CINXE.COM

NVD - NVD Dashboard

<!DOCTYPE html> <html lang="en"> <head><script type="text/javascript" src="/_static/js/bundle-playback.js?v=HxkREWBo" charset="utf-8"></script> <script type="text/javascript" src="/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("https://nvd.nist.gov/general/nvd-dashboard","20230127191906","https://web.archive.org/","web","/_static/", "1674847146"); </script> <link rel="stylesheet" type="text/css" href="/_static/css/banner-styles.css?v=S1zqJCYt" /> <link rel="stylesheet" type="text/css" href="/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title>NVD - NVD Dashboard</title> <meta http-equiv="content-type" content="text/html; charset=UTF-8"/> <meta http-equiv="content-style-type" content="text/css"/> <meta http-equiv="content-script-type" content="text/javascript"/> <meta name="viewport" content="width=device-width, initial-scale=1.0"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-scripts/font-awesome/css/font-awesome.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/bootstrap/css/bootstrap-theme.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/css/nist-fonts.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/css/base-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/css/media-resize.css" type="text/css" rel="stylesheet"/> <meta name="theme-color" content="#000000"> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-scripts/jquery/dist/jquery.min.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-scripts/jquery-visible/jquery.visible.min.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-scripts/underscore/underscore-min.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-media/bootstrap/js/bootstrap.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-scripts/moment/min/moment.min.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/megamenu.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nist-exit-script.js" type="text/javascript"></script> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/forms.js" type="text/javascript"></script> <!-- <script th:src="@{/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true}" type="text/javascript" id="_fed_an_js_tag"></script> --> <script src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true" type="text/javascript" id="_fed_an_js_tag"></script> <style id="antiClickjack"> body>* { display: none !important; } #antiClickjack { display: block !important; } </style> <noscript> <style id="antiClickjackNoScript"> body>* { display: block !important; } #antiClickjack { display: none !important; } </style> </noscript> <script type="text/javascript" id="antiClickjackScript"> if (self === top) { // no clickjacking var antiClickjack = document.getElementById("antiClickjack"); antiClickjack.parentNode.removeChild(antiClickjack); } else { setTimeout(tryForward(), 5000); } function tryForward() { top.location = self.location; } </script> <meta charset="UTF-8"> <link href="/web/20230127191906cs_/https://nvd.nist.gov/site-media/css/nvd-style.css" type="text/css" rel="stylesheet"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/apple-touch-icon.png" rel="apple-touch-icon" type="image/png" sizes="180x180"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/favicon-32x32.png" rel="icon" type="image/png" sizes="32x32"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/favicon-16x16.png" rel="icon" type="image/png" sizes="16x16"/> <link href="/web/20230127191906/https://nvd.nist.gov/site-media/images/favicons/manifest.json" rel="manifest"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/safari-pinned-tab.svg" rel="mask-icon" color="#000000"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon"/> <meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="shortcut icon" type="image/x-icon"/> <link href="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/favicons/favicon.ico" rel="icon" type="image/x-icon"/> <meta charset="UTF-8"> </head> <body> <header role="banner" title="Site Banner"> <div id="antiClickjack" style="display: none"> <h1>You are viewing this page in an unauthorized frame window.</h1> <p> This is a potential security issue, you are being redirected to <a href="https://web.archive.org/web/20230127191906/https://nvd.nist.gov/">https://nvd.nist.gov</a> </p> </div> <div> <section class="usa-banner" aria-label="Official government website"> <div class="usa-accordion container"> <header class="usa-banner__header"> <noscript> <p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p> </noscript> <img class="usa-banner__header-flag" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag"> &nbsp; <span class="usa-banner__header-text">An official website of the United States government</span> <button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner"> <span class="usa-banner__button-text">Here's how you know</span> </button> </header> <div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true"> <div