diff --git a/.gitignore b/.gitignore index b983990609..a54f646b84 100644 --- a/.gitignore +++ b/.gitignore @@ -1,9 +1,4 @@ data/ .venv/ -docs/api/ -docs/cve/ -docs/epss/ -docs/kev/ -docs/diffs/ -docs/vendors/ +docs/api/v1/cve/ scripts/__pycache__/ diff --git a/docs/404.html b/docs/404.html new file mode 100644 index 0000000000..6ff630fb15 --- /dev/null +++ b/docs/404.html @@ -0,0 +1,38 @@ + + + + + + Redirecting… + + + + +
+
+

Not found

+

Redirecting…

+

Trying to find the right page.

+
+
+ + + diff --git a/docs/api/v1/diff/2025-12-17.json b/docs/api/v1/diff/2025-12-17.json new file mode 100644 index 0000000000..c1bd999ef8 --- /dev/null +++ b/docs/api/v1/diff/2025-12-17.json @@ -0,0 +1,1074 @@ +{ + "epss_movers": [], + "generated": "2025-12-17", + "new_high_epss": [ + { + "cve": "CVE-2025-9316", + "epss": 0.78706, + "percentile": 0.98995, + "poc_count": 0, + "summary": "" + }, + { + "cve": "CVE-2025-8943", + "epss": 0.6583, + "percentile": 0.9843, + "poc_count": 1, + "summary": "The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks ro..." + } + ], + "new_kev_entries": [ + { + "cve": "CVE-2025-9242", + "date_added": "2025-11-12", + "due_date": "2025-12-03", + "epss": 0.7437, + "notes": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 ; https://nvd.nist.gov/vuln/detail/CVE-2025-9242", + "percentile": 0.98786, + "poc_count": 0, + "product": "Firebox", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "WatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.", + "summary": "", + "vendor": "WatchGuard" + }, + { + "cve": "CVE-2025-7775", + "date_added": "2025-08-26", + "due_date": "2025-08-28", + "epss": 0.17354, + "notes": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775", + "percentile": 0.94817, + "poc_count": 15, + "product": "NetScaler", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.", + "summary": "Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) o...", + "vendor": "Citrix" + }, + { + "cve": "CVE-2025-9377", + "date_added": "2025-09-03", + "due_date": "2025-09-24", + "epss": 0.14589, + "notes": "https://www.tp-link.com/us/support/faq/4308/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-9377", + "percentile": 0.94217, + "poc_count": 4, + "product": "Multiple Routers", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/N...", + "vendor": "TP-Link" + }, + { + "cve": "CVE-2025-8876", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.13881, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876", + "percentile": 0.94059, + "poc_count": 6, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains a command injection vulnerability via improper sanitization of user input.", + "summary": "Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8875", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.05085, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8875", + "percentile": 0.89424, + "poc_count": 7, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.", + "summary": "Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8088", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": 0.03156, + "notes": "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088", + "percentile": 0.8647, + "poc_count": 45, + "product": "WinRAR", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.", + "summary": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovere...", + "vendor": "RARLAB" + }, + { + "cve": "CVE-2002-0367", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2002-0367", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.", + "summary": "smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-0210", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2004-0210", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.", + "summary": "The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-1464", + "date_added": "2023-05-19", + "due_date": "2023-06-09", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464", + "percentile": null, + "poc_count": 2, + "product": "IOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.", + "summary": "Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2005-2773", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2005-2773", + "percentile": null, + "poc_count": 1, + "product": "OpenView Network Node Manager", + "required_action": "Apply updates per vendor instructions.", + "short_description": "HP OpenView Network Node Manager could allow a remote attacker to execute arbitrary commands on the system.", + "summary": "HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl...", + "vendor": "Hewlett Packard (HP)" + }, + { + "cve": "CVE-2006-1547", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-1547", + "percentile": null, + "poc_count": 2, + "product": "Struts 1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).", + "summary": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references t...", + "vendor": "Apache" + }, + { + "cve": "CVE-2006-2492", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-2492", + "percentile": null, + "poc_count": 3, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.", + "summary": "Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object po...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-0671", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 ; https://nvd.nist.gov/vuln/detail/CVE-2007-0671", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", + "summary": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonst...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-3010", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-3010", + "percentile": null, + "poc_count": 3, + "product": "OmniPCX Enterprise", + "required_action": "Apply updates per vendor instructions.", + "short_description": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands.", + "summary": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during...", + "vendor": "Alcatel" + }, + { + "cve": "CVE-2007-5659", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", + "percentile": null, + "poc_count": 4, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.", + "summary": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-0655", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.", + "summary": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-2992", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", + "percentile": null, + "poc_count": 7, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.", + "summary": "Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-3431", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-3431", + "percentile": null, + "poc_count": 5, + "product": "VirtualBox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.", + "summary": "The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, whi...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2009-0557", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0557", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.", + "summary": "Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel V...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0563", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0563", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.", + "summary": "Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Mic...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0927", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0927", + "percentile": null, + "poc_count": 4, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat allows remote attackers to execute arbitrary code.", + "summary": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Colla...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-1123", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1123", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application.", + "summary": "The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to ga...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-1151", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1151", + "percentile": null, + "poc_count": 19, + "product": "phpMyAdmin", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file.", + "summary": "Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.", + "vendor": "phpMyAdmin" + }, + { + "cve": "CVE-2009-1862", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader, Flash Player", + "required_action": "For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-2055", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-2055", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR,when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2009-3129", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3129", + "percentile": null, + "poc_count": 2, + "product": "Excel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset.", + "summary": "Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatib...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-3953", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", + "percentile": null, + "poc_count": 1, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.", + "summary": "The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF documen...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-3960", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", + "percentile": null, + "poc_count": 2, + "product": "BlazeDS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe BlazeDS, which is utilized in LifeCycle and Coldfusion, contains a vulnerability that allows for information disclosure.", + "summary": "Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, all...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-4324", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", + "percentile": null, + "poc_count": 6, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.", + "summary": "Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary cod...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0188", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", + "percentile": null, + "poc_count": 3, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in Adobe Reader and Acrobat allows attackers to cause a denial of service or possibly execute arbitrary code.", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0232", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0232", + "percentile": null, + "poc_count": 17, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.", + "summary": "The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when acces...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-0738", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0738", + "percentile": null, + "poc_count": 21, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.", + "summary": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST me...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-0840", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0840", + "percentile": null, + "poc_count": 8, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and av...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2010-1297", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", + "percentile": null, + "poc_count": 5, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to exec...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-1428", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1428", + "percentile": null, + "poc_count": 3, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.", + "summary": "The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-1871", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1871", + "percentile": null, + "poc_count": 17, + "product": "JBoss Seam 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. This vulnerability can only be exploited when the Java Security Manager is not properly configured.", + "summary": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-2568", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568", + "percentile": null, + "poc_count": 22, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.", + "summary": "Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2572", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2572", + "percentile": null, + "poc_count": 1, + "product": "PowerPoint", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.", + "summary": "Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka \"PowerPoint Parsing Buffer Overflow Vulnerability.\"", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2861", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", + "percentile": null, + "poc_count": 64, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A directory traversal vulnerability exists in the administrator console in Adobe ColdFusion which allows remote attackers to read arbitrary files.", + "summary": "Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settin...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-2883", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", + "percentile": null, + "poc_count": 9, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (app...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-3035", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3035", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR, when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix annou...", + "vendor": "Cisco" + }, + { + "cve": "CVE-2010-3333", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3333", + "percentile": null, + "poc_count": 33, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.", + "summary": "Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attack...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-3765", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-73 ; https://nvd.nist.gov/vuln/detail/CVE-2010-3765", + "percentile": null, + "poc_count": 4, + "product": "Multiple Products", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.", + "summary": "Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute ar...", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2010-3904", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904", + "percentile": null, + "poc_count": 125, + "product": "Kernel", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", + "summary": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which a...", + "vendor": "Linux" + }, + { + "cve": "CVE-2010-3962", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2458511?redirectedfrom=MSDN ; https://nvd.nist.gov/vuln/detail/CVE-2010-3962", + "percentile": null, + "poc_count": 3, + "product": "Internet Explorer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-4344", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4344", + "percentile": null, + "poc_count": 9, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.", + "summary": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a lar...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4345", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4345", + "percentile": null, + "poc_count": 4, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.", + "summary": "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstra...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4398", + "date_added": "2022-03-28", + "due_date": "2022-04-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4398", + "percentile": null, + "poc_count": 9, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature.", + "summary": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Wind...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-5326", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5326", + "percentile": null, + "poc_count": 1, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms Invoker Servlet does not require authentication, allowing for remote code execution via a HTTP or HTTPS request.", + "summary": "The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as ex...", + "vendor": "SAP" + }, + { + "cve": "CVE-2010-5330", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5330", + "percentile": null, + "poc_count": 2, + "product": "AirOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi.", + "summary": "On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4....", + "vendor": "Ubiquiti" + }, + { + "cve": "CVE-2011-0609", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0609", + "percentile": null, + "poc_count": 4, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bund...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-0611", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.", + "summary": "Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-1823", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823", + "percentile": null, + "poc_count": 3, + "product": "Android OS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.", + "summary": "The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative...", + "vendor": "Android" + }, + { + "cve": "CVE-2011-1889", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-1889", + "percentile": null, + "poc_count": 1, + "product": "Forefront Threat Management Gateway (TMG)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.", + "summary": "The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka \"TMG Firewa...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2005", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2005", + "percentile": null, + "poc_count": 18, + "product": "Ancillary Function Driver (afd.sys)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application.", + "summary": "afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a craf...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2462", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", + "percentile": null, + "poc_count": 7, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or c...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-3402", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402", + "percentile": null, + "poc_count": 3, + "product": "Windows", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.", + "summary": "Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-3544", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", + "percentile": null, + "poc_count": 5, + "product": "Java SE JDK and JRE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2011-4723", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723", + "percentile": null, + "poc_count": 1, + "product": "DIR-300 Router", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.", + "summary": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2012-0151", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0151", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.", + "summary": "The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0158", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0158", + "percentile": null, + "poc_count": 29, + "product": "MSCOMCTL.OCX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.", + "summary": "The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Component...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0391", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0391", + "percentile": null, + "poc_count": 6, + "product": "Struts 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.", + "summary": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers...", + "vendor": "Apache" + }, + { + "cve": "CVE-2012-0507", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", + "percentile": null, + "poc_count": 6, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidential...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0518", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0518", + "percentile": null, + "poc_count": 4, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors", + "summary": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a differ...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0754", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-0767", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.", + "summary": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 o...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1535", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.", + "summary": "Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1710", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1710", + "percentile": null, + "poc_count": 3, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.", + "summary": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors rel...