297&vector=AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H&version=3.1&source=Oracle" class="label label-warning" data-testid="vuln-cvss3-link-19">4.9 MEDIUM</a><br/> </span> <span id="cvss2-link-19"> <em> V2.0:</em> <a href="/web/20220122105702/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2022-21297&vector=(AV:N/AC:L/Au:S/C:N/I:N/A:P)&version=2.0&source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-19">4.0 MEDIUM</a><br/> </span> </p> </div> </li> </ul> </div> </div> </div> </div> </div> </div> </div> </div> </div> <footer id="footer"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://web.archive.org/web/20220122105702/https://twitter.com/NISTCyber" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://web.archive.org/web/20220122105702/https://www.facebook.com/NIST" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://web.archive.org/web/20220122105702/https://www.linkedin.com/company/nist" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://web.archive.org/web/20220122105702/https://www.youtube.com/user/USNISTGOV" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://web.archive.org/web/20220122105702/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/logo_rev.png" alt="National Institute of Standards and Technology logo"/> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo"> <img src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/logo_rev.png" alt="National Institute of Standards and Technology logo"/> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="https://web.archive.org/web/20220122105702/tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="https://web.archive.org/web/20220122105702/mailto:nvd@nist.gov">Webmaster</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/about-nist/our-organization" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="https://web.archive.org/web/20220122105702/mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 <br> <span style="display: inline-block; text-align: left; margin-left: 0; margin-right: 0;"> <strong style="float: right">Sponsored by</strong> <br> <a href="https://web.archive.org/web/20220122105702/https://www.cisa.gov/" target="_blank">CISA</a> </span> <a style="float: right; width: 68px;"> <img src="/web/20220122105702im_/https://nvd.nist.gov/site-media/images/cisa-thumbnail.png" alt="CISA"/> </a> </div> </div> </div> <div class="row"> <div class="row footer-bottom-links-container" role="navigation"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/privacy-policy">Site Privacy</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://web.archive.org/web/20220122105702/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/foia">FOIA</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://web.archive.org/web/20220122105702/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://web.archive.org/web/20220122105702/https://www.commerce.gov/">Commerce.gov</a> | <a href="https://web.archive.org/web/20220122105702/http://www.science.gov/">Science.gov</a> | <a href="https://web.archive.org/web/20220122105702/http://www.usa.gov/">USA.gov</a> </p> </div> </div> </div> </footer> </body> </html><!-- FILE ARCHIVED ON 10:57:02 Jan 22, 2022 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 22:33:32 Feb 03, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.604 exclusion.robots: 0.034 exclusion.robots.policy: 0.02 esindex: 0.012 cdx.remote: 19.746 LoadShardBlock: 247.951 (6) PetaboxLoader3.datanode: 212.297 (8) PetaboxLoader3.resolve: 137.324 (2) load_resource: 164.195 loaddict: 41.588 -->