class="row"> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Official websites use .gov</strong> <br> A <strong>.gov</strong> website belongs to an official government organization in the United States. </p> </div> </div> </div> <div class="col-md-5 col-sm-12"> <div class="row"> <div class="col-sm-2 col-xs-3"> <img class="usa-banner__icon usa-media-block__img" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/usbanner/icon-https.svg" alt="Https"> </div> <div class="col-sm-10 col-xs-9"> <p> <strong>Secure .gov websites use HTTPS</strong> <br> A <strong>lock</strong> (<img class="usa-banner__lock" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. </p> </div> </div> </div> </div> </div> </div> </section> </div> <div> <div> <nav id="navbar" class="navbar"> <div id="nist-menu-container" class="container"> <div class="row"> <!-- Brand --> <div class="col-xs-6 col-md-4 navbar-header" style="height:104px"> <a class="navbar-brand" href="https://web.archive.org/web/20230127191906/https://www.nist.gov/" target="_blank" id="navbar-brand-image" style="padding-top: 36px"> <img alt="National Institute of Standards and Technology" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.svg" width="110" height="30"> </a> </div> <div class="col-xs-6 col-md-8 navbar-nist-logo"> <span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#"> <span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span class="hidden-xxs">NVD </span>MENU</span> </a> </span> </div> </div> </div> <div class="main-menu-row container"> <!-- Collect the nav links, forms, and other content for toggling --> <div id="main-menu-drop" class="col-lg-12" style="display: none;"> <ul> <li><a href="/web/20230127191906/https://nvd.nist.gov/general"> General <span class="expander fa fa-plus" id="nvd-header-menu-general" data-expander-name="general" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="general"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/general/nvd-dashboard">NVD Dashboard</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/general/news">News</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/general/email-list">Email List</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/general/faq">FAQ</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/general/visualizations">Visualizations</a> </p> </div> </div> </div></li> <li><a href="/web/20230127191906/https://nvd.nist.gov/vuln"> Vulnerabilities <span class="expander fa fa-plus" id="nvd-header-menu-vulnerabilities" data-expander-name="vulnerabilities" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="vulnerabilities"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/search">Search &amp; Statistics</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/full-listing">Full Listing</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/categories">Weakness Types</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/data-feeds">Legacy Data Feeds</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/vendor-comments">Vendor Comments</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/cvmap">CVMAP</a> </p> </div> </div> </div></li> <li><a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss"> Vulnerability Metrics <span class="expander fa fa-plus" id="nvd-header-menu-metrics" data-expander-name="metrics" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="metrics"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator">CVSS V3 Calculator</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator">CVSS V2 Calculator</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li><a href="/web/20230127191906/https://nvd.nist.gov/products"> Products <span class="expander fa fa-plus" id="nvd-header-menu-products" data-expander-name="products" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="products"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/products/cpe">CPE Dictionary</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/products/cpe/statistics">CPE Statistics</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/products/swid">SWID</a> </p> </div> <div class="col-lg-4"></div> </div> </div></li> <li> <a href="/web/20230127191906/https://nvd.nist.gov/developers">Developers<span class="expander fa fa-plus" id="nvd-header-menu-developers" data-expander-name="developers" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="developers"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/start-here">Start Here</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/request-an-api-key">Request an API Key</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/vulnerabilities">Vulnerabilities</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/products">Products</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/data-sources">Data Sources</a> </p> <p> <a href="/web/20230127191906/https://nvd.nist.gov/developers/terms-of-use">Terms of Use</a> </p> </div> </div> </div> </li> <li><a href="/web/20230127191906/https://nvd.nist.gov/info"> Contact