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1723", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", + "percentile": null, + "poc_count": 5, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1823", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1823", + "percentile": null, + "poc_count": 71, + "product": "PHP", + "required_action": "Apply updates per vendor instructions.", + "short_description": "sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.", + "summary": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attack...", + "vendor": "PHP" + }, + { + "cve": "CVE-2012-1856", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1856", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.", + "summary": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-1889", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1889", + "percentile": null, + "poc_count": 9, + "product": "XML Core Services", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.", + "summary": "Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-2034", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows for remote code execution or denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-2539", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2539", + "percentile": null, + "poc_count": 1, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word allows attackers to execute remote code or cause a denial-of-service (DoS) via crafted RTF data.", + "summary": "Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-3152", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-3152", + "percentile": null, + "poc_count": 9, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Fusion Middleware Reports Developer contains an unspecified vulnerability that allows remote attackers to affect confidentiality and integrity of affected systems.", + "summary": "Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors rela...", + "vendor": "Oracle" + } + ], + "removed_high_epss": [], + "removed_kev_entries": [] +} \ No newline at end of file diff --git a/docs/api/v1/diff/latest.json b/docs/api/v1/diff/latest.json new file mode 100644 index 0000000000..c1bd999ef8 --- /dev/null +++ b/docs/api/v1/diff/latest.json @@ -0,0 +1,1074 @@ +{ + "epss_movers": [], + "generated": "2025-12-17", + "new_high_epss": [ + { + "cve": "CVE-2025-9316", + "epss": 0.78706, + "percentile": 0.98995, + "poc_count": 0, + "summary": "" + }, + { + "cve": "CVE-2025-8943", + "epss": 0.6583, + "percentile": 0.9843, + "poc_count": 1, + "summary": "The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks ro..." + } + ], + "new_kev_entries": [ + { + "cve": "CVE-2025-9242", + "date_added": "2025-11-12", + "due_date": "2025-12-03", + "epss": 0.7437, + "notes": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 ; https://nvd.nist.gov/vuln/detail/CVE-2025-9242", + "percentile": 0.98786, + "poc_count": 0, + "product": "Firebox", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "WatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.", + "summary": "", + "vendor": "WatchGuard" + }, + { + "cve": "CVE-2025-7775", + "date_added": "2025-08-26", + "due_date": "2025-08-28", + "epss": 0.17354, + "notes": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775", + "percentile": 0.94817, + "poc_count": 15, + "product": "NetScaler", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.", + "summary": "Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) o...", + "vendor": "Citrix" + }, + { + "cve": "CVE-2025-9377", + "date_added": "2025-09-03", + "due_date": "2025-09-24", + "epss": 0.14589, + "notes": "https://www.tp-link.com/us/support/faq/4308/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-9377", + "percentile": 0.94217, + "poc_count": 4, + "product": "Multiple Routers", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/N...", + "vendor": "TP-Link" + }, + { + "cve": "CVE-2025-8876", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.13881, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876", + "percentile": 0.94059, + "poc_count": 6, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains a command injection vulnerability via improper sanitization of user input.", + "summary": "Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8875", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.05085, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8875", + "percentile": 0.89424, + "poc_count": 7, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.", + "summary": "Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8088", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": 0.03156, + "notes": "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088", + "percentile": 0.8647, + "poc_count": 45, + "product": "WinRAR", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.", + "summary": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovere...", + "vendor": "RARLAB" + }, + { + "cve": "CVE-2002-0367", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2002-0367", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.", + "summary": "smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-0210", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2004-0210", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.", + "summary": "The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-1464", + "date_added": "2023-05-19", + "due_date": "2023-06-09", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464", + "percentile": null, + "poc_count": 2, + "product": "IOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.", + "summary": "Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2005-2773", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2005-2773", + "percentile": null, + "poc_count": 1, + "product": "OpenView Network Node Manager", + "required_action": "Apply updates per vendor instructions.", + "short_description": "HP OpenView Network Node Manager could allow a remote attacker to execute arbitrary commands on the system.", + "summary": "HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl...", + "vendor": "Hewlett Packard (HP)" + }, + { + "cve": "CVE-2006-1547", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-1547", + "percentile": null, + "poc_count": 2, + "product": "Struts 1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).", + "summary": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references t...", + "vendor": "Apache" + }, + { + "cve": "CVE-2006-2492", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-2492", + "percentile": null, + "poc_count": 3, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.", + "summary": "Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object po...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-0671", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 ; https://nvd.nist.gov/vuln/detail/CVE-2007-0671", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", + "summary": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonst...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-3010", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-3010", + "percentile": null, + "poc_count": 3, + "product": "OmniPCX Enterprise", + "required_action": "Apply updates per vendor instructions.", + "short_description": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands.", + "summary": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during...", + "vendor": "Alcatel" + }, + { + "cve": "CVE-2007-5659", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", + "percentile": null, + "poc_count": 4, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.", + "summary": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-0655", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.", + "summary": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-2992", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", + "percentile": null, + "poc_count": 7, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.", + "summary": "Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-3431", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-3431", + "percentile": null, + "poc_count": 5, + "product": "VirtualBox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.", + "summary": "The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, whi...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2009-0557", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0557", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.", + "summary": "Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel V...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0563", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0563", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.", + "summary": "Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Mic...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0927", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0927", + "percentile": null, + "poc_count": 4, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat allows remote attackers to execute arbitrary code.", + "summary": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Colla...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-1123", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1123", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application.", + "summary": "The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to ga...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-1151", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1151", + "percentile": null, + "poc_count": 19, + "product": "phpMyAdmin", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file.", + "summary": "Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.", + "vendor": "phpMyAdmin" + }, + { + "cve": "CVE-2009-1862", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader, Flash Player", + "required_action": "For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-2055", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-2055", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR,when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2009-3129", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3129", + "percentile": null, + "poc_count": 2, + "product": "Excel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset.", + "summary": "Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatib...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-3953", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", + "percentile": null, + "poc_count": 1, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.", + "summary": "The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF documen...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-3960", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", + "percentile": null, + "poc_count": 2, + "product": "BlazeDS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe BlazeDS, which is utilized in LifeCycle and Coldfusion, contains a vulnerability that allows for information disclosure.", + "summary": "Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, all...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-4324", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", + "percentile": null, + "poc_count": 6, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.", + "summary": "Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary cod...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0188", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", + "percentile": null, + "poc_count": 3, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in Adobe Reader and Acrobat allows attackers to cause a denial of service or possibly execute arbitrary code.", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0232", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0232", + "percentile": null, + "poc_count": 17, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.", + "summary": "The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when acces...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-0738", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0738", + "percentile": null, + "poc_count": 21, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.", + "summary": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST me...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-0840", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0840", + "percentile": null, + "poc_count": 8, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and av...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2010-1297", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", + "percentile": null, + "poc_count": 5, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to exec...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-1428", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1428", + "percentile": null, + "poc_count": 3, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.", + "summary": "The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-1871", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1871", + "percentile": null, + "poc_count": 17, + "product": "JBoss Seam 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. This vulnerability can only be exploited when the Java Security Manager is not properly configured.", + "summary": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-2568", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568", + "percentile": null, + "poc_count": 22, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.", + "summary": "Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2572", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2572", + "percentile": null, + "poc_count": 1, + "product": "PowerPoint", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.", + "summary": "Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka \"PowerPoint Parsing Buffer Overflow Vulnerability.\"", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2861", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", + "percentile": null, + "poc_count": 64, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A directory traversal vulnerability exists in the administrator console in Adobe ColdFusion which allows remote attackers to read arbitrary files.", + "summary": "Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settin...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-2883", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", + "percentile": null, + "poc_count": 9, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (app...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-3035", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3035", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR, when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix annou...", + "vendor": "Cisco" + }, + { + "cve": "CVE-2010-3333", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3333", + "percentile": null, + "poc_count": 33, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.", + "summary": "Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attack...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-3765", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-73 ; https://nvd.nist.gov/vuln/detail/CVE-2010-3765", + "percentile": null, + "poc_count": 4, + "product": "Multiple Products", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.", + "summary": "Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute ar...", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2010-3904", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904", + "percentile": null, + "poc_count": 125, + "product": "Kernel", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", + "summary": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which a...", + "vendor": "Linux" + }, + { + "cve": "CVE-2010-3962", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2458511?redirectedfrom=MSDN ; https://nvd.nist.gov/vuln/detail/CVE-2010-3962", + "percentile": null, + "poc_count": 3, + "product": "Internet Explorer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-4344", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4344", + "percentile": null, + "poc_count": 9, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.", + "summary": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a lar...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4345", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4345", + "percentile": null, + "poc_count": 4, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.", + "summary": "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstra...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4398", + "date_added": "2022-03-28", + "due_date": "2022-04-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4398", + "percentile": null, + "poc_count": 9, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature.", + "summary": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Wind...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-5326", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5326", + "percentile": null, + "poc_count": 1, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms Invoker Servlet does not require authentication, allowing for remote code execution via a HTTP or HTTPS request.", + "summary": "The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as ex...", + "vendor": "SAP" + }, + { + "cve": "CVE-2010-5330", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5330", + "percentile": null, + "poc_count": 2, + "product": "AirOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi.", + "summary": "On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4....", + "vendor": "Ubiquiti" + }, + { + "cve": "CVE-2011-0609", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0609", + "percentile": null, + "poc_count": 4, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bund...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-0611", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.", + "summary": "Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-1823", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823", + "percentile": null, + "poc_count": 3, + "product": "Android OS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.", + "summary": "The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative...", + "vendor": "Android" + }, + { + "cve": "CVE-2011-1889", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-1889", + "percentile": null, + "poc_count": 1, + "product": "Forefront Threat Management Gateway (TMG)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.", + "summary": "The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka \"TMG Firewa...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2005", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2005", + "percentile": null, + "poc_count": 18, + "product": "Ancillary Function Driver (afd.sys)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application.", + "summary": "afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a craf...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2462", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", + "percentile": null, + "poc_count": 7, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or c...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-3402", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402", + "percentile": null, + "poc_count": 3, + "product": "Windows", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.", + "summary": "Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-3544", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", + "percentile": null, + "poc_count": 5, + "product": "Java SE JDK and JRE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2011-4723", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723", + "percentile": null, + "poc_count": 1, + "product": "DIR-300 Router", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.", + "summary": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2012-0151", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0151", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.", + "summary": "The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0158", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0158", + "percentile": null, + "poc_count": 29, + "product": "MSCOMCTL.OCX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.", + "summary": "The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Component...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0391", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0391", + "percentile": null, + "poc_count": 6, + "product": "Struts 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.", + "summary": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers...", + "vendor": "Apache" + }, + { + "cve": "CVE-2012-0507", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", + "percentile": null, + "poc_count": 6, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidential...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0518", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0518", + "percentile": null, + "poc_count": 4, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors", + "summary": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a differ...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0754", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-0767", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.", + "summary": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 o...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1535", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.", + "summary": "Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1710", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1710", + "percentile": null, + "poc_count": 3, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.", + "summary": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors rel...