CINXE.COM

NVD - Home

<!DOCTYPE html> <html lang="en"> <head> <title>NVD - Home</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <meta http-equiv="content-style-type" content="text/css" /> <meta http-equiv="content-script-type" content="text/javascript" /> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <link href="/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet" /> <link href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/base-style.css" type="text/css" rel="stylesheet" /> <link href="/site-media/css/media-resize.css" type="text/css" rel="stylesheet" /> <meta name="theme-color" content="#000000"> <script src="/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/site-media/js/forms.js" type="text/javascript"></script> <script src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script> <style id="antiClickjack"> body>* { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body>* { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/site-media/css/nvd-style.css" type="text/css" rel="stylesheet" /> <link href="/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180" /> <link href="/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32" /> <link href="/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16" /> <link href="/site-media/images/favicons/manifest.json" rel="manifest" /> <link href="/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000" /> <link href="/site-media/images/favicons/favicon.ico" rel="shortcut icon" /> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" /> <link href="/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon" /> <link href="/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon" /> <meta charset="UTF-8"> <meta charset="UTF-8"> </head> <body> <header role="banner" title="Site Banner"> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://nvd.nist.gov">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <div> <div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header" style="height:104px"> <a class="navbar-brand" href="https://www.nist.gov" target="_blank" rel="noopener noreferrer" id="navbar-brand-image" style="padding-top: 36px"> <img alt="National Institute of Standards and Technology" src="/site-media/images/nist/nist-logo.svg" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/general"> General <span class="expander fa fa-plus" id="nvd-header-menu-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="https://www.nist.gov/itl/nvd">News and Status Updates</a> </p> </div> <div class="col-lg-4"> <p> <a href="/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/general/visualizations">Visualizations</a> </p> <p> <a href="/general/legal-disclaimer">Legal Disclaimer</a> </p> </div> </div> </div></li> <li><a href="/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="nvd-header-menu-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln/search">Search &amp; Statistics</a> </p> <p> <a href="/vuln/categories">Weakness Types</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln/data-feeds">Legacy Data Feeds</a> </p> <p> <a href="/vuln/vendor-comments">Vendor Comments</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span class="expander fa fa-plus" id="nvd-header-menu-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0 Calculators</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x Calculators</a> </p> </div> <div class="col-lg-4"> <p> <a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0 Calculator</a> </p> </div> </div> </div></li> <li><a href="/products"> Products <span class="expander fa fa-plus" id="nvd-header-menu-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/products/cpe">CPE Dictionary</a> </p> <p> <a href="/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/developers">Developers<span class="expander fa fa-plus" id="nvd-header-menu-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/developers/start-here">Start Here</a> </p> <p> <a href="/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/developers/data-sources">Data Sources</a> </p> <p> <a href="/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/contact"> Contact NVD </a></li> <li><a href="/other"> Other Sites <span class="expander fa fa-plus" id="nvd-header-menu-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://ncp.nist.gov">Checklist (NCP) Repository</a> </p> <p> <a href="https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/search"> Search <span class="expander fa fa-plus" id="nvd-header-menu-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg" >National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center" >NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;padding-top: 14px"> <img id="img-logo-nvd-lg" alt="National Vulnerability Database" src="/site-media/images/F_NIST-Logo-NVD-white.svg" width="500" height="100"> </a> </div> </div> </div> </section> </div> </div> </header> <main> <div> <div id="body-section" class="container"> <div> <div class="row"> <nav title="Side Menu" role="navigation" class="col-lg-3 col-md-4 hidden-sm hidden-xs hidden-xxs"> <ul class="side-nav"> <li><a href="/general">General<span class="expander fa