NVD </a></li> <li><a href="/web/20230127191906/https://nvd.nist.gov/other"> Other Sites <span class="expander fa fa-plus" id="nvd-header-menu-othersites" data-expander-name="otherSites" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="otherSites"> <div class="row"> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20230127191906/https://ncp.nist.gov/">Checklist (NCP) Repository</a> </p> <p> <a href="https://web.archive.org/web/20230127191906/https://ncp.nist.gov/cce">Configurations (CCE)</a> </p> <p> <a href="https://web.archive.org/web/20230127191906/https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20230127191906/https://csrc.nist.gov/projects/scap-validation-program">SCAP Validated Tools</a> </p> <p> <a href="https://web.archive.org/web/20230127191906/https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a> </p> </div> <div class="col-lg-4"> <p> <a href="https://web.archive.org/web/20230127191906/https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a> </p> </div> </div> </div></li> <li><a href="/web/20230127191906/https://nvd.nist.gov/search"> Search <span class="expander fa fa-plus" id="nvd-header-menu-search" data-expander-name="search" data-expanded="false"> <span class="element-invisible">Expand or Collapse</span> </span> </a> <div style="display: none;" class="sub-menu" data-expander-trigger="search"> <div class="row"> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/vuln/search">Vulnerability Search</a> </p> </div> <div class="col-lg-4"> <p> <a href="/web/20230127191906/https://nvd.nist.gov/products/cpe/search">CPE Search</a> </p> </div> </div> </div></li> </ul> </div> <!-- /#mobile-nav-container --> </div> </nav> <section id="itl-header" class="has-menu"> <div class="container"> <div class="row"> <div class="col-sm-12 col-md-8"> <h2 class="hidden-xs hidden-sm"> <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/itl" target="_blank">Information Technology Laboratory</a> </h2> <h1 class="hidden-xs hidden-sm"> <a id="nvd-header-link" href="/web/20230127191906/https://nvd.nist.gov/">National Vulnerability Database</a> </h1> <h1 class="hidden-xs text-center hidden-md hidden-lg">National Vulnerability Database</h1> <h1 class="hidden-sm hidden-md hidden-lg text-center">NVD</h1> </div> <div class="col-sm-12 col-md-4"> <a style="width: 100%; text-align: center; display: block;padding-top: 14px"> <img id="img-logo-nvd-lg" alt="National Vulnerability Database" src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/F_NIST-Logo-NVD-white.svg" width="500" height="100"> </a> </div> </div> </div> </section> </div> </div> </header> <main> <div> <div id="body-section" class="container"> <div id="page-content" data-ng-app="nvdApp.dashboard"> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/angular/angular.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/angular-bootstrap/ui-bootstrap-tpls.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/nvdApp.module.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/d3/d3.module.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/d3/d3.service.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/d3/d3.pieChart.directive.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/dashboard/dashboard.module.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/dashboard/dashboard.service.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/dashboard/dashboard.cveStatistics.controller.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/dashboard/dashboard.cvesInProc.controller.js"></script> <script type="text/javascript" src="/web/20230127191906js_/https://nvd.nist.gov/site-media/js/nvdApp/dashboard/dashboard.cvssScoreSpread.controller.js"></script> <h2>NVD Dashboard</h2> <div class="row"> <div class="col-lg-7 col-md-12"> <div class="col-lg-12"> <h3>CVEs Received and Processed</h3> <input type="hidden" id="InputRestBasePath" value="/rest/public/dashboard/statistics" name="InputRestBasePath"> <input type="hidden" id="InputScriptsPath" value="/site-media/js/visualizations" name="InputScriptsPath"> <div data-ng-controller="cvesInProcController as vm"> <div class="row" ng-show="vm.loading"> <div class="col-lg-12 dash-overlay" style="height: 255px;"> <div> <h3>CVEs Received and Processed</h3> <h3> <i class="fa fa-spinner fa-spin"></i> Please Wait </h3> </div> </div> </div> <div id="divCvesReceivedAndProcessed" class="row" ng-hide="vm.loading" ng-cloak="ng-cloak"> <div class="col-lg-12"> <table class="table table-striped" id="tableCvesReceivedAndProcessed"> <thead> <tr> <th>Time Period</th> <th>New CVEs Received by NVD</th> <th>New CVEs Analyzed by NVD</th> <th>Modified CVEs Received by NVD</th> <th>Modified CVEs Re-analyzed by NVD</th> </tr> </thead> <tbody> <tr> <th nowrap="nowrap">Today</th> <td ng-repeat="data in vm.countsData.TODAY">{{data.count}}</td> </tr> <tr> <th nowrap="nowrap">This Week</th> <td ng-repeat="data in vm.countsData.THIS_WEEK">{{data.count}}</td> </tr> <tr> <th