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1723", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", + "percentile": null, + "poc_count": 5, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1823", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1823", + "percentile": null, + "poc_count": 71, + "product": "PHP", + "required_action": "Apply updates per vendor instructions.", + "short_description": "sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.", + "summary": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attack...", + "vendor": "PHP" + }, + { + "cve": "CVE-2012-1856", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1856", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.", + "summary": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-1889", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1889", + "percentile": null, + "poc_count": 9, + "product": "XML Core Services", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.", + "summary": "Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-2034", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows for remote code execution or denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-2539", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2539", + "percentile": null, + "poc_count": 1, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word allows attackers to execute remote code or cause a denial-of-service (DoS) via crafted RTF data.", + "summary": "Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-3152", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-3152", + "percentile": null, + "poc_count": 9, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Fusion Middleware Reports Developer contains an unspecified vulnerability that allows remote attackers to affect confidentiality and integrity of affected systems.", + "summary": "Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors rela...", + "vendor": "Oracle" + } + ], + "removed_high_epss": [], + "removed_kev_entries": [] +} \ No newline at end of file diff --git a/docs/api/v1/epss_top.json b/docs/api/v1/epss_top.json new file mode 100644 index 0000000000..f39bbc2b94 --- /dev/null +++ b/docs/api/v1/epss_top.json @@ -0,0 +1,19 @@ +{ + "generated": "2025-12-17", + "items": [ + { + "cve": "CVE-2025-9316", + "epss": 0.78706, + "percentile": 0.98995, + "poc_count": 0, + "summary": "" + }, + { + "cve": "CVE-2025-8943", + "epss": 0.6583, + "percentile": 0.9843, + "poc_count": 1, + "summary": "The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks ro..." + } + ] +} \ No newline at end of file diff --git a/docs/api/v1/joined_top.json b/docs/api/v1/joined_top.json new file mode 100644 index 0000000000..a9322f62d1 --- /dev/null +++ b/docs/api/v1/joined_top.json @@ -0,0 +1,1071 @@ +{ + "generated": "2025-12-17", + "high_epss": [ + { + "cve": "CVE-2025-9316", + "epss": 0.78706, + "percentile": 0.98995, + "poc_count": 0, + "summary": "" + }, + { + "cve": "CVE-2025-8943", + "epss": 0.6583, + "percentile": 0.9843, + "poc_count": 1, + "summary": "The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks ro..." + } + ], + "kev_top": [ + { + "cve": "CVE-2025-9242", + "date_added": "2025-11-12", + "due_date": "2025-12-03", + "epss": 0.7437, + "notes": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 ; https://nvd.nist.gov/vuln/detail/CVE-2025-9242", + "percentile": 0.98786, + "poc_count": 0, + "product": "Firebox", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "WatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.", + "summary": "", + "vendor": "WatchGuard" + }, + { + "cve": "CVE-2025-7775", + "date_added": "2025-08-26", + "due_date": "2025-08-28", + "epss": 0.17354, + "notes": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775", + "percentile": 0.94817, + "poc_count": 15, + "product": "NetScaler", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.", + "summary": "Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) o...", + "vendor": "Citrix" + }, + { + "cve": "CVE-2025-9377", + "date_added": "2025-09-03", + "due_date": "2025-09-24", + "epss": 0.14589, + "notes": "https://www.tp-link.com/us/support/faq/4308/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-9377", + "percentile": 0.94217, + "poc_count": 4, + "product": "Multiple Routers", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/N...", + "vendor": "TP-Link" + }, + { + "cve": "CVE-2025-8876", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.13881, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876", + "percentile": 0.94059, + "poc_count": 6, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains a command injection vulnerability via improper sanitization of user input.", + "summary": "Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8875", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.05085, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8875", + "percentile": 0.89424, + "poc_count": 7, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.", + "summary": "Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8088", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": 0.03156, + "notes": "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088", + "percentile": 0.8647, + "poc_count": 45, + "product": "WinRAR", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.", + "summary": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovere...", + "vendor": "RARLAB" + }, + { + "cve": "CVE-2002-0367", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2002-0367", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.", + "summary": "smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-0210", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2004-0210", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.", + "summary": "The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-1464", + "date_added": "2023-05-19", + "due_date": "2023-06-09", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464", + "percentile": null, + "poc_count": 2, + "product": "IOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.", + "summary": "Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2005-2773", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2005-2773", + "percentile": null, + "poc_count": 1, + "product": "OpenView Network Node Manager", + "required_action": "Apply updates per vendor instructions.", + "short_description": "HP OpenView Network Node Manager could allow a remote attacker to execute arbitrary commands on the system.", + "summary": "HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl...", + "vendor": "Hewlett Packard (HP)" + }, + { + "cve": "CVE-2006-1547", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-1547", + "percentile": null, + "poc_count": 2, + "product": "Struts 1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).", + "summary": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references t...", + "vendor": "Apache" + }, + { + "cve": "CVE-2006-2492", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-2492", + "percentile": null, + "poc_count": 3, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.", + "summary": "Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object po...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-0671", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 ; https://nvd.nist.gov/vuln/detail/CVE-2007-0671", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", + "summary": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonst...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-3010", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-3010", + "percentile": null, + "poc_count": 3, + "product": "OmniPCX Enterprise", + "required_action": "Apply updates per vendor instructions.", + "short_description": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands.", + "summary": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during...", + "vendor": "Alcatel" + }, + { + "cve": "CVE-2007-5659", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", + "percentile": null, + "poc_count": 4, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.", + "summary": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-0655", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.", + "summary": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-2992", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", + "percentile": null, + "poc_count": 7, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.", + "summary": "Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-3431", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-3431", + "percentile": null, + "poc_count": 5, + "product": "VirtualBox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.", + "summary": "The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, whi...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2009-0557", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0557", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.", + "summary": "Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel V...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0563", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0563", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.", + "summary": "Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Mic...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0927", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0927", + "percentile": null, + "poc_count": 4, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat allows remote attackers to execute arbitrary code.", + "summary": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Colla...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-1123", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1123", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application.", + "summary": "The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to ga...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-1151", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1151", + "percentile": null, + "poc_count": 19, + "product": "phpMyAdmin", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file.", + "summary": "Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.", + "vendor": "phpMyAdmin" + }, + { + "cve": "CVE-2009-1862", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader, Flash Player", + "required_action": "For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-2055", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-2055", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR,when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2009-3129", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3129", + "percentile": null, + "poc_count": 2, + "product": "Excel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset.", + "summary": "Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatib...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-3953", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", + "percentile": null, + "poc_count": 1, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.", + "summary": "The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF documen...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-3960", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", + "percentile": null, + "poc_count": 2, + "product": "BlazeDS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe BlazeDS, which is utilized in LifeCycle and Coldfusion, contains a vulnerability that allows for information disclosure.", + "summary": "Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, all...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-4324", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", + "percentile": null, + "poc_count": 6, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.", + "summary": "Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary cod...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0188", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", + "percentile": null, + "poc_count": 3, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in Adobe Reader and Acrobat allows attackers to cause a denial of service or possibly execute arbitrary code.", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0232", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0232", + "percentile": null, + "poc_count": 17, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.", + "summary": "The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when acces...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-0738", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0738", + "percentile": null, + "poc_count": 21, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.", + "summary": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST me...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-0840", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0840", + "percentile": null, + "poc_count": 8, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and av...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2010-1297", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", + "percentile": null, + "poc_count": 5, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to exec...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-1428", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1428", + "percentile": null, + "poc_count": 3, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.", + "summary": "The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-1871", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1871", + "percentile": null, + "poc_count": 17, + "product": "JBoss Seam 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. This vulnerability can only be exploited when the Java Security Manager is not properly configured.", + "summary": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-2568", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568", + "percentile": null, + "poc_count": 22, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.", + "summary": "Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2572", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2572", + "percentile": null, + "poc_count": 1, + "product": "PowerPoint", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.", + "summary": "Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka \"PowerPoint Parsing Buffer Overflow Vulnerability.\"", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2861", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", + "percentile": null, + "poc_count": 64, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A directory traversal vulnerability exists in the administrator console in Adobe ColdFusion which allows remote attackers to read arbitrary files.", + "summary": "Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settin...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-2883", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", + "percentile": null, + "poc_count": 9, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (app...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-3035", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3035", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR, when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix annou...", + "vendor": "Cisco" + }, + { + "cve": "CVE-2010-3333", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3333", + "percentile": null, + "poc_count": 33, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.", + "summary": "Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attack...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-3765", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-73 ; https://nvd.nist.gov/vuln/detail/CVE-2010-3765", + "percentile": null, + "poc_count": 4, + "product": "Multiple Products", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.", + "summary": "Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute ar...", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2010-3904", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904", + "percentile": null, + "poc_count": 125, + "product": "Kernel", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", + "summary": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which a...", + "vendor": "Linux" + }, + { + "cve": "CVE-2010-3962", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2458511?redirectedfrom=MSDN ; https://nvd.nist.gov/vuln/detail/CVE-2010-3962", + "percentile": null, + "poc_count": 3, + "product": "Internet Explorer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-4344", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4344", + "percentile": null, + "poc_count": 9, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.", + "summary": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a lar...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4345", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4345", + "percentile": null, + "poc_count": 4, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.", + "summary": "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstra...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4398", + "date_added": "2022-03-28", + "due_date": "2022-04-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4398", + "percentile": null, + "poc_count": 9, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature.", + "summary": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Wind...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-5326", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5326", + "percentile": null, + "poc_count": 1, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms Invoker Servlet does not require authentication, allowing for remote code execution via a HTTP or HTTPS request.", + "summary": "The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as ex...", + "vendor": "SAP" + }, + { + "cve": "CVE-2010-5330", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5330", + "percentile": null, + "poc_count": 2, + "product": "AirOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi.", + "summary": "On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4....", + "vendor": "Ubiquiti" + }, + { + "cve": "CVE-2011-0609", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0609", + "percentile": null, + "poc_count": 4, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bund...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-0611", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.", + "summary": "Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-1823", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823", + "percentile": null, + "poc_count": 3, + "product": "Android OS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.", + "summary": "The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative...", + "vendor": "Android" + }, + { + "cve": "CVE-2011-1889", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-1889", + "percentile": null, + "poc_count": 1, + "product": "Forefront Threat Management Gateway (TMG)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.", + "summary": "The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka \"TMG Firewa...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2005", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2005", + "percentile": null, + "poc_count": 18, + "product": "Ancillary Function Driver (afd.sys)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application.", + "summary": "afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a craf...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2462", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", + "percentile": null, + "poc_count": 7, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or c...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-3402", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402", + "percentile": null, + "poc_count": 3, + "product": "Windows", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.", + "summary": "Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-3544", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", + "percentile": null, + "poc_count": 5, + "product": "Java SE JDK and JRE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2011-4723", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723", + "percentile": null, + "poc_count": 1, + "product": "DIR-300 Router", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.", + "summary": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2012-0151", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0151", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.", + "summary": "The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0158", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0158", + "percentile": null, + "poc_count": 29, + "product": "MSCOMCTL.OCX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.", + "summary": "The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Component...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0391", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0391", + "percentile": null, + "poc_count": 6, + "product": "Struts 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.", + "summary": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers...", + "vendor": "Apache" + }, + { + "cve": "CVE-2012-0507", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", + "percentile": null, + "poc_count": 6, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidential...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0518", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0518", + "percentile": null, + "poc_count": 4, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors", + "summary": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a differ...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0754", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-0767", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.", + "summary": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 o...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1535", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.", + "summary": "Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1710", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1710", + "percentile": null, + "poc_count": 3, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.", + "summary": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors rel...