fa-plus" id="nvd-side-menu-general" data-expander-name="generalSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="generalSide"> <ul> <li><a href="/general/nvd-dashboard">NVD Dashboard</a></li> <li><a href="https://www.nist.gov/itl/nvd">News and Status Updates</a></li> <li><a href="/general/faq">FAQ</a></li> <li><a href="/general/visualizations">Visualizations</a></li> <li><a href="/general/legal-disclaimer">Legal Disclaimer</a></li> </ul> </div></li> <li><a href="/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="nvd-side-menu-vulnerabilities" data-expander-name="vulnerabilitiesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilitiesSide"> <ul> <li><a href="/vuln/search">Search &amp; Statistics</a></li> <li><a href="/vuln/categories">Weakness Types</a></li> <li><a href="/vuln/data-feeds">Legacy Data Feeds</a></li> <li><a href="/vuln/vendor-comments">Vendor Comments</a></li> <li><a href="/vuln/cvmap">CVMAP</a></li> </ul> </div></li> <li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span class="expander fa fa-plus" id="nvd-side-menu-metrics" data-expander-name="metricsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metricsSide"> <ul> <li><a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0 Calculator</a></li> <li><a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x Calculators</a></li> <li><a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0 Calculator</a></li> </ul> </div></li> <li><a href="/products"> Products <span class="expander fa fa-plus" id="nvd-side-menu-products" data-expander-name="productsSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="productsSide"> <ul> <li><a href="/products/cpe">CPE Dictionary</a></li> <li><a href="/products/cpe/search">CPE Search</a></li> <li><a href="/products/cpe/statistics">CPE Statistics</a></li> <li><a href="/products/swid">SWID</a></li> </ul> </div></li> <li> <a href="/developers">Developers<span class="expander fa fa-plus" id="nvd-side-menu-developers" data-expander-name="developersSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developersSide"> <ul> <li><a href="/developers/start-here">Start Here</a></li> <li><a href="/developers/request-an-api-key">Request an API Key</a></li> <li><a href="/developers/vulnerabilities">Vulnerabilities</a></li> <li><a href="/developers/products">Products</a></li> <li><a href="/developers/data-sources">Data Sources</a></li> <li><a href="/developers/terms-of-use">Terms of Use</a></li> </ul> </div> </li> <li><a href="/contact"> Contact NVD </a></li> <li><a href="/other"> Other Sites <span class="expander fa fa-plus" id="nvd-side-menu-othersites" data-expander-name="otherSitesSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSitesSide"> <ul> <li><a href="https://ncp.nist.gov">Checklist (NCP) Repository</a></li> <li><a href="https://ncp.nist.gov/cce">Configurations (CCE)</a></li> <li><a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a></li> <li><a href="https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a></li> <li><a href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a></li> <li><a href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a></li> </ul> </div></li> <li><a href="/search"> Search <span class="expander fa fa-plus" id="nvd-side-menu-search" data-expander-name="searchSide" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="searchSide"> <ul> <li><a href="/vuln/search">Vulnerability Search</a></li> <li><a href="/products/cpe/search">CPE Search</a></li> </ul> </div></li> </ul> </nav> <div id="page-content" class="col-lg-9 col-md-8 col-sm-12 col-xs-12 col-xxs-12"> <div class="col-md-4" style="padding:0px;"> <div class="text-center"> <span class="carousel-title"> <a href="https://www.nist.gov/itl/nvd"> <img alt="Icon for New NVD Communications and Status Updates Page" src="/site-media/images/LandingPage/readAllAboutIt800x632.png" style="width: 300px; height: 237px;" title="New NVD Communications and Status Updates Page"> <br/> <strong>New Communications Page</strong> </a> </span> </div> </div> <div class="col-md-4" style="padding:0px;"> <div class="text-center"> <span class="carousel-title"> <a href="/general/news/cvss-v4-0-official-support"> <img alt="The NVD now supports CVSS version 4.0!" src="/site-media/images/LandingPage/cvssV4_0Logo.png" style="width: 300px; height: 237px;" title="The NVD now supports CVSS version 4.0!"> <br/> <strong>CVSS v4.0 Support</strong> </a> </span> </div> </div> <div class="row"> <div class="col-md-4" style="padding:0px;"> <div class="text-center"> <span class="carousel-title"> <a href="/general/news/api-20-announcements"> <img alt="The letters N V D typed out in binary" src="/site-media/images/LandingPage/apiGuidance800x632.png" style="width: 300px; height: 237px;" title="Whats new in API two"> <br/> <strong>2.0 APIs</strong> </a> </span> </div> </div> </div> <br/> <span>The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.</span> <br/> <br/> <span>For information on how to cite the NVD, including the database's Digital Object Identifier (DOI), please consult <a href="https://data.nist.gov/od/id/1E0F15DAAEFB84E4E0531A5706813DD8436"> NIST's Public Data Repository</a>.