nowrap="nowrap">This Month</th> <td ng-repeat="data in vm.countsData.THIS_MONTH">{{data.count}}</td> </tr> <tr> <th nowrap="nowrap">Last Month</th> <td ng-repeat="data in vm.countsData.LAST_MONTH">{{data.count}}</td> </tr> <tr> <th nowrap="nowrap">This Year</th> <td ng-repeat="data in vm.countsData.THIS_YEAR">{{data.count}}</td> </tr> </tbody> </table> </div> </div> </div> </div> <div class="col-lg-6 col-md-12"> <div data-ng-controller="cveStatisticsController as vm"> <div class="row" ng-show="vm.loading"> <div class="col-lg-12 dash-overlay" style="height: 255px;"> <div> <h3>CVE Status Count</h3> <h3> <i class="fa fa-spinner fa-spin"></i> Please Wait </h3> </div> </div> </div> <div class="row" ng-hide="vm.loading" ng-cloak="ng-cloak" id="divCveStatusCount"> <div class="col-lg-12"> <h3>CVE Status Count</h3> <table class="table table-striped" id="tableCveStatusCount"> <tbody> <tr ng-repeat="data in vm.countsData | orderBy: 'order'" uib-tooltip="{{data.description}}"> <td>{{data.name}}</td> <td>{{data.count}}</td> </tr> </tbody> </table> </div> </div> </div> </div> <div class="col-lg-6 col-md-12"> <div id="nvdCounts"> <h3>NVD Contains</h3> <table class="table table-striped" id="tableNvdCounts"> <tbody> <tr> <td><a href="https://web.archive.org/web/20230127191906/https://cve.mitre.org/" target="_blank">CVE Vulnerabilities</a></td> <td>206011</td> </tr> <tr> <td><a href="https://web.archive.org/web/20230127191906/https://ncp.nist.gov/">Checklists</a></td> <td>602</td> </tr> <tr> <td><a href="https://web.archive.org/web/20230127191906/https://www.cisa.gov/uscert/ncas/alerts" target="_blank">US-CERT Alerts</a></td> <td>249</td> </tr> <tr> <td><a href="https://web.archive.org/web/20230127191906/https://www.kb.cert.org/vuls/byupdate/desc/" target="_blank">US-CERT Vuln Notes</a></td> <td>4487</td> </tr> <tr> <td><a href="https://web.archive.org/web/20230127191906/https://oval.mitre.org/" target="_blank">OVAL Queries</a></td> <td>10286</td> </tr> <tr> <td><a href="/web/20230127191906/https://nvd.nist.gov/products/cpe">CPE Names</a></td> <td>1015427</td> </tr> </tbody> </table> </div> </div> </div> <div class="col-lg-5 col-md-12"> <div data-ng-controller="cvssScoreSpreadController as vm"> <div class="row" ng-show="vm.loading"> <div class="col-lg-12 dash-overlay" style="height: 510px;"> <div> <h3>CVSS Score Spread</h3> <h3><i class="fa fa-spinner fa-spin"></i> Please Wait</h3> </div> </div> </div> <div class="row" ng-hide="vm.loading" ng-cloak="ng-cloak" id="divCvssV3ScoreDist"> <h3> CVSS V3 Score Distribution </h3> <div class="row"> <div class="col-lg-5"> <d3-pie-chart pie-data="vm.cvssV3PieData" pie-complete="vm.v3Complete" height="250" width="250" loading="vm.loading"></d3-pie-chart> </div> <div class="col-lg-7"> <table class="table table-striped" id="tableCvssV3ScoreDist"> <thead> <tr> <th>Severity</th> <th>Number of Vulns</th> </tr> </thead> <tbody> <tr ng-repeat="data in vm.cvssV3PieData | orderBy: 'order'"> <td> <span class="label label-{{data.label}}">{{data.name}}</span> </td> <td>{{data.count}}</td> </tr> </tbody> </table> </div> </div> </div> <br/> <div class="row" ng-hide="vm.loading" ng-cloak="ng-cloak" id="divCvssV2ScoreDist"> <h3>CVSS V2 Score Distribution</h3> <div class="row"> <div class="col-md-5"> <d3-pie-chart pie-data="vm.cvssV2PieData" pie-complete="vm.v2Complete" height="250" width="250" loading="vm.loading"></d3-pie-chart> </div> <div class="col-lg-7"> <table class="table table-striped" id="tableCvssV2ScoreDist"> <thead> <tr> <th>Severity</th> <th>Number of Vulns</th> </tr> </thead> <tbody> <tr ng-repeat="data in vm.cvssV2PieData | orderBy: 'order'"> <td> <span class="label label-{{data.label}}">{{data.name}}</span> </td> <td>{{data.count}}</td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div><br/> <br/> <span>For information on how to the cite the NVD, including the database's Digital Object Identifier (DOI), please consult <a href="https://web.archive.org/web/20230127191906/https://data.nist.gov/od/id/1E0F15DAAEFB84E4E0531A5706813DD8436"> NIST's Public Data Repository</a>.</span> <br/> <br/> <div> <div class="row"> <div class="col-md-12 col-sm-12"> <div id="vulnResultsPanel"> <!-- Results Panel --> <div id="latestVulnsArea"> <div id="latestVulnsTitleRow" class="row"> <span class="hidden-md col-lg-9"> <strong class="h4Size">Last 20 Scored Vulnerability IDs &amp; Summaries</strong> </span> <span class="hidden-md col-lg-3"> <strong class="h4Size">CVSS Severity </strong> </span> </div> <ul id="latestVulns"> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-11061" id="cveDetailAnchor-0">CVE-2020-11061</a></strong> - In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director&#39;s memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-11061#vulnDescriptionTitle">read CVE-2020-11061</a><br> <strong>Published:</strong> July 10, 2020; 4:15:11 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-0"> <span id="cvss3-link-0"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-11061&amp;vector=AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-0" aria-label="V3 score for CVE-2020-11061">7.4 HIGH</a><br/> </span> <span id="cvss2-link-0"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-11061&amp;vector=(AV:N/AC:M/Au:S/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-0" aria-label="V2 score for CVE-2020-11061">6.