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1723", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", + "percentile": null, + "poc_count": 5, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1823", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1823", + "percentile": null, + "poc_count": 71, + "product": "PHP", + "required_action": "Apply updates per vendor instructions.", + "short_description": "sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.", + "summary": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attack...", + "vendor": "PHP" + }, + { + "cve": "CVE-2012-1856", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1856", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.", + "summary": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-1889", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1889", + "percentile": null, + "poc_count": 9, + "product": "XML Core Services", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.", + "summary": "Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-2034", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows for remote code execution or denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-2539", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2539", + "percentile": null, + "poc_count": 1, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word allows attackers to execute remote code or cause a denial-of-service (DoS) via crafted RTF data.", + "summary": "Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-3152", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-3152", + "percentile": null, + "poc_count": 9, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Fusion Middleware Reports Developer contains an unspecified vulnerability that allows remote attackers to affect confidentiality and integrity of affected systems.", + "summary": "Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors rela...", + "vendor": "Oracle" + } + ] +} \ No newline at end of file diff --git a/docs/api/v1/kev.json b/docs/api/v1/kev.json new file mode 100644 index 0000000000..18fa506266 --- /dev/null +++ b/docs/api/v1/kev.json @@ -0,0 +1,19294 @@ +{ + "generated": "2025-12-17", + "items": [ + { + "cve": "CVE-2025-9242", + "date_added": "2025-11-12", + "due_date": "2025-12-03", + "epss": 0.7437, + "notes": "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 ; https://nvd.nist.gov/vuln/detail/CVE-2025-9242", + "percentile": 0.98786, + "poc_count": 0, + "product": "Firebox", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "WatchGuard Firebox contains an out-of-bounds write vulnerability in the OS iked process that may allow a remote unauthenticated attacker to execute arbitrary code.", + "summary": "", + "vendor": "WatchGuard" + }, + { + "cve": "CVE-2025-7775", + "date_added": "2025-08-26", + "due_date": "2025-08-28", + "epss": 0.17354, + "notes": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938 ; https://nvd.nist.gov/vuln/detail/CVE-2025-7775", + "percentile": 0.94817, + "poc_count": 15, + "product": "NetScaler", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Citrix NetScaler ADC and NetScaler Gateway contain a memory overflow vulnerability that could allow for remote code execution and/or denial of service.", + "summary": "Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) o...", + "vendor": "Citrix" + }, + { + "cve": "CVE-2025-9377", + "date_added": "2025-09-03", + "due_date": "2025-09-24", + "epss": 0.14589, + "notes": "https://www.tp-link.com/us/support/faq/4308/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-9377", + "percentile": 0.94217, + "poc_count": 4, + "product": "Multiple Routers", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/N...", + "vendor": "TP-Link" + }, + { + "cve": "CVE-2025-8876", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.13881, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8876", + "percentile": 0.94059, + "poc_count": 6, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains a command injection vulnerability via improper sanitization of user input.", + "summary": "Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8875", + "date_added": "2025-08-13", + "due_date": "2025-08-20", + "epss": 0.05085, + "notes": "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-8875", + "percentile": 0.89424, + "poc_count": 7, + "product": "N-Central", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "N-able N-Central contains an insecure deserialization vulnerability that could lead to command execution.", + "summary": "Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1.", + "vendor": "N-able" + }, + { + "cve": "CVE-2025-8088", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": 0.03156, + "notes": "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5 ; https://nvd.nist.gov/vuln/detail/CVE-2025-8088", + "percentile": 0.8647, + "poc_count": 45, + "product": "WinRAR", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.", + "summary": "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovere...", + "vendor": "RARLAB" + }, + { + "cve": "CVE-2002-0367", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2002-0367", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "smss.exe debugging subsystem in Microsoft Windows does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges.", + "summary": "smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-0210", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2004-0210", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system.", + "summary": "The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2004-1464", + "date_added": "2023-05-19", + "due_date": "2023-06-09", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040827-telnet; https://nvd.nist.gov/vuln/detail/CVE-2004-1464", + "percentile": null, + "poc_count": 2, + "product": "IOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS contains an unspecified vulnerability that may block further telnet, reverse telnet, Remote Shell (RSH), Secure Shell (SSH), and in some cases, Hypertext Transport Protocol (HTTP) access to the Cisco device.", + "summary": "Cisco IOS 12.2(15) and earlier allows remote attackers to cause a denial of service (refused VTY (virtual terminal) connections), via a crafted TCP connection to the Telnet or reverse Telnet port.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2005-2773", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2005-2773", + "percentile": null, + "poc_count": 1, + "product": "OpenView Network Node Manager", + "required_action": "Apply updates per vendor instructions.", + "short_description": "HP OpenView Network Node Manager could allow a remote attacker to execute arbitrary commands on the system.", + "summary": "HP OpenView Network Node Manager 6.2 through 7.50 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) node parameter to connectedNodes.ovpl, (2) cdpView.ovpl, (3) freeIPaddrs.ovpl...", + "vendor": "Hewlett Packard (HP)" + }, + { + "cve": "CVE-2006-1547", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-1547", + "percentile": null, + "poc_count": 2, + "product": "Struts 1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS).", + "summary": "ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references t...", + "vendor": "Apache" + }, + { + "cve": "CVE-2006-2492", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2006-2492", + "percentile": null, + "poc_count": 3, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word and Microsoft Works Suites contain a malformed object pointer which allows attackers to execute code.", + "summary": "Buffer overflow in Microsoft Word in Office 2000 SP3, Office XP SP3, Office 2003 Sp1 and SP2, and Microsoft Works Suites through 2006, allows user-assisted attackers to execute arbitrary code via a malformed object po...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-0671", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 ; https://nvd.nist.gov/vuln/detail/CVE-2007-0671", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Office Excel contains a remote code execution vulnerability that can be exploited when a specially crafted Excel file is opened. This malicious file could be delivered as an email attachment or hosted on a malicious website. An attacker could leverage this vulnerability by creating a specially crafted Excel file, which, when opened, allowing an attacker to execute remote code on the affected system.", + "summary": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonst...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2007-3010", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-3010", + "percentile": null, + "poc_count": 3, + "product": "OmniPCX Enterprise", + "required_action": "Apply updates per vendor instructions.", + "short_description": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands.", + "summary": "masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during...", + "vendor": "Alcatel" + }, + { + "cve": "CVE-2007-5659", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", + "percentile": null, + "poc_count": 4, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a buffer overflow vulnerability that allows remote attackers to execute code via a PDF file with long arguments to unspecified JavaScript methods.", + "summary": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-0655", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an unespecified vulnerability described as a design flaw which could allow a specially crafted file to be printed silently an arbitrary number of times.", + "summary": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-2992", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", + "percentile": null, + "poc_count": 7, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.", + "summary": "Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2008-3431", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2008-3431", + "percentile": null, + "poc_count": 5, + "product": "VirtualBox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An input validation vulnerability exists in the VBoxDrv.sys driver of Sun xVM VirtualBox which allows attackers to locally execute arbitrary code.", + "summary": "The VBoxDrvNtDeviceControl function in VBoxDrv.sys in Sun xVM VirtualBox before 1.6.4 uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, whi...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2009-0557", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0557", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains an object record corruption vulnerability that allows remote attackers to execute code via a crafted Excel file with a malformed record object.", + "summary": "Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel V...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0563", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0563", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via a Word document with a crafted tag containing an invalid length field.", + "summary": "Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Mic...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-0927", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-0927", + "percentile": null, + "poc_count": 4, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat allows remote attackers to execute arbitrary code.", + "summary": "Stack-based buffer overflow in Adobe Reader and Adobe Acrobat 9 before 9.1, 8 before 8.1.3 , and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a crafted argument to the getIcon method of a Colla...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-1123", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1123", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application.", + "summary": "The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to ga...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-1151", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1151", + "percentile": null, + "poc_count": 19, + "product": "phpMyAdmin", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Setup script used to generate configuration can be fooled using a crafted POST request to include arbitrary PHP code in generated configuration file.", + "summary": "Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file via the save action.", + "vendor": "phpMyAdmin" + }, + { + "cve": "CVE-2009-1862", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", + "percentile": null, + "poc_count": 3, + "product": "Acrobat and Reader, Flash Player", + "required_action": "For Adobe Acrobat and Reader, apply updates per vendor instructions. For Adobe Flash Player, the impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Acrobat and Reader and Adobe Flash Player allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 9.x through 9.1.2, and Adobe Flash Player 9.x through 9.0.159.0 and 10.x through 10.0.22.87, allows remote attackers to execute arbitrary code or cause a denial of...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-2055", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-2055", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR,when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2009-3129", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3129", + "percentile": null, + "poc_count": 2, + "product": "Excel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Excel allows remote attackers to execute arbitrary code via a spreadsheet with a FEATHEADER record containing an invalid cbHdrData size element that affects a pointer offset.", + "summary": "Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer 2003 SP3; Office Excel Viewer SP1 and SP2; and Office Compatib...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2009-3953", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", + "percentile": null, + "poc_count": 1, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contains an array boundary issue in Universal 3D (U3D) support that could lead to remote code execution.", + "summary": "The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Windows and Mac OS X, and 7.x before 7.1.4 allows remote attackers to execute arbitrary code via malformed U3D data in a PDF documen...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-3960", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", + "percentile": null, + "poc_count": 2, + "product": "BlazeDS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe BlazeDS, which is utilized in LifeCycle and Coldfusion, contains a vulnerability that allows for information disclosure.", + "summary": "Unspecified vulnerability in BlazeDS 3.2 and earlier, as used in LiveCycle 8.0.1, 8.2.1, and 9.0, LiveCycle Data Services 2.5.1, 2.6.1, and 3.0, Flex Data Services 2.0.1, and ColdFusion 7.0.2, 8.0, 8.0.1, and 9.0, all...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2009-4324", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", + "percentile": null, + "poc_count": 6, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Adobe Acrobat and Reader allows remote attackers to execute code via a crafted PDF file.", + "summary": "Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary cod...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0188", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", + "percentile": null, + "poc_count": 3, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in Adobe Reader and Acrobat allows attackers to cause a denial of service or possibly execute arbitrary code.", + "summary": "Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.1 and 9.x before 9.3.1 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-0232", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0232", + "percentile": null, + "poc_count": 17, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges.", + "summary": "The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when acces...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-0738", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0738", + "percentile": null, + "poc_count": 21, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method.", + "summary": "The JMX-Console web application in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST me...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-0840", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-0840", + "percentile": null, + "poc_count": 8, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Java SE component allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and av...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2010-1297", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", + "percentile": null, + "poc_count": 5, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to exec...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-1428", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1428", + "percentile": null, + "poc_count": 3, + "product": "JBoss", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unauthenticated access to the JBoss Application Server Web Console (/web-console) is blocked by default. However, it was found that this block was incomplete, and only blocked GET and POST HTTP verbs. A remote attacker could use this flaw to gain access to sensitive information.", + "summary": "The Web Console (aka web-console) in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP09 and 4.3 before 4.3.0.CP08 performs access control only for the GET and POST...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-1871", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-1871", + "percentile": null, + "poc_count": 17, + "product": "JBoss Seam 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. This vulnerability can only be exploited when the Java Security Manager is not properly configured.", + "summary": "JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to...", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2010-2568", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046; https://nvd.nist.gov/vuln/detail/CVE-2010-2568", + "percentile": null, + "poc_count": 22, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the operating system displays the icon of a malicious shortcut file. An attacker who successfully exploited this vulnerability could execute code as the logged-on user.", + "summary": "Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2572", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2572", + "percentile": null, + "poc_count": 1, + "product": "PowerPoint", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft PowerPoint contains a buffer overflow vulnerability that alllows for remote code execution.", + "summary": "Buffer overflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a crafted PowerPoint 95 document, aka \"PowerPoint Parsing Buffer Overflow Vulnerability.\"", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-2861", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", + "percentile": null, + "poc_count": 64, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A directory traversal vulnerability exists in the administrator console in Adobe ColdFusion which allows remote attackers to read arbitrary files.", + "summary": "Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settin...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-2883", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", + "percentile": null, + "poc_count": 9, + "product": "Acrobat and Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Acrobat and Reader contain a stack-based buffer overflow vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (app...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2010-3035", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3035", + "percentile": null, + "poc_count": 2, + "product": "IOS XR", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS XR, when BGP is the configured routing feature, allows remote attackers to cause a denial-of-service (DoS).", + "summary": "Cisco IOS XR 3.4.0 through 3.9.1, when BGP is enabled, does not properly handle unrecognized transitive attributes, which allows remote attackers to cause a denial of service (peering reset) via a crafted prefix annou...", + "vendor": "Cisco" + }, + { + "cve": "CVE-2010-3333", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-3333", + "percentile": null, + "poc_count": 33, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A stack-based buffer overflow vulnerability exists in the parsing of RTF data in Microsoft Office and earlier allows an attacker to perform remote code execution.", + "summary": "Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attack...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-3765", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-73 ; https://nvd.nist.gov/vuln/detail/CVE-2010-3765", + "percentile": null, + "poc_count": 4, + "product": "Multiple Products", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Mozilla Firefox, SeaMonkey, and Thunderbird contain an unspecified vulnerability when JavaScript is enabled. This allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption.", + "summary": "Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute ar...", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2010-3904", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://lkml.iu.edu/hypermail/linux/kernel/1601.3/06474.html; https://nvd.nist.gov/vuln/detail/CVE-2010-3904", + "percentile": null, + "poc_count": 125, + "product": "Kernel", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Linux Kernel contains an improper input validation vulnerability in the Reliable Datagram Sockets (RDS) protocol implementation that allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", + "summary": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which a...", + "vendor": "Linux" + }, + { + "cve": "CVE-2010-3962", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/2458511?redirectedfrom=MSDN ; https://nvd.nist.gov/vuln/detail/CVE-2010-3962", + "percentile": null, + "poc_count": 3, + "product": "Internet Explorer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Internet Explorer contains an uninitialized memory corruption vulnerability that could allow for remote code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "summary": "Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-4344", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4344", + "percentile": null, + "poc_count": 9, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session.", + "summary": "Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a lar...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4345", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4345", + "percentile": null, + "poc_count": 4, + "product": "Exim", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Exim allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands.", + "summary": "Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstra...", + "vendor": "Exim" + }, + { + "cve": "CVE-2010-4398", + "date_added": "2022-03-28", + "due_date": "2022-04-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-4398", + "percentile": null, + "poc_count": 9, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature.", + "summary": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Wind...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2010-5326", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5326", + "percentile": null, + "poc_count": 1, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms Invoker Servlet does not require authentication, allowing for remote code execution via a HTTP or HTTPS request.", + "summary": "The Invoker Servlet on SAP NetWeaver Application Server Java platforms, possibly before 7.3, does not require authentication, which allows remote attackers to execute arbitrary code via an HTTP or HTTPS request, as ex...", + "vendor": "SAP" + }, + { + "cve": "CVE-2010-5330", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2010-5330", + "percentile": null, + "poc_count": 2, + "product": "AirOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi.", + "summary": "On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4....", + "vendor": "Ubiquiti" + }, + { + "cve": "CVE-2011-0609", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0609", + "percentile": null, + "poc_count": 4, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains an unspecified vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bund...