</span> <br/> <br/> <div id="legal-disclaimer"> <h4>Legal Disclaimer:</h4> <p> Here is where you can read the NVD <a href="general/legal-disclaimer">legal disclaimer</a>. </p> </div> <div> <div class="row"> <div class="col-md-12 col-sm-12"> <div id="vulnResultsPanel"> <!-- Results Panel --> <div id="latestVulnsArea"> <div id="latestVulnsTitleRow" class="row"> <span class="hidden-md col-lg-9"> <strong class="h4Size">Last 20 Scored Vulnerability IDs &amp; Summaries</strong> </span> <span class="hidden-md col-lg-3"> <strong class="h4Size">CVSS Severity </strong> </span> </div> <ul id="latestVulns"> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2025-2076" id="cveDetailAnchor-0">CVE-2025-2076</a></strong> - The binlayerpress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated a... <a href="/vuln/detail/CVE-2025-2076#vulnDescriptionTitle">read CVE-2025-2076</a><br> <strong>Published:</strong> March 12, 2025; 12:15:18 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-0"> <span id="cvss3-link-0"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-2076&amp;vector=AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-0" aria-label="V3 score for CVE-2025-2076">4.8 MEDIUM</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2025-2369" id="cveDetailAnchor-1">CVE-2025-2369</a></strong> - A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based... <a href="/vuln/detail/CVE-2025-2369#vulnDescriptionTitle">read CVE-2025-2369</a><br> <strong>Published:</strong> March 17, 2025; 5:15:12 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-1"> <span id="cvss3-link-1"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-2369&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-1" aria-label="V3 score for CVE-2025-2369">9.8 CRITICAL</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2018-8653" id="cveDetailAnchor-2">CVE-2018-8653</a></strong> - A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka &quot;Scripting Engine Memory Corruption Vulnerability.&quot; This affects Internet Explorer 9, Internet Explorer 11, Inter... <a href="/vuln/detail/CVE-2018-8653#vulnDescriptionTitle">read CVE-2018-8653</a><br> <strong>Published:</strong> December 20, 2018; 8:29:00 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-2"> <span id="cvss3-link-2"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2018-8653&amp;vector=AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-2" aria-label="V3 score for CVE-2018-8653">7.5 HIGH</a><br /> </span> <span id="cvss2-link-2"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2018-8653&amp;vector=(AV:N/AC:H/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-2" aria-label="V2 score for CVE-2018-8653">7.6 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2025-2370" id="cveDetailAnchor-3">CVE-2025-2370</a></strong> - A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been declared as critical. Affected by this vulnerability is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument a... <a href="/vuln/detail/CVE-2025-2370#vulnDescriptionTitle">read CVE-2025-2370</a><br> <strong>Published:</strong> March 17, 2025; 5:15:13 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-3"> <span id="cvss3-link-3"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-2370&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-3" aria-label="V3 score for CVE-2025-2370">9.8 CRITICAL</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2017-11882" id="cveDetailAnchor-4">CVE-2017-11882</a></strong> - Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle ob... <a href="/vuln/detail/CVE-2017-11882#vulnDescriptionTitle">read CVE-2017-11882</a><br> <strong>Published:</strong> November 14, 2017; 10:29:01 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-4"> <span id="cvss3-link-4"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2017-11882&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-4" aria-label="V3 score for CVE-2017-11882">7.8 HIGH</a><br /> </span> <span id="cvss2-link-4"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2017-11882&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-4" aria-label="V2 score for CVE-2017-11882">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2017-8540" id="cveDetailAnchor-5">CVE-2017-8540</a></strong> - The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607... <a href="/vuln/detail/CVE-2017-8540#vulnDescriptionTitle">read CVE-2017-8540</a><br> <strong>Published:</strong> May 26, 2017; 4:29:00 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-5"> <span id="cvss3-link-5"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2017-8540&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-5" aria-label="V3 score for CVE-2017-8540">7.8 HIGH</a><br /> </span> <span id="cvss2-link-5"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2017-8540&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-5" aria-label="V2 score for CVE-2017-8540">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2016-7256" id="cveDetailAnchor-6">CVE-2016-7256</a></strong> - atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows ... <a