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42413" id="cveDetailAnchor-1">CVE-2022-42413</a></strong> - This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42413#vulnDescriptionTitle">read CVE-2022-42413</a><br> <strong>Published:</strong> January 26, 2023; 1:59:57 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-1"> <span id="cvss3-link-1"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42413&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-1" aria-label="V3 score for CVE-2022-42413">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42412" id="cveDetailAnchor-2">CVE-2022-42412</a></strong> - This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42412#vulnDescriptionTitle">read CVE-2022-42412</a><br> <strong>Published:</strong> January 26, 2023; 1:59:57 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-2"> <span id="cvss3-link-2"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42412&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-2" aria-label="V3 score for CVE-2022-42412">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42411" id="cveDetailAnchor-3">CVE-2022-42411</a></strong> - This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42411#vulnDescriptionTitle">read CVE-2022-42411</a><br> <strong>Published:</strong> January 26, 2023; 1:59:57 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-3"> <span id="cvss3-link-3"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42411&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-3" aria-label="V3 score for CVE-2022-42411">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-30674" id="cveDetailAnchor-4">CVE-2022-30674</a></strong> - Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-30674#vulnDescriptionTitle">read CVE-2022-30674</a><br> <strong>Published:</strong> September 16, 2022; 2:15:12 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-4"> <span id="cvss3-link-4"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-30674&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=Adobe%20Systems%20Incorporated" class="label label-warning" data-testid="vuln-cvss3-link-4" aria-label="V3 score for CVE-2022-30674">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42390" id="cveDetailAnchor-5">CVE-2022-42390</a></strong> - This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-42390#vulnDescriptionTitle">read CVE-2022-42390</a><br> <strong>Published:</strong> January 26, 2023; 1:59:56 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-5"> <span id="cvss3-link-5"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-42390&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-5" aria-label="V3 score for CVE-2022-42390">5.5 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-40617" id="cveDetailAnchor-6">CVE-2022-40617</a></strong> - strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker&#39;s cont... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2022-40617#vulnDescriptionTitle">read CVE-2022-40617</a><br> <strong>Published:</strong> October 31, 2022; 2:15:09 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-6"> <span id="cvss3-link-6"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-40617&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-6" aria-label="V3 score for CVE-2022-40617">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9109" id="cveDetailAnchor-7">CVE-2017-9109</a></strong> - An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by int... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9109#vulnDescriptionTitle">read CVE-2017-9109</a><br> <strong>Published:</strong> June 18, 2020; 10:15:10 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-7"> <span id="cvss3-link-7"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-9109&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-7" aria-label="V3 score for CVE-2017-9109">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-7"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-9109&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-7" aria-label="V2 score for CVE-2017-9109">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9103" id="cveDetailAnchor-8">CVE-2017-9103</a></strong> - An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might ... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9103#vulnDescriptionTitle">read CVE-2017-9103</a><br> <strong>Published:</strong> June 18, 2020; 11:15:10 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-8"> <span id="cvss3-link-8"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-9103&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-8" aria-label="V3 score for CVE-2017-9103">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-8"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-9103&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-8" aria-label="V2 score for CVE-2017-9103">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9104" id="cveDetailAnchor-9">CVE-2017-9104</a></strong> - An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered. <br> <strong>Published:</strong> June 18, 2020; 11:15:10 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-9"> <span id="cvss3-link-9"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-9104&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-9" aria-label="V3 score for CVE-2017-9104">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-9"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-9104&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-9" aria-label="V2 score for CVE-2017-9104">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9108" id="cveDetailAnchor-10">CVE-2017-9108</a></strong> - An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() ... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9108#vulnDescriptionTitle">read CVE-2017-9108</a><br> <strong>Published:</strong> June 18, 2020; 10:15:10 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-10"> <span id="cvss3-link-10"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-9108&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-10" aria-label="V3 score for CVE-2017-9108">7.5 HIGH</a><br/> </span> <span id="cvss2-link-10"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-9108&amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-10" aria-label="V2 score for CVE-2017-9108">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2017-9105" id="cveDetailAnchor-11">CVE-2017-9105</a></strong> - An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution. <br> <strong>Published:</strong> June 18, 2020; 10:15:10 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-11"> <span id="cvss3-link-11"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-9105&amp;vector=AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-11" aria-label="V3 score for CVE-2017-9105">8.8 HIGH</a><br/> </span> <span id="cvss2-link-11"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-9105&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-11" aria-label="V2 score for CVE-2017-9105">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-14148" id="cveDetailAnchor-12">CVE-2020-14148</a></strong> - The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function. <br> <strong>Published:</strong> June 15, 2020; 2:15:15 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-12"> <span id="cvss3-link-12"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-14148&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-12" aria-label="V3 score for CVE-2020-14148">7.5 HIGH</a><br/> </span> <span id="cvss2-link-12"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-14148&amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-12" aria-label="V2 score for CVE-2020-14148">5.0 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6703" id="cveDetailAnchor-13">CVE-2018-6703</a></strong> - Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTT... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6703#vulnDescriptionTitle">read CVE-2018-6703</a><br> <strong>Published:</strong> December 11, 2018; 6:29:00 PM -0500 </p> </div> <div class="col-lg-3"> <p id="severity-score-13"> <span id="cvss3-link-13"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-6703&amp;vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-critical" data-testid="vuln-cvss3-link-13" aria-label="V3 score for CVE-2018-6703">9.8 CRITICAL</a><br/> </span> <span id="cvss2-link-13"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-6703&amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss2-link-13" aria-label="V2 score for CVE-2018-6703">7.5 HIGH</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-13999" id="cveDetailAnchor-14">CVE-2020-13999</a></strong> - ScaleViewPortExtEx in libemf.cpp in libEMF (aka ECMA-234 Metafile Library) 1.0.12 allows an integer overflow and denial of service via a crafted EMF file. <br> <strong>Published:</strong> June 15, 2020; 12:15:22 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-14"> <span id="cvss3-link-14"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-13999&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-14" aria-label="V3 score for CVE-2020-13999">5.5 MEDIUM</a><br/> </span> <span id="cvss2-link-14"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-13999&amp;vector=(AV:N/AC:M/Au:N/C:N/I:N/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-14" aria-label="V2 score for CVE-2020-13999">4.3 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6689" id="cveDetailAnchor-15">CVE-2018-6689</a></strong> - Authentication