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-0611", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.", + "summary": "Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-1823", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://android.googlesource.com/platform/system/vold/+/c51920c82463b240e2be0430849837d6fdc5352e; https://nvd.nist.gov/vuln/detail/CVE-2011-1823", + "percentile": null, + "poc_count": 3, + "product": "Android OS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.", + "summary": "The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative...", + "vendor": "Android" + }, + { + "cve": "CVE-2011-1889", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-1889", + "percentile": null, + "poc_count": 1, + "product": "Forefront Threat Management Gateway (TMG)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application.", + "summary": "The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka \"TMG Firewa...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2005", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2005", + "percentile": null, + "poc_count": 18, + "product": "Ancillary Function Driver (afd.sys)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application.", + "summary": "afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a craf...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-2462", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", + "percentile": null, + "poc_count": 7, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Universal 3D (U3D) component in Adobe Reader and Acrobat contains a memory corruption vulnerability which could allow remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or c...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2011-3402", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-087 ; https://nvd.nist.gov/vuln/detail/CVE-2011-3402", + "percentile": null, + "poc_count": 3, + "product": "Windows", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Windows Kernel contains an unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers that allows remote attackers to execute arbitrary code via crafted font data in a Word document or web page.", + "summary": "Unspecified vulnerability in the TrueType font parsing engine in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2011-3544", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", + "percentile": null, + "poc_count": 5, + "product": "Java SE JDK and JRE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An access control vulnerability exists in the Applet Rhino Script Engine component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2011-4723", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://www.dlink.com/uk/en/support/product/dir-300-wireless-g-router; https://nvd.nist.gov/vuln/detail/CVE-2011-4723", + "percentile": null, + "poc_count": 1, + "product": "DIR-300 Router", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information.", + "summary": "The D-Link DIR-300 router stores cleartext passwords, which allows context-dependent attackers to obtain sensitive information via unspecified vectors.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2012-0151", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0151", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code.", + "summary": "The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0158", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0158", + "percentile": null, + "poc_count": 29, + "product": "MSCOMCTL.OCX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft MSCOMCTL.OCX contains an unspecified vulnerability that allows for remote code execution, allowing an attacker to take complete control of an affected system under the context of the current user.", + "summary": "The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Component...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-0391", + "date_added": "2022-01-21", + "due_date": "2022-07-21", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0391", + "percentile": null, + "poc_count": 6, + "product": "Struts 2", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The ExceptionDelegator component in Apache Struts 2 before 2.2.3.1 contains an improper input validation vulnerability that allows for remote code execution.", + "summary": "The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers...", + "vendor": "Apache" + }, + { + "cve": "CVE-2012-0507", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", + "percentile": null, + "poc_count": 6, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An incorrect type vulnerability exists in the Concurrency component of Oracle's Java Runtime Environment allows an attacker to remotely execute arbitrary code.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidential...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0518", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0518", + "percentile": null, + "poc_count": 4, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware allows remote attackers to affect integrity via Unknown vectors", + "summary": "Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a differ...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-0754", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute ar...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-0767", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a XSS vulnerability that allows remote attackers to inject web script or HTML.", + "summary": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 o...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1535", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute arbitrary code or cause a denial of service via crafted SWF content.", + "summary": "Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and before 11.2.202.238 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (application...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-1710", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1710", + "percentile": null, + "poc_count": 3, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.", + "summary": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors rel...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1723", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", + "percentile": null, + "poc_count": 5, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Hotspot.", + "summary": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-1823", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1823", + "percentile": null, + "poc_count": 71, + "product": "PHP", + "required_action": "Apply updates per vendor instructions.", + "short_description": "sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.", + "summary": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attack...", + "vendor": "PHP" + }, + { + "cve": "CVE-2012-1856", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1856", + "percentile": null, + "poc_count": 5, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption.", + "summary": "The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-1889", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-1889", + "percentile": null, + "poc_count": 9, + "product": "XML Core Services", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft XML Core Services contains a memory corruption vulnerability which could allow for remote code execution.", + "summary": "Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 accesses uninitialized memory locations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-2034", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a memory corruption vulnerability that allows for remote code execution or denial-of-service (DoS).", + "summary": "Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on...", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-2539", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-2539", + "percentile": null, + "poc_count": 1, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word allows attackers to execute remote code or cause a denial-of-service (DoS) via crafted RTF data.", + "summary": "Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (...", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-3152", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-3152", + "percentile": null, + "poc_count": 9, + "product": "Fusion Middleware", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Fusion Middleware Reports Developer contains an unspecified vulnerability that allows remote attackers to affect confidentiality and integrity of affected systems.", + "summary": "Unspecified vulnerability in the Oracle Reports Developer component in Oracle Fusion Middleware 11.1.1.4, 11.1.1.6, and 11.1.2.0 allows remote attackers to affect confidentiality and integrity via unknown vectors rela...", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-4681", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-4681", + "percentile": null, + "poc_count": 12, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2012-4792", + "date_added": "2024-07-23", + "due_date": "2024-08-13", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/lifecycle/products/internet-explorer-11; https://nvd.nist.gov/vuln/detail/CVE-2012-4792", + "percentile": null, + "poc_count": 5, + "product": "Internet Explorer", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Microsoft Internet Explorer contains a use-after-free vulnerability that allows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-4969", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-4969", + "percentile": null, + "poc_count": 2, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains a use-after-free vulnerability that allows remote attackers to execute code via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2012-5054", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-5054", + "percentile": null, + "poc_count": 2, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains an integer overflow vulnerability that allows remote attackers to execute code via malformed arguments.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2012-5076", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2012-5076", + "percentile": null, + "poc_count": 3, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The default Java security properties configuration did not restrict access to the com.sun.org.glassfish.external and com.sun.org.glassfish.gmbal packages. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2013-0074", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0074", + "percentile": null, + "poc_count": 6, + "product": "Silverlight", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Microsoft Silverlight does not properly validate pointers during HTML object rendering, which allows remote attackers to execute code via a crafted Silverlight application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-0422", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0422", + "percentile": null, + "poc_count": 44, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2013-0431", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0431", + "percentile": null, + "poc_count": 13, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle allows remote attackers to bypass the Java security sandbox.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2013-0625", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0625", + "percentile": null, + "poc_count": 1, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Coldfusion contains an authentication bypass vulnerability, which could result in an unauthorized user gaining administrative access.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0629", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0629", + "percentile": null, + "poc_count": 1, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Coldfusion contains a directory traversal vulnerability, which could permit an unauthorized user access to restricted directories.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0631", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0631", + "percentile": null, + "poc_count": 1, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Coldfusion contains an unspecified vulnerability, which could result in information disclosure from a compromised server.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0632", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0632", + "percentile": null, + "poc_count": 4, + "product": "ColdFusion", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An authentication bypass vulnerability exists in Adobe ColdFusion which could result in an unauthorized user gaining administrative access.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0640", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0640", + "percentile": null, + "poc_count": 4, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An memory corruption vulnerability exists in the acroform.dll in Adobe Reader that allows an attacker to perform remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0641", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-0641", + "percentile": null, + "poc_count": 4, + "product": "Reader", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A buffer overflow vulnerability exists in Adobe Reader which allows an attacker to perform remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0643", + "date_added": "2024-09-17", + "due_date": "2024-10-08", + "epss": null, + "notes": "https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0643", + "percentile": null, + "poc_count": 0, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.", + "short_description": "Adobe Flash Player contains an incorrect default permissions vulnerability in the Firefox sandbox that allows a remote attacker to execute arbitrary code via crafted SWF content.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-0648", + "date_added": "2024-09-17", + "due_date": "2024-10-08", + "epss": null, + "notes": "https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2013-0648", + "percentile": null, + "poc_count": 0, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.", + "short_description": "Adobe Flash Player contains an unspecified vulnerability in the ExternalInterface ActionScript functionality that allows a remote attacker to execute arbitrary code via crafted SWF content.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-1331", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-1331", + "percentile": null, + "poc_count": 1, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a buffer overflow vulnerability that allows remote attackers to execute code via crafted PNG data in an Office document.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-1347", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-1347", + "percentile": null, + "poc_count": 4, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "This vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-1675", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-1675", + "percentile": null, + "poc_count": 1, + "product": "Firefox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Mozilla Firefox does not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2013-1690", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-1690", + "percentile": null, + "poc_count": 8, + "product": "Firefox and Thunderbird", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Mozilla Firefox and Thunderbird do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial-of-service (DoS) or possibly execute malicious code via a crafted web site.", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2013-2094", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8176cced706b5e5d15887584150764894e94e02f; https://nvd.nist.gov/vuln/detail/CVE-2013-2094", + "percentile": null, + "poc_count": 100, + "product": "Kernel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Linux kernel fails to check all 64 bits of attr.config passed by user space, resulting to out-of-bounds access of the perf_swevent_enabled array in sw_perf_event_destroy(). Explotation allows for privilege escalation.", + "vendor": "Linux" + }, + { + "cve": "CVE-2013-2251", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-2251", + "percentile": null, + "poc_count": 73, + "product": "Struts", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Apache Struts allows remote attackers to execute arbitrary Object-Graph Navigation Language (OGNL) expressions.", + "vendor": "Apache" + }, + { + "cve": "CVE-2013-2423", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-2423", + "percentile": null, + "poc_count": 4, + "product": "Java Runtime Environment (JRE)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in hotspot for Java Runtime Environment (JRE) allows remote attackers to affect integrity.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2013-2465", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465", + "percentile": null, + "poc_count": 6, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to 2D", + "vendor": "Oracle" + }, + { + "cve": "CVE-2013-2551", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-2551", + "percentile": null, + "poc_count": 5, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute remote code via a crafted web site that triggers access to a deleted object.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-2596", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc9bbca8f650e5f738af8806317c0a041a48ae4a; https://nvd.nist.gov/vuln/detail/CVE-2013-2596", + "percentile": null, + "poc_count": 11, + "product": "Kernel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Linux kernel fb_mmap function in drivers/video/fbmem.c contains an integer overflow vulnerability that allows for privilege escalation.", + "vendor": "Linux" + }, + { + "cve": "CVE-2013-2597", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://web.archive.org/web/20161226013354/https:/www.codeaurora.org/news/security-advisories/stack-based-buffer-overflow-acdb-audio-driver-cve-2013-2597; https://nvd.nist.gov/vuln/detail/CVE-2013-2597", + "percentile": null, + "poc_count": 8, + "product": "ACDB Audio Driver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Code Aurora audio calibration database (acdb) audio driver contains a stack-based buffer overflow vulnerability that allows for privilege escalation. Code Aurora is used in third-party products such as Qualcomm and Android.", + "vendor": "Code Aurora" + }, + { + "cve": "CVE-2013-2729", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-2729", + "percentile": null, + "poc_count": 14, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Integer overflow vulnerability in Adobe Reader and Acrobat allows attackers to execute remote code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-3163", + "date_added": "2023-03-30", + "due_date": "2023-04-20", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-055; https://nvd.nist.gov/vuln/detail/CVE-2013-3163", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial of service via a crafted website.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3346", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3346", + "percentile": null, + "poc_count": 1, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Reader and Acrobat contain a memory corruption vulnerability which can allow attackers to execute arbitrary code or cause a denial of service.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2013-3660", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3660", + "percentile": null, + "poc_count": 8, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft does not properly initialize a pointer for the next object in a certain list, which allows local users to gain privileges.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3893", + "date_added": "2025-08-12", + "due_date": "2025-09-02", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-080 ; https://nvd.nist.gov/vuln/detail/CVE-2013-3893", + "percentile": null, + "poc_count": 29, + "product": "Internet Explorer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows for remote code execution. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3896", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3896", + "percentile": null, + "poc_count": 1, + "product": "Silverlight", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Microsoft Silverlight does not properly validate pointers during access to Silverlight elements, which allows remote attackers to obtain sensitive information via a crafted Silverlight application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3897", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3897", + "percentile": null, + "poc_count": 2, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A use-after-free vulnerability exists within CDisplayPointer in Microsoft Internet Explorer that allows an attacker to remotely execute arbitrary code.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3900", + "date_added": "2022-01-10", + "due_date": "2022-07-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3900", + "percentile": null, + "poc_count": 84, + "product": "WinVerifyTrust function", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for PE files.