href="/vuln/detail/CVE-2016-7256#vulnDescriptionTitle">read CVE-2016-7256</a><br> <strong>Published:</strong> November 10, 2016; 2:00:10 AM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-6"> <span id="cvss3-link-6"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2016-7256&amp;vector=AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-6" aria-label="V3 score for CVE-2016-7256">8.8 HIGH</a><br /> </span> <span id="cvss2-link-6"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2016-7256&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-6" aria-label="V2 score for CVE-2016-7256">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2016-7193" id="cveDetailAnchor-7">CVE-2016-7193</a></strong> - Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Service... <a href="/vuln/detail/CVE-2016-7193#vulnDescriptionTitle">read CVE-2016-7193</a><br> <strong>Published:</strong> October 13, 2016; 10:59:38 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-7"> <span id="cvss3-link-7"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2016-7193&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-7" aria-label="V3 score for CVE-2016-7193">7.8 HIGH</a><br /> </span> <span id="cvss2-link-7"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2016-7193&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-7" aria-label="V2 score for CVE-2016-7193">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2025-2385" id="cveDetailAnchor-8">CVE-2025-2385</a></strong> - A vulnerability has been found in code-projects Modern Bag 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument userEmail/userPassword leads to sql injection. The attack c... <a href="/vuln/detail/CVE-2025-2385#vulnDescriptionTitle">read CVE-2025-2385</a><br> <strong>Published:</strong> March 17, 2025; 1:15:41 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-8"> <span id="cvss3-link-8"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2025-2385&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-8" aria-label="V3 score for CVE-2025-2385">9.8 CRITICAL</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2014-1761" id="cveDetailAnchor-9">CVE-2014-1761</a></strong> - Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and... <a href="/vuln/detail/CVE-2014-1761#vulnDescriptionTitle">read CVE-2014-1761</a><br> <strong>Published:</strong> March 25, 2014; 9:24:01 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-9"> <span id="cvss2-link-9"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2014-1761&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-9" aria-label="V2 score for CVE-2014-1761">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2010-2568" id="cveDetailAnchor-10">CVE-2010-2568</a></strong> - Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not pr... <a href="/vuln/detail/CVE-2010-2568#vulnDescriptionTitle">read CVE-2010-2568</a><br> <strong>Published:</strong> July 22, 2010; 1:43:49 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-10"> <span id="cvss2-link-10"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2010-2568&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-10" aria-label="V2 score for CVE-2010-2568">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2016-0165" id="cveDetailAnchor-11">CVE-2016-0165</a></strong> - The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafte... <a href="/vuln/detail/CVE-2016-0165#vulnDescriptionTitle">read CVE-2016-0165</a><br> <strong>Published:</strong> April 12, 2016; 7:59:28 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-11"> <span id="cvss3-link-11"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2016-0165&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2016-0165">7.8 HIGH</a><br /> </span> <span id="cvss2-link-11"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2016-0165&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-11" aria-label="V2 score for CVE-2016-0165">7.2 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2025-25914" id="cveDetailAnchor-12">CVE-2025-25914</a></strong> - SQL injection vulnerability in Online Exam Mastering System v.1.0 allows a remote attacker to execute arbitrary code via the fid parameter <br> <strong>Published:</strong> March 17, 2025; 4:15:14 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-12"> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2016-0151" id="cveDetailAnchor-13">CVE-2016-0151</a></strong> - The Client-Server Run-time Subsystem (CSRSS) in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 mismanages process tokens, which allows local users to gain privileges via a crafted application, ... <a href="/vuln/detail/CVE-2016-0151#vulnDescriptionTitle">read CVE-2016-0151</a><br> <strong>Published:</strong> April 12, 2016; 7:59:15 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-13"> <span id="cvss3-link-13"> <em>V3.1:</em> <a href="/vuln-metrics/cvss/v3-calculator?name=CVE-2016-0151&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2016-0151">7.8 HIGH</a><br /> </span> <span id="cvss2-link-13"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2016-0151&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-13" aria-label="V2 