Bypass vulnerability in McAfee Data Loss Prevention Endpoint (DLPe) 10.0.x earlier than 10.0.510, and 11.0.x earlier than 11.0.600 allows attackers to bypass local security protection via specific conditions. <br> <strong>Published:</strong> October 03, 2018; 8:29:00 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-15"> <span id="cvss3-link-15"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-6689&amp;vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-15" aria-label="V3 score for CVE-2018-6689">7.8 HIGH</a><br/> </span> <span id="cvss2-link-15"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-6689&amp;vector=(AV:L/AC:L/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-15" aria-label="V2 score for CVE-2018-6689">4.6 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6700" id="cveDetailAnchor-16">CVE-2018-6700</a></strong> - DLL Search Order Hijacking vulnerability in Microsoft Windows Client in McAfee True Key (TK) before 5.1.165 allows local users to execute arbitrary code via specially crafted malware. <br> <strong>Published:</strong> September 24, 2018; 9:29:00 AM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-16"> <span id="cvss3-link-16"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-6700&amp;vector=AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-16" aria-label="V3 score for CVE-2018-6700">7.8 HIGH</a><br/> </span> <span id="cvss2-link-16"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-6700&amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&amp;version=2.0&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss2-link-16" aria-label="V2 score for CVE-2018-6700">6.8 MEDIUM</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6690" id="cveDetailAnchor-17">CVE-2018-6690</a></strong> - Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from ex... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2018-6690#vulnDescriptionTitle">read CVE-2018-6690</a><br> <strong>Published:</strong> September 18, 2018; 6:29:00 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-17"> <span id="cvss3-link-17"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2018-6690&amp;vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N&amp;version=3.1&amp;source=NIST" class="label label-danger" data-testid="vuln-cvss3-link-17" aria-label="V3 score for CVE-2018-6690">7.1 HIGH</a><br/> </span> <span id="cvss2-link-17"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2018-6690&amp;vector=(AV:L/AC:L/Au:N/C:P/I:P/A:N)&amp;version=2.0&amp;source=NIST" class="label label-low" data-testid="vuln-cvss2-link-17" aria-label="V2 score for CVE-2018-6690">3.6 LOW</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-4046" id="cveDetailAnchor-18">CVE-2020-4046</a></strong> - In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this c... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-4046#vulnDescriptionTitle">read CVE-2020-4046</a><br> <strong>Published:</strong> June 12, 2020; 12:15:10 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-18"> <span id="cvss3-link-18"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-4046&amp;vector=AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-18" aria-label="V3 score for CVE-2020-4046">5.4 MEDIUM</a><br/> </span> <span id="cvss2-link-18"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-4046&amp;vector=(AV:N/AC:M/Au:S/C:N/I:P/A:N)&amp;version=2.0&amp;source=NIST" class="label label-low" data-testid="vuln-cvss2-link-18" aria-label="V2 score for CVE-2020-4046">3.5 LOW</a><br/> </span> </p> </div> </li> <li> <div class="col-lg-9"> <p> <strong><a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-10702" id="cveDetailAnchor-19">CVE-2020-10702</a></strong> - A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to... <a href="/web/20230127191906/https://nvd.nist.gov/vuln/detail/CVE-2020-10702#vulnDescriptionTitle">read CVE-2020-10702</a><br> <strong>Published:</strong> June 04, 2020; 2:15:14 PM -0400 </p> </div> <div class="col-lg-3"> <p id="severity-score-19"> <span id="cvss3-link-19"> <em>V3.1:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-10702&amp;vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST" class="label label-warning" data-testid="vuln-cvss3-link-19" aria-label="V3 score for CVE-2020-10702">5.5 MEDIUM</a><br/> </span> <span id="cvss2-link-19"> <em> V2.0:</em> <a href="/web/20230127191906/https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2020-10702&amp;vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-low" data-testid="vuln-cvss2-link-19" aria-label="V2 score for CVE-2020-10702">2.1 LOW</a><br/> </span> </p> </div> </li> </ul> </div> </div> </div> </div> </div> </div> </div> </div> </main> <footer id="footer" role="contentinfo"> <div class="container"> <div class="row"> <div class="col-sm-12"> <ul class="social-list pull-right"> <li class="field-item service-twitter list-horiz"><a