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3906", + "date_added": "2022-02-15", + "due_date": "2022-08-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3906", + "percentile": null, + "poc_count": 7, + "product": "Graphics Component", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3918", + "date_added": "2025-10-06", + "due_date": "2025-10-27", + "epss": null, + "notes": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090 ; https://nvd.nist.gov/vuln/detail/CVE-2013-3918", + "percentile": null, + "poc_count": 4, + "product": "Windows", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Microsoft Windows contains an out-of-bounds write vulnerability in the InformationCardSigninHelper Class ActiveX control, icardie.dll. An attacker could exploit the vulnerability by constructing a specially crafted webpage. When a user views the webpage, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-3993", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-3993", + "percentile": null, + "poc_count": 1, + "product": "InfoSphere BigInsights", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Certain APIs within BigInsights can take invalid input that might allow attackers unauthorized access to read, write, modify, or delete data.", + "vendor": "IBM" + }, + { + "cve": "CVE-2013-4810", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-4810", + "percentile": null, + "poc_count": 14, + "product": "ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management", + "required_action": "Apply updates per vendor instructions.", + "short_description": "HP ProCurve Manager (PCM), PCM+, Identity Driven Manager (IDM), and Application Lifecycle Management allow remote attackers to execute arbitrary code via a marshalled object to (1) EJBInvokerServlet or (2) JMXInvokerServlet.", + "vendor": "Hewlett Packard (HP)" + }, + { + "cve": "CVE-2013-5065", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-5065", + "percentile": null, + "poc_count": 8, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows NDProxy.sys in the kernel contains an improper input validation vulnerability which can allow a local attacker to escalate privileges.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2013-5223", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-5223", + "percentile": null, + "poc_count": 3, + "product": "DSL-2760U", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A cross-site scripting (XSS) vulnerability exists in the D-Link DSL-2760U gateway, allowing remote authenticated users to inject arbitrary web script or HTML.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2013-6282", + "date_added": "2022-09-15", + "due_date": "2022-10-06", + "epss": null, + "notes": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8404663f81d212918ff85f493649a7991209fa04; https://nvd.nist.gov/vuln/detail/CVE-2013-6282", + "percentile": null, + "poc_count": 21, + "product": "Kernel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. This allows an application to read and write kernel memory which could lead to privilege escalation.", + "vendor": "Linux" + }, + { + "cve": "CVE-2013-7331", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2013-7331", + "percentile": null, + "poc_count": 4, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-0130", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0130", + "percentile": null, + "poc_count": 14, + "product": "Ruby on Rails", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails allows remote attackers to read arbitrary files via a crafted request.", + "vendor": "Rails" + }, + { + "cve": "CVE-2014-0160", + "date_added": "2022-05-04", + "due_date": "2022-05-25", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0160", + "percentile": null, + "poc_count": 710, + "product": "OpenSSL", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.", + "vendor": "OpenSSL" + }, + { + "cve": "CVE-2014-0196", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://lkml.iu.edu/hypermail/linux/kernel/1609.1/02103.html; https://nvd.nist.gov/vuln/detail/CVE-2014-0196", + "percentile": null, + "poc_count": 71, + "product": "Kernel", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Linux Kernel contains a race condition vulnerability within the n_tty_write function that allows local users to cause a denial-of-service (DoS) or gain privileges via read and write operations with long strings.", + "vendor": "Linux" + }, + { + "cve": "CVE-2014-0322", + "date_added": "2022-05-04", + "due_date": "2022-05-25", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0322", + "percentile": null, + "poc_count": 19, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-0496", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0496", + "percentile": null, + "poc_count": 1, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Reader and Acrobat contain a use-after-free vulnerability which can allow for code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2014-0497", + "date_added": "2024-09-17", + "due_date": "2024-10-08", + "epss": null, + "notes": "https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0497", + "percentile": null, + "poc_count": 0, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.", + "short_description": "Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2014-0502", + "date_added": "2024-09-17", + "due_date": "2024-10-08", + "epss": null, + "notes": "https://www.adobe.com/products/flashplayer/end-of-life-alternative.html#eol-alternative-faq ; https://nvd.nist.gov/vuln/detail/CVE-2014-0502", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.", + "short_description": "Adobe Flash Player contains a double free vulnerability that allows a remote attacker to execute arbitrary code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2014-0546", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0546", + "percentile": null, + "poc_count": 1, + "product": "Reader and Acrobat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Adobe Reader and Acrobat on Windows allow attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2014-0780", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-0780", + "percentile": null, + "poc_count": 2, + "product": "Web Studio", + "required_action": "Apply updates per vendor instructions.", + "short_description": "InduSoft Web Studio NTWebServer contains a directory traversal vulnerability that allows remote attackers to read administrative passwords in APP files, allowing for remote code execution.", + "vendor": "InduSoft" + }, + { + "cve": "CVE-2014-100005", + "date_added": "2024-05-16", + "due_date": "2024-06-06", + "epss": null, + "notes": "https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005", + "percentile": null, + "poc_count": 1, + "product": "DIR-600 Router", + "required_action": "This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.", + "short_description": "D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2014-1761", + "date_added": "2022-02-15", + "due_date": "2022-08-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-1761", + "percentile": null, + "poc_count": 6, + "product": "Word", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Word contains a memory corruption vulnerability which when exploited could allow for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-1776", + "date_added": "2022-01-28", + "due_date": "2022-07-28", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-021?redirectedfrom=MSDN; https://nvd.nist.gov/vuln/detail/CVE-2014-1776", + "percentile": null, + "poc_count": 17, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code in the context of the current user.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-1812", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-1812", + "percentile": null, + "poc_count": 23, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows Active Directory contains a privilege escalation vulnerability due to the way it distributes passwords that are configured using Group Policy preferences. An authenticated attacker who successfully exploits the vulnerability could decrypt the passwords and use them to elevate privileges on the domain.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-2120", + "date_added": "2024-11-12", + "due_date": "2024-12-03", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CVE-2014-2120 ; https://nvd.nist.gov/vuln/detail/CVE-2014-2120", + "percentile": null, + "poc_count": 2, + "product": "Adaptive Security Appliance (ASA)", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Cisco Adaptive Security Appliance (ASA) contains a cross-site scripting (XSS) vulnerability in the WebVPN login page. This vulnerability allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2014-2817", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-2817", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer cotains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-3120", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-3120", + "percentile": null, + "poc_count": 95, + "product": "Elasticsearch", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Elasticsearch enables dynamic scripting, which allows remote attackers to execute arbitrary MVEL expressions and Java code.", + "vendor": "Elastic" + }, + { + "cve": "CVE-2014-3153", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-3153", + "percentile": null, + "poc_count": 96, + "product": "Kernel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The futex_requeue function in kernel/futex.c in Linux kernel does not ensure that calls have two different futex addresses, which allows local users to gain privileges.", + "vendor": "Linux" + }, + { + "cve": "CVE-2014-3931", + "date_added": "2025-07-07", + "due_date": "2025-07-28", + "epss": null, + "notes": "https://mrlg.op-sec.us/ ; https://nvd.nist.gov/vuln/detail/CVE-2014-3931", + "percentile": null, + "poc_count": 3, + "product": "Multi-Router Looking Glass (MRLG)", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Multi-Router Looking Glass (MRLG) contains a buffer overflow vulnerability that could allow remote attackers to cause an arbitrary memory write and memory corruption.", + "vendor": "Looking Glass" + }, + { + "cve": "CVE-2014-4077", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4077", + "percentile": null, + "poc_count": 2, + "product": "Input Method Editor (IME) Japanese", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-4113", + "date_added": "2022-05-04", + "due_date": "2022-05-25", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4113", + "percentile": null, + "poc_count": 93, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-4114", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4114", + "percentile": null, + "poc_count": 27, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-4123", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4123", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains an unspecified vulnerability that allows remote attackers to gain privileges via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-4148", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4148", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists when the Windows kernel-mode driver improperly handles TrueType fonts.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-4404", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-4404", + "percentile": null, + "poc_count": 1, + "product": "OS X", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Heap-based buffer overflow in IOHIDFamily in Apple OS X, which affects, iOS before 8 and Apple TV before 7, allows attackers to execute arbitrary code in a privileged context.", + "vendor": "Apple" + }, + { + "cve": "CVE-2014-6271", + "date_added": "2022-01-28", + "due_date": "2022-07-28", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", + "percentile": null, + "poc_count": 803, + "product": "Bourne-Again Shell (Bash)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.", + "vendor": "GNU" + }, + { + "cve": "CVE-2014-6278", + "date_added": "2025-10-02", + "due_date": "2025-10-23", + "epss": null, + "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278", + "percentile": null, + "poc_count": 45, + "product": "GNU Bash", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.", + "vendor": "GNU" + }, + { + "cve": "CVE-2014-6287", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6287", + "percentile": null, + "poc_count": 50, + "product": "HTTP File Server (HFS)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (HFS or HttpFileServer) allows remote attackers to execute arbitrary programs.", + "vendor": "Rejetto" + }, + { + "cve": "CVE-2014-6324", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6324", + "percentile": null, + "poc_count": 44, + "product": "Kerberos Key Distribution Center (KDC)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Kerberos Key Distribution Center (KDC) in Microsoft allows remote authenticated domain users to obtain domain administrator privileges.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-6332", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6332", + "percentile": null, + "poc_count": 34, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "OleAut32.dll in OLE in Microsoft Windows allows remote attackers to remotely execute code via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-6352", + "date_added": "2022-02-25", + "due_date": "2022-08-25", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6352", + "percentile": null, + "poc_count": 5, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows allow remote attackers to execute arbitrary code via a crafted OLE object.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2014-7169", + "date_added": "2022-01-28", + "due_date": "2022-07-28", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", + "percentile": null, + "poc_count": 89, + "product": "Bourne-Again Shell (Bash)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code. This CVE correctly remediates the vulnerability in CVE-2014-6271.", + "vendor": "GNU" + }, + { + "cve": "CVE-2014-8361", + "date_added": "2023-09-18", + "due_date": "2023-10-09", + "epss": null, + "notes": "https://web.archive.org/web/20150831100501/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10055; https://nvd.nist.gov/vuln/detail/CVE-2014-8361", + "percentile": null, + "poc_count": 8, + "product": "SDK", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Realtek SDK contains an improper input validation vulnerability in the miniigd SOAP service that allows remote attackers to execute malicious code via a crafted NewInternalClient request.", + "vendor": "Realtek" + }, + { + "cve": "CVE-2014-8439", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-8439", + "percentile": null, + "poc_count": 3, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player has a vulnerability in the way it handles a dereferenced memory pointer which could lead to code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2014-9163", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-9163", + "percentile": null, + "poc_count": 1, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Stack-based buffer overflow in Adobe Flash Player allows attackers to execute code remotely.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-0016", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0016", + "percentile": null, + "poc_count": 5, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in the TS WebProxy (TSWbPrxy) component in Microsoft Windows allows remote attackers to escalate privileges.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-0071", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0071", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer allows remote attackers to bypass the address space layout randomization (ASLR) protection mechanism via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-0310", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0310", + "percentile": null, + "poc_count": 2, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player does not properly restrict discovery of memory addresses, which allows attackers to bypass the address space layout randomization (ASLR) protection mechanism.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-0311", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0311", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-0313", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0313", + "percentile": null, + "poc_count": 12, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Use-after-free vulnerability in Adobe Flash Player allows remote attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-0666", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-0666", + "percentile": null, + "poc_count": 1, + "product": "Prime Data Center Network Manager (DCNM)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) allows remote attackers to read arbitrary files.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2015-1130", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1130", + "percentile": null, + "poc_count": 10, + "product": "OS X", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges.", + "vendor": "Apple" + }, + { + "cve": "CVE-2015-1187", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1187", + "percentile": null, + "poc_count": 3, + "product": "Multiple Devices", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "The ping tool in multiple D-Link and TRENDnet devices allow remote attackers to perform remote code execution.", + "vendor": "D-Link and TRENDnet" + }, + { + "cve": "CVE-2015-1427", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1427", + "percentile": null, + "poc_count": 93, + "product": "Elasticsearch", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Groovy scripting engine in Elasticsearch allows remote attackers to bypass the sandbox protection mechanism and execute arbitrary shell commands.", + "vendor": "Elastic" + }, + { + "cve": "CVE-2015-1635", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1635", + "percentile": null, + "poc_count": 69, + "product": "HTTP.sys", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1641", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1641", + "percentile": null, + "poc_count": 7, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a memory corruption vulnerability due to failure to properly handle rich text format files in memory. Successful exploitation allows for remote code execution in the context of the current user.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1642", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1642", + "percentile": null, + "poc_count": 1, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a memory corruption vulnerability that allows remote attackers to execute arbitrary code via a crafted document.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1671", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1671", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists when components of Windows, .NET Framework, Office, Lync, and Silverlight fail to properly handle TrueType fonts.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1701", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1701", + "percentile": null, + "poc_count": 74, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An unspecified vulnerability exists in the Win32k.sys kernel-mode driver in Microsoft Windows Server that allows a local attacker to execute arbitrary code with elevated privileges.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1769", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1769", + "percentile": null, + "poc_count": 4, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege escalation vulnerability exists when the Windows Mount Manager component improperly processes symbolic links.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-1770", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-1770", + "percentile": null, + "poc_count": 1, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office allows remote attackers to execute arbitrary code via a crafted Office document.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2051", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2051", + "percentile": null, + "poc_count": 4, + "product": "DIR-645 Router", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2015-2291", + "date_added": "2023-02-10", + "due_date": "2023-03-03", + "epss": null, + "notes": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00051.html; https://nvd.nist.gov/vuln/detail/CVE-2015-2291", + "percentile": null, + "poc_count": 17, + "product": "Ethernet Diagnostics Driver for Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Intel ethernet diagnostics driver for Windows IQVW32.sys and IQVW64.sys contain an unspecified vulnerability that allows for a denial-of-service (DoS).", + "vendor": "Intel" + }, + { + "cve": "CVE-2015-2360", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2360", + "percentile": null, + "poc_count": 1, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Win32k.sys in the kernel-mode drivers in Microsoft Windows allows local users to gain privileges or cause denial-of-service (DoS).", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2387", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2387", + "percentile": null, + "poc_count": 10, + "product": "ATM Font Driver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2419", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2419", + "percentile": null, + "poc_count": 4, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "JScript in Microsoft Internet Explorer allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2424", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2424", + "percentile": null, + "poc_count": 1, + "product": "PowerPoint", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft PowerPoint allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2425", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2425", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause denial-of-service (DoS).", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2426", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2426", + "percentile": null, + "poc_count": 34, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2502", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2502", + "percentile": null, + "poc_count": 2, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows an attacker to execute code or cause a denial-of-service (DoS).", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2545", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2545", + "percentile": null, + "poc_count": 21, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2546", + "date_added": "2022-03-15", + "due_date": "2022-04-05", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2546", + "percentile": null, + "poc_count": 24, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel-mode driver in Microsoft Windows OS and Server allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-2590", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-2590", + "percentile": null, + "poc_count": 3, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An unspecified vulnerability exists within Oracle Java Runtime Environment that allows an attacker to perform remote code execution.