score for CVE-2016-0151">7.2 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-2546" id="cveDetailAnchor-14">CVE-2015-2546</a></strong> - The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a ... <a href="/vuln/detail/CVE-2015-2546#vulnDescriptionTitle">read CVE-2015-2546</a><br> <strong>Published:</strong> September 08, 2015; 8:59:53 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-14"> <span id="cvss2-link-14"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-2546&amp;vector=(AV:L/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-14" aria-label="V2 score for CVE-2015-2546">6.9 MEDIUM</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-1769" id="cveDetailAnchor-15">CVE-2015-1769</a></strong> - Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximat... <a href="/vuln/detail/CVE-2015-1769#vulnDescriptionTitle">read CVE-2015-1769</a><br> <strong>Published:</strong> August 14, 2015; 8:59:01 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-15"> <span id="cvss2-link-15"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-1769&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-15" aria-label="V2 score for CVE-2015-1769">7.2 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-2426" id="cveDetailAnchor-16">CVE-2015-2426</a></strong> - Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows ... <a href="/vuln/detail/CVE-2015-2426#vulnDescriptionTitle">read CVE-2015-2426</a><br> <strong>Published:</strong> July 20, 2015; 2:59:01 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-16"> <span id="cvss2-link-16"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-2426&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-16" aria-label="V2 score for CVE-2015-2426">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-2424" id="cveDetailAnchor-17">CVE-2015-2424</a></strong> - Microsoft PowerPoint 2007 SP3, Word 2007 SP3, PowerPoint 2010 SP2, Word 2010 SP2, PowerPoint 2013 SP1, Word 2013 SP1, and PowerPoint 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via ... <a href="/vuln/detail/CVE-2015-2424#vulnDescriptionTitle">read CVE-2015-2424</a><br> <strong>Published:</strong> July 14, 2015; 5:59:35 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-17"> <span id="cvss2-link-17"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-2424&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-17" aria-label="V2 score for CVE-2015-2424">9.3 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-2360" id="cveDetailAnchor-18">CVE-2015-2360</a></strong> - win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow... <a href="/vuln/detail/CVE-2015-2360#vulnDescriptionTitle">read CVE-2015-2360</a><br> <strong>Published:</strong> June 09, 2015; 9:59:38 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-18"> <span id="cvss2-link-18"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-2360&amp;vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-18" aria-label="V2 score for CVE-2015-2360">7.2 HIGH</a><br /> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/vuln/detail/CVE-2015-1671" id="cveDetailAnchor-19">CVE-2015-1671</a></strong> - The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverl... <a href="/vuln/detail/CVE-2015-1671#vulnDescriptionTitle">read CVE-2015-1671</a><br> <strong>Published:</strong> May 13, 2015; 6:59:03 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-19"> <span id="cvss2-link-19"> <em> V2.0:</em> <a href="/vuln-metrics/cvss/v2-calculator?name=CVE-2015-1671&amp;vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-19" aria-label="V2 score for CVE-2015-1671">9.3 HIGH</a><br /> </span> </p> </div> </li> </ul> </div> </div> </div> </div> </div> <div class="col-md-12 historical-data-area" id="historical-data-area"> <span> Created <span id="page-created-date"> <span>September 20, 2022</span> </span>, </span> Updated <span id="page-updated-date"> <span>August 27, 2024</span> </span> </div> </div> </div> </div> </div> </div> </main> <footer id="footer" role="contentinfo"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo" /> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://www.nist.gov" title="National Institute of Standards and Technology" rel="home" target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img src="/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo" /> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="mailto:nvd@nist.gov">Webmaster</a> | <a href="https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://www.nist.gov/about-nist/visit" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 </div> </div> </div> <div class="row"> <nav title="Footer Navigation" role="navigation" class="row footer-bottom-links-container"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a> | <a href="https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://www.nist.gov/foia">FOIA</a> | <a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://www.commerce.gov/">Commerce.gov</a> | <a href="https://www.science.gov/">Science.gov</a> | <a href="https://www.usa.gov/">USA.gov</a> </p> </nav> </div> </div> </footer> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10