href="https://web.archive.org/web/20230127191906/https://twitter.com/NISTCyber" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> <li class="field-item service-facebook list-horiz"><a href="https://web.archive.org/web/20230127191906/https://www.facebook.com/NIST" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-linkedin list-horiz"><a href="https://web.archive.org/web/20230127191906/https://www.linkedin.com/company/nist" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-youtube list-horiz"><a href="https://web.archive.org/web/20230127191906/https://www.youtube.com/user/USNISTGOV" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span></a></li> <li class="field-item service-rss list-horiz"><a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/news-events/nist-rss-feeds" target="_blank" class="social-btn social-btn--large extlink"> <i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i> </a></li> <li class="field-item service-govdelivery list-horiz last"><a href="https://web.archive.org/web/20230127191906/https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3" target="_blank" class="social-btn social-btn--large extlink ext"> <i class="fa fa-envelope fa-fw"><span class="element-invisible">govdelivery</span></i><span class="ext"><span class="element-invisible"> (link is external)</span></span> </a></li> </ul> <span class="hidden-xs"> <a title="National Institute of Standards and Technology" rel="home" class="footer-nist-logo"> <img src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo"/> </a> </span> </div> </div> <div class="row hidden-sm hidden-md hidden-lg"> <div class="col-sm-12"> <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/" title="National Institute of Standards and Technology" rel="home" target="_blank" class="footer-nist-logo"> <img src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/nist/nist-logo.png" alt="National Institute of Standards and Technology logo"/> </a> </div> </div> <div class="row footer-contact-container"> <div class="col-sm-6"> <strong>HEADQUARTERS</strong> <br> 100 Bureau Drive <br> Gaithersburg, MD 20899 <br> <a href="https://web.archive.org/web/20230127191906/tel:301-975-2000">(301) 975-2000</a> <br> <br> <a href="https://web.archive.org/web/20230127191906/mailto:nvd@nist.gov">Webmaster</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/about-nist/contact-us">Contact Us</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/about-nist/visit" style="display: inline-block;">Our Other Offices</a> </div> <div class="col-sm-6"> <div class="pull-right" style="text-align:right"> <strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong> <br> US-CERT Security Operations Center <br> Email: <a href="https://web.archive.org/web/20230127191906/mailto:soc@us-cert.gov">soc@us-cert.gov</a> <br> Phone: 1-888-282-0870 <br> <span style="display: inline-block; text-align: left; margin-left: 0; margin-right: 0;"> <strong style="float: right">Sponsored by</strong> <br> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="https://web.archive.org/web/20230127191906/https://www.cisa.gov/" target="_blank">CISA</a> </span> <a style="float: right; width: 68px;"> <img src="/web/20230127191906im_/https://nvd.nist.gov/site-media/images/cisa-thumbnail.png" alt="CISA"/> </a> </div> </div> </div> <div class="row"> <nav title="Footer Navigation" role="navigation" class="row footer-bottom-links-container"> <!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html --> <p> <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/oism/site-privacy">Site Privacy</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/oism/accessibility">Accessibility</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/privacy">Privacy Program</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/oism/copyrights">Copyrights</a> | <a href="https://web.archive.org/web/20230127191906/https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/foia">FOIA</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/environmental-policy-statement">Environmental Policy</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a> | <a href="https://web.archive.org/web/20230127191906/https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a> | <a href="https://web.archive.org/web/20230127191906/https://www.commerce.gov/">Commerce.gov</a> | <a href="https://web.archive.org/web/20230127191906/https://www.science.gov/">Science.gov</a> | <a href="https://web.archive.org/web/20230127191906/https://www.usa.gov/">USA.gov</a> </p> </nav> </div> </div> </footer> </body> </html><!-- FILE ARCHIVED ON 19:19:06 Jan 27, 2023 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 01:23:06 Dec 04, 2024. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.456 exclusion.robots: 0.021 exclusion.robots.policy: 0.012 esindex: 0.009 cdx.remote: 9.388 LoadShardBlock: 269.08 (3) PetaboxLoader3.datanode: 169.5 (4) PetaboxLoader3.resolve: 178.638 (3) load_resource: 107.328 -->

Pages: 1 2 3 4 5 6 7 8 9 10