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2015-3035", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-3035", + "percentile": null, + "poc_count": 4, + "product": "Multiple Archer Devices", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.", + "vendor": "TP-Link" + }, + { + "cve": "CVE-2015-3043", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-3043", + "percentile": null, + "poc_count": 3, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "A memory corruption vulnerability exists in Adobe Flash Player that allows an attacker to perform remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-3113", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-3113", + "percentile": null, + "poc_count": 2, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-4068", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-4068", + "percentile": null, + "poc_count": 1, + "product": "Unified Data Protection (UDP)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in Arcserve UDP allows remote attackers to obtain sensitive information or cause a denial of service.", + "vendor": "Arcserve" + }, + { + "cve": "CVE-2015-4495", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-4495", + "percentile": null, + "poc_count": 4, + "product": "Firefox", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2015-4852", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-4852", + "percentile": null, + "poc_count": 71, + "product": "WebLogic Server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle WebLogic Server contains a deserialization of untrusted data vulnerability within Apache Commons, which can allow for for remote code execution.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2015-4902", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-4902", + "percentile": null, + "poc_count": 2, + "product": "Java SE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Unspecified vulnerability in Oracle Java SE allows remote attackers to affect integrity via Unknown vectors related to deployment.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2015-5119", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-5119", + "percentile": null, + "poc_count": 32, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "A use-after-free vulnerability exists within the ActionScript 3 ByteArray class in Adobe Flash Player that allows an attacker to perform remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-5122", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-5122", + "percentile": null, + "poc_count": 20, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS).", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-5123", + "date_added": "2022-04-13", + "due_date": "2022-05-04", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-5123", + "percentile": null, + "poc_count": 3, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS).", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-5317", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://www.jenkins.io/security/advisory/2015-11-11/; https://nvd.nist.gov/vuln/detail/CVE-2015-5317", + "percentile": null, + "poc_count": 10, + "product": "Jenkins User Interface (UI)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Jenkins User Interface (UI) contains an information disclosure vulnerability that allows users to see the names of jobs and builds otherwise inaccessible to them on the \"Fingerprints\" pages.", + "vendor": "Jenkins" + }, + { + "cve": "CVE-2015-6175", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-6175", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2015-7450", + "date_added": "2022-01-10", + "due_date": "2022-07-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-7450", + "percentile": null, + "poc_count": 54, + "product": "WebSphere Application Server and Server Hypervisor Edition", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands", + "vendor": "IBM" + }, + { + "cve": "CVE-2015-7645", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-7645", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2015-7755", + "date_added": "2025-10-02", + "due_date": "2025-10-23", + "epss": null, + "notes": "https://supportportal.juniper.net/s/article/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https://nvd.nist.gov/vuln/detail/CVE-2015-7755", + "percentile": null, + "poc_count": 18, + "product": "ScreenOS", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.", + "vendor": "Juniper" + }, + { + "cve": "CVE-2015-8651", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2015-8651", + "percentile": null, + "poc_count": 5, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Integer overflow in Adobe Flash Player allows attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-0034", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0034", + "percentile": null, + "poc_count": 3, + "product": "Silverlight", + "required_action": "The impacted products are end-of-life and should be disconnected if still in use.", + "short_description": "Microsoft Silverlight mishandles negative offsets during decoding, which allows attackers to execute remote code or cause a denial-of-service (DoS).", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0040", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0040", + "percentile": null, + "poc_count": 24, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The kernel in Microsoft Windows allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0099", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0099", + "percentile": null, + "poc_count": 24, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege escalation vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0151", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0151", + "percentile": null, + "poc_count": 2, + "product": "Client-Server Run-time Subsystem (CSRSS)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Client-Server Run-time Subsystem (CSRSS) in Microsoft mismanages process tokens, which allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0162", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0162", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An information disclosure vulnerability exists when Internet Explorer does not properly handle JavaScript. The vulnerability could allow an attacker to detect specific files on the user's computer.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0165", + "date_added": "2023-06-22", + "due_date": "2023-07-13", + "epss": null, + "notes": "https://learn.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039; https://nvd.nist.gov/vuln/detail/CVE-2016-0165", + "percentile": null, + "poc_count": 6, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0167", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0167", + "percentile": null, + "poc_count": 5, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation via a crafted application", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0185", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0185", + "percentile": null, + "poc_count": 2, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows Media Center contains a remote code execution vulnerability when Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0189", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0189", + "percentile": null, + "poc_count": 17, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Microsoft JScript nd VBScript engines, as used in Internet Explorer and other products, allow attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-0752", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0752", + "percentile": null, + "poc_count": 21, + "product": "Ruby on Rails", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Directory traversal vulnerability in Action View in Ruby on Rails allows remote attackers to read arbitrary files.", + "vendor": "Rails" + }, + { + "cve": "CVE-2016-0984", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-0984", + "percentile": null, + "poc_count": 2, + "product": "Flash Player and AIR", + "required_action": "The impacted products are end-of-life and should be disconnected if still in use.", + "short_description": "Use-after-free vulnerability in Adobe Flash Player and Adobe AIR allows attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-10033", + "date_added": "2025-07-07", + "due_date": "2025-07-28", + "epss": null, + "notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18 ; https://github.com/advisories/GHSA-5f37-gxvh-23v6 ; https://nvd.nist.gov/vuln/detail/CVE-2016-10033", + "percentile": null, + "poc_count": 227, + "product": "PHPMailer", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "PHPMailer contains a command injection vulnerability because it fails to sanitize user-supplied input. Specifically, this issue affects the 'mail()' function of 'class.phpmailer.php' script. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will result in a denial-of-service condition.", + "vendor": "PHP" + }, + { + "cve": "CVE-2016-1010", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-1010", + "percentile": null, + "poc_count": 4, + "product": "Flash Player and AIR", + "required_action": "The impacted products are end-of-life and should be disconnected if still in use.", + "short_description": "Integer overflow vulnerability in Adobe Flash Player and AIR allows attackers to execute code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-10174", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-10174", + "percentile": null, + "poc_count": 4, + "product": "WNR2000v5 Router", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The NETGEAR WNR2000v5 router contains a buffer overflow which can be exploited to achieve remote code execution.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2016-1019", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-1019", + "percentile": null, + "poc_count": 7, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player allows remote attackers to cause a denial of service or possibly execute arbitrary code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-11021", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-11021", + "percentile": null, + "poc_count": 3, + "product": "DCS-930L Devices", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "setSystemCommand on D-Link DCS-930L devices allows a remote attacker to execute code via an OS command.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2016-1555", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-1555", + "percentile": null, + "poc_count": 14, + "product": "Wireless Access Point (WAP) Devices", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Multiple NETGEAR Wireless Access Point devices allows unauthenticated web pages to pass form input directly to the command-line interface. Exploitation allows for arbitrary code execution.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2016-1646", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-1646", + "percentile": null, + "poc_count": 7, + "product": "Chromium V8", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Google Chromium V8 Engine contains an out-of-bounds read vulnerability that allows a remote attacker to cause a denial of service or possibly have another unspecified impact via crafted JavaScript code. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", + "vendor": "Google" + }, + { + "cve": "CVE-2016-20017", + "date_added": "2024-01-08", + "due_date": "2024-01-29", + "epss": null, + "notes": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088; https://nvd.nist.gov/vuln/detail/CVE-2016-20017", + "percentile": null, + "poc_count": 2, + "product": "DSL-2750B Devices", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "D-Link DSL-2750B devices contain a command injection vulnerability that allows remote, unauthenticated command injection via the login.cgi cli parameter.", + "vendor": "D-Link" + }, + { + "cve": "CVE-2016-2386", + "date_added": "2022-06-09", + "due_date": "2022-06-30", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-2386", + "percentile": null, + "poc_count": 10, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.", + "vendor": "SAP" + }, + { + "cve": "CVE-2016-2388", + "date_added": "2022-06-09", + "due_date": "2022-06-30", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-2388", + "percentile": null, + "poc_count": 8, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request.", + "vendor": "SAP" + }, + { + "cve": "CVE-2016-3088", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3088", + "percentile": null, + "poc_count": 61, + "product": "ActiveMQ", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Fileserver web application in Apache ActiveMQ allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request", + "vendor": "Apache" + }, + { + "cve": "CVE-2016-3235", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3235", + "percentile": null, + "poc_count": 2, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Object Linking & Embedding (OLE) dynamic link library (DLL) contains a side loading vulnerability due to it improperly validating input before loading libraries. Successful exploitation allows for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-3298", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3298", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow the attacker to test for the presence of files on disk.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-3309", + "date_added": "2022-03-15", + "due_date": "2022-04-05", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3309", + "percentile": null, + "poc_count": 46, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-3351", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3351", + "percentile": null, + "poc_count": 3, + "product": "Internet Explorer and Edge", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An information disclosure vulnerability exists in the way that certain functions in Internet Explorer and Edge handle objects in memory. The vulnerability could allow an attacker to detect specific files on the user's computer.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-3393", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3393", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists due to the way the Windows GDI component handles objects in the memory. An attacker who successfully exploits this vulnerability could take control of the affected system.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-3427", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://www.oracle.com/security-alerts/cpuapr2016v3.html; https://nvd.nist.gov/vuln/detail/CVE-2016-3427", + "percentile": null, + "poc_count": 25, + "product": "Java SE and JRockit", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2016-3643", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3643", + "percentile": null, + "poc_count": 4, + "product": "Virtualization Manager", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SolarWinds Virtualization Manager allows for privilege escalation through leveraging a misconfiguration of sudo.", + "vendor": "SolarWinds" + }, + { + "cve": "CVE-2016-3714", + "date_added": "2024-09-09", + "due_date": "2024-09-30", + "epss": null, + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588#p132726, https://imagemagick.org/archive/releases/; https://nvd.nist.gov/vuln/detail/CVE-2016-3714", + "percentile": null, + "poc_count": 102, + "product": "ImageMagick", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This allows a remote attacker to execute arbitrary code via shell metacharacters in a crafted image.", + "vendor": "ImageMagick" + }, + { + "cve": "CVE-2016-3715", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3715", + "percentile": null, + "poc_count": 8, + "product": "ImageMagick", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ImageMagick contains an unspecified vulnerability that could allow users to delete files by using ImageMagick's 'ephemeral' pseudo protocol, which deletes files after reading.", + "vendor": "ImageMagick" + }, + { + "cve": "CVE-2016-3718", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3718", + "percentile": null, + "poc_count": 20, + "product": "ImageMagick", + "required_action": "Apply updates per vendor instructions.", + "short_description": "ImageMagick contains an unspecified vulnerability that allows attackers to perform server-side request forgery (SSRF) via a crafted image.", + "vendor": "ImageMagick" + }, + { + "cve": "CVE-2016-3976", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-3976", + "percentile": null, + "poc_count": 6, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms contains a directory traversal vulnerability via a ..\\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet. This allows remote attackers to read files.", + "vendor": "SAP" + }, + { + "cve": "CVE-2016-4117", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4117", + "percentile": null, + "poc_count": 8, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "An access of resource using incompatible type vulnerability exists within Adobe Flash Player that allows an attacker to perform remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-4171", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4171", + "percentile": null, + "poc_count": 2, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Unspecified vulnerability in Adobe Flash Player allows for remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-4437", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", + "percentile": null, + "poc_count": 71, + "product": "Shiro", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Apache Shiro contains a vulnerability which may allow remote attackers to execute code or bypass intended access restrictions via an unspecified request parameter when a cipher key has not been configured for the \"remember me\" feature.", + "vendor": "Apache" + }, + { + "cve": "CVE-2016-4523", + "date_added": "2022-04-15", + "due_date": "2022-05-06", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4523", + "percentile": null, + "poc_count": 1, + "product": "VTScada (formerly VTS)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The WAP interface in Trihedral VTScada (formerly VTS) allows remote attackers to cause a denial-of-service (DoS).", + "vendor": "Trihedral" + }, + { + "cve": "CVE-2016-4655", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4655", + "percentile": null, + "poc_count": 27, + "product": "iOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Apple iOS kernel allows attackers to obtain sensitive information from memory via a crafted application.", + "vendor": "Apple" + }, + { + "cve": "CVE-2016-4656", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4656", + "percentile": null, + "poc_count": 23, + "product": "iOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A memory corruption vulnerability in Apple iOS kernel allows attackers to execute code in a privileged context or cause a denial-of-service (DoS) via a crafted application.", + "vendor": "Apple" + }, + { + "cve": "CVE-2016-4657", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-4657", + "percentile": null, + "poc_count": 18, + "product": "iOS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Apple iOS WebKit contains a memory corruption vulnerability that allows attackers to execute remote code or cause a denial-of-service (DoS) via a crafted web site. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.", + "vendor": "Apple" + }, + { + "cve": "CVE-2016-5195", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", + "percentile": null, + "poc_count": 551, + "product": "Kernel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.", + "vendor": "Linux" + }, + { + "cve": "CVE-2016-5198", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-5198", + "percentile": null, + "poc_count": 6, + "product": "Chromium V8", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Google Chromium V8 Engine contains an out-of-bounds memory access vulnerability that allows a remote attacker to perform read/write operations, leading to code execution, via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", + "vendor": "Google" + }, + { + "cve": "CVE-2016-6277", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-6277", + "percentile": null, + "poc_count": 19, + "product": "Multiple Routers", + "required_action": "Apply updates per vendor instructions.", + "short_description": "NETGEAR confirmed multiple routers allow unauthenticated web pages to pass form input directly to the command-line interface, permitting remote code execution.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2016-6366", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-6366", + "percentile": null, + "poc_count": 22, + "product": "Adaptive Security Appliance (ASA)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASA software could allow an attacker to cause a reload of the affected system or to remotely execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2016-6367", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-6367", + "percentile": null, + "poc_count": 2, + "product": "Adaptive Security Appliance (ASA)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the command-line interface (CLI) parser of Cisco ASA software could allow an authenticated, local attacker to create a denial-of-service (DoS) condition or potentially execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2016-6415", + "date_added": "2023-05-19", + "due_date": "2023-06-09", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1; https://nvd.nist.gov/vuln/detail/CVE-2016-6415", + "percentile": null, + "poc_count": 8, + "product": "IOS, IOS XR, and IOS XE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Cisco IOS, IOS XR, and IOS XE contain insufficient condition checks in the part of the code that handles Internet Key Exchange version 1 (IKEv1) security negotiation requests. contains an information disclosure vulnerability in the Internet Key Exchange version 1 (IKEv1) that could allow an attacker to retrieve memory contents. Successful exploitation could allow the attacker to retrieve memory contents, which can lead to information disclosure.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2016-7193", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7193", + "percentile": null, + "poc_count": 3, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a memory corruption vulnerability which can allow for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7200", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7200", + "percentile": null, + "poc_count": 23, + "product": "Edge", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7201", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7201", + "percentile": null, + "poc_count": 22, + "product": "Edge", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7255", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7255", + "percentile": null, + "poc_count": 69, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Win32k kernel-mode driver fails to properly handle objects in memory which allows for privilege escalation. Successful exploitation allows an attacker to run code in kernel mode.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7256", + "date_added": "2022-05-25", + "due_date": "2022-06-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7256", + "percentile": null, + "poc_count": 1, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploits this vulnerability could take control of the affected system.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7262", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7262", + "percentile": null, + "poc_count": 1, + "product": "Excel", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A security feature bypass vulnerability exists when Microsoft Office improperly handles input. An attacker who successfully exploited the vulnerability could execute arbitrary commands.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2016-7836", + "date_added": "2025-10-14", + "due_date": "2025-11-04", + "epss": null, + "notes": "https://www.skyseaclientview.net/news/161221/ ; https://nvd.nist.gov/vuln/detail/CVE-2016-7836", + "percentile": null, + "poc_count": 0, + "product": "Client View", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "SKYSEA Client View contains an improper authentication vulnerability that allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.", + "vendor": "SKYSEA" + }, + { + "cve": "CVE-2016-7855", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7855", + "percentile": null, + "poc_count": 4, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Use-after-free vulnerability in Adobe Flash Player Windows and OS and Linux allows remote attackers to execute arbitrary code.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-7892", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-7892", + "percentile": null, + "poc_count": 2, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player has an exploitable use-after-free vulnerability in the TextField class.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2016-8562", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-8562", + "percentile": null, + "poc_count": 1, + "product": "SIMATIC CP", + "required_action": "Apply updates per vendor instructions.", + "short_description": "An improper privilege management vulnerability exists within the Siemens SIMATIC Communication Processor (CP) that allows a privileged attacker to remotely cause a denial of service.", + "vendor": "Siemens" + }, + { + "cve": "CVE-2016-8735", + "date_added": "2023-05-12", + "due_date": "2023-06-02", + "epss": null, + "notes": "https://tomcat.apache.org/security-9.html; https://nvd.nist.gov/vuln/detail/CVE-2016-8735", + "percentile": null, + "poc_count": 42, + "product": "Tomcat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types.", + "vendor": "Apache" + }, + { + "cve": "CVE-2016-9079", + "date_added": "2023-06-22", + "due_date": "2023-07-13", + "epss": null, + "notes": "https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/#CVE-2016-9079; https://nvd.nist.gov/vuln/detail/CVE-2016-9079", + "percentile": null, + "poc_count": 13, + "product": "Firefox, Firefox ESR, and Thunderbird", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Mozilla Firefox, Firefox ESR, and Thunderbird contain a use-after-free vulnerability in SVG Animation, targeting Firefox and Tor browser users on Windows.", + "vendor": "Mozilla" + }, + { + "cve": "CVE-2016-9563", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-9563", + "percentile": null, + "poc_count": 2, + "product": "NetWeaver", + "required_action": "Apply updates per vendor instructions.", + "short_description": "SAP NetWeaver Application Server Java Platforms contains an unspecified vulnerability in BC-BMT-BPM-DSK which allows remote, authenticated users to conduct XML External Entity (XXE) attacks.", + "vendor": "SAP" + }, + { + "cve": "CVE-2017-0001", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0001", + "percentile": null, + "poc_count": 5, + "product": "Graphics Device Interface (GDI)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0005", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0005", + "percentile": null, + "poc_count": 17, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Graphics Device Interface (GDI) in Microsoft Windows allows local users to gain privileges via a crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0022", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0022", + "percentile": null, + "poc_count": 3, + "product": "XML Core Services", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft XML Core Services (MSXML) improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0037", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0037", + "percentile": null, + "poc_count": 18, + "product": "Edge and Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Edge and Internet Explorer have a type confusion vulnerability in mshtml.dll, which allows remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0059", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0059", + "percentile": null, + "poc_count": 13, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer allow remote attackers to obtain sensitive information from process memory via a crafted web site.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0101", + "date_added": "2022-03-15", + "due_date": "2022-04-05", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0101", + "percentile": null, + "poc_count": 9, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege escalation vulnerability exists when the Windows Transaction Manager improperly handles objects in memory.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0143", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0143", + "percentile": null, + "poc_count": 206, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows Server Message Block 1.0 (SMBv1) contains an unspecified vulnerability that allows for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0144", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0144", + "percentile": null, + "poc_count": 323, + "product": "SMBv1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0145", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0145", + "percentile": null, + "poc_count": 101, + "product": "SMBv1", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0146", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0146", + "percentile": null, + "poc_count": 64, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The SMBv1 server in Microsoft Windows allows remote attackers to perform remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0147", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0147", + "percentile": null, + "poc_count": 42, + "product": "SMBv1 server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The SMBv1 server in Microsoft Windows allows remote attackers to obtain sensitive information from process memory via a crafted packet.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0148", + "date_added": "2022-04-06", + "due_date": "2022-04-27", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0148", + "percentile": null, + "poc_count": 62, + "product": "SMBv1 server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The SMBv1 server in Microsoft allows remote attackers to execute arbitrary code via crafted packets.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0149", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0149", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS) via a crafted website.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0199", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0199", + "percentile": null, + "poc_count": 233, + "product": "Office and WordPad", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office and WordPad contain an unspecified vulnerability due to the way the applications parse specially crafted files. Successful exploitation allows for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0210", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0210", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A privilege escalation vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0213", + "date_added": "2022-03-28", + "due_date": "2022-04-18", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0213", + "percentile": null, + "poc_count": 108, + "product": "Windows", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows COM Aggregate Marshaler allows for privilege escalation when an attacker runs a specially crafted application.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0222", + "date_added": "2022-02-25", + "due_date": "2022-08-25", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0222", + "percentile": null, + "poc_count": 1, + "product": "Internet Explorer", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0261", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0261", + "percentile": null, + "poc_count": 9, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a use-after-free vulnerability which can allow for remote code execution.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0262", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0262", + "percentile": null, + "poc_count": 6, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in Microsoft Office.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-0263", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-0263", + "percentile": null, + "poc_count": 13, + "product": "Win32k", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-1000253", + "date_added": "2024-09-09", + "due_date": "2024-09-30", + "epss": null, + "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a87938b2e246b81b4fb713edb371a9fa3c5c3c86; https://nvd.nist.gov/vuln/detail/CVE-2017-1000253", + "percentile": null, + "poc_count": 8, + "product": "Kernel", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Linux kernel contains a position-independent executable (PIE) stack buffer corruption vulnerability in load_elf_ binary() that allows a local attacker to escalate privileges.", + "vendor": "Linux" + }, + { + "cve": "CVE-2017-1000353", + "date_added": "2025-10-02", + "due_date": "2025-10-23", + "epss": null, + "notes": "https://www.jenkins.io/security/advisory/2017-04-26/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-1000353", + "percentile": null, + "poc_count": 62, + "product": "Jenkins", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.", + "vendor": "Jenkins" + }, + { + "cve": "CVE-2017-1000486", + "date_added": "2022-01-10", + "due_date": "2022-07-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000486", + "percentile": null, + "poc_count": 21, + "product": "Primefaces Application", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Primetek Primefaces is vulnerable to a weak encryption flaw resulting in remote code execution", + "vendor": "Primetek" + }, + { + "cve": "CVE-2017-10271", + "date_added": "2022-02-10", + "due_date": "2022-08-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-10271", + "percentile": null, + "poc_count": 270, + "product": "WebLogic Server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Oracle Corporation WebLogic Server contains a vulnerability that allows for remote code execution.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2017-11292", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-11292", + "percentile": null, + "poc_count": 3, + "product": "Flash Player", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "Adobe Flash Player contains a type confusion vulnerability which can allow for remote code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2017-11317", + "date_added": "2022-04-11", + "due_date": "2022-05-02", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-11317", + "percentile": null, + "poc_count": 19, + "product": "User Interface (UI) for ASP.NET AJAX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX allows remote attackers to perform arbitrary file uploads or execute arbitrary code.", + "vendor": "Telerik" + }, + { + "cve": "CVE-2017-11357", + "date_added": "2023-01-26", + "due_date": "2023-02-16", + "epss": null, + "notes": "https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/asyncupload-insecure-direct-object-reference; https://nvd.nist.gov/vuln/detail/CVE-2017-11357", + "percentile": null, + "poc_count": 13, + "product": "User Interface (UI) for ASP.NET AJAX", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Telerik UI for ASP.NET AJAX contains an insecure direct object reference vulnerability in RadAsyncUpload that can result in file uploads in a limited location and/or remote code execution.", + "vendor": "Telerik" + }, + { + "cve": "CVE-2017-11774", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-11774", + "percentile": null, + "poc_count": 6, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office Outlook contains a security feature bypass vulnerability due to improperly handling objects in memory. Successful exploitation allows an attacker to execute commands.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-11826", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-11826", + "percentile": null, + "poc_count": 10, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-11882", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882", + "percentile": null, + "poc_count": 231, + "product": "Office", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Office contains a memory corruption vulnerability that allows remote code execution in the context of the current user.", + "vendor": "Microsoft" + }, + { + "cve": "CVE-2017-12149", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12149", + "percentile": null, + "poc_count": 128, + "product": "JBoss Application Server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The JBoss Application Server, shipped with Red Hat Enterprise Application Platform 5.2, allows an attacker to execute arbitrary code via crafted serialized data.", + "vendor": "Red Hat" + }, + { + "cve": "CVE-2017-12231", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12231", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS could allow an unauthenticated, remote attacker to cause a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12232", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12232", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12233", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12233", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "There is a vulnerability in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12234", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12234", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "There is a vulnerability in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12235", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12235", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12237", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12237", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS and Cisco IOS XE could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12238", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12238", + "percentile": null, + "poc_count": 1, + "product": "Catalyst 6800 Series Switches", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12240", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12240", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Dynamic Host Configuration Protocol (DHCP) relay subsystem of Cisco IOS and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12319", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12319", + "percentile": null, + "poc_count": 1, + "product": "IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-12615", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615", + "percentile": null, + "poc_count": 132, + "product": "Tomcat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "When running Apache Tomcat on Windows with HTTP PUTs enabled, it is possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.", + "vendor": "Apache" + }, + { + "cve": "CVE-2017-12617", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617", + "percentile": null, + "poc_count": 119, + "product": "Tomcat", + "required_action": "Apply updates per vendor instructions.", + "short_description": "When running Apache Tomcat, it is possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.", + "vendor": "Apache" + }, + { + "cve": "CVE-2017-12637", + "date_added": "2025-03-19", + "due_date": "2025-04-09", + "epss": null, + "notes": "SAP users must have an account to log in and access the patch: https://me.sap.com/notes/3476549 ; https://nvd.nist.gov/vuln/detail/CVE-2017-12637", + "percentile": null, + "poc_count": 11, + "product": "NetWeaver", + "required_action": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", + "short_description": "SAP NetWeaver Application Server (AS) Java contains a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that allows a remote attacker to read arbitrary files via a .. (dot dot) in the query string.", + "vendor": "SAP" + }, + { + "cve": "CVE-2017-15944", + "date_added": "2022-08-18", + "due_date": "2022-09-08", + "epss": null, + "notes": "https://security.paloaltonetworks.com/CVE-2017-15944; https://nvd.nist.gov/vuln/detail/CVE-2017-15944", + "percentile": null, + "poc_count": 14, + "product": "PAN-OS", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Palo Alto Networks PAN-OS contains multiple, unspecified vulnerabilities which can allow for remote code execution when chained.", + "vendor": "Palo Alto Networks" + }, + { + "cve": "CVE-2017-16651", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-16651", + "percentile": null, + "poc_count": 4, + "product": "Roundcube Webmail", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Roundcube Webmail contains a file disclosure vulnerability caused by insufficient input validation in conjunction with file-based attachment plugins, which are used by default.", + "vendor": "Roundcube" + }, + { + "cve": "CVE-2017-17562", + "date_added": "2021-12-10", + "due_date": "2022-06-10", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-17562", + "percentile": null, + "poc_count": 45, + "product": "GoAhead", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked.", + "vendor": "Embedthis" + }, + { + "cve": "CVE-2017-18362", + "date_added": "2022-05-24", + "due_date": "2022-06-14", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-18362", + "percentile": null, + "poc_count": 4, + "product": "Virtual System/Server Administrator (VSA)", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "ConnectWise ManagedITSync integration for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database.", + "vendor": "Kaseya" + }, + { + "cve": "CVE-2017-18368", + "date_added": "2023-08-07", + "due_date": "2023-08-28", + "epss": null, + "notes": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-a-new-variant-of-gafgyt-malware; https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-p660hn-t1a-dsl-cpe; https://nvd.nist.gov/vuln/detail/CVE-2017-18368", + "percentile": null, + "poc_count": 4, + "product": "P660HN-T1A Routers", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Zyxel P660HN-T1A routers contain a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user and exploited via the remote_host parameter of the ViewLog.asp page.", + "vendor": "Zyxel" + }, + { + "cve": "CVE-2017-3066", + "date_added": "2025-02-24", + "due_date": "2025-03-17", + "epss": null, + "notes": "https://helpx.adobe.com/security/products/coldfusion/apsb17-14.html ; https://nvd.nist.gov/vuln/detail/CVE-2017-3066", + "percentile": null, + "poc_count": 31, + "product": "ColdFusion", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Adobe ColdFusion contains a deserialization vulnerability in the Apache BlazeDS library that allows for arbitrary code execution.", + "vendor": "Adobe" + }, + { + "cve": "CVE-2017-3506", + "date_added": "2024-06-03", + "due_date": "2024-06-24", + "epss": null, + "notes": "https://www.oracle.com/security-alerts/cpuapr2017.html; https://nvd.nist.gov/vuln/detail/CVE-2017-3506", + "percentile": null, + "poc_count": 98, + "product": "WebLogic Server", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.", + "vendor": "Oracle" + }, + { + "cve": "CVE-2017-3881", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-3881", + "percentile": null, + "poc_count": 17, + "product": "IOS and IOS XE", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-5030", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-5030", + "percentile": null, + "poc_count": 9, + "product": "Chromium V8", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Google Chromium V8 Engine contains a memory corruption vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", + "vendor": "Google" + }, + { + "cve": "CVE-2017-5070", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-5070", + "percentile": null, + "poc_count": 9, + "product": "Chromium V8", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to execute code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.", + "vendor": "Google" + }, + { + "cve": "CVE-2017-5521", + "date_added": "2022-09-08", + "due_date": "2022-09-29", + "epss": null, + "notes": "https://kb.netgear.com/30632/Web-GUI-Password-Recovery-and-Exposure-Security-Vulnerability; https://nvd.nist.gov/vuln/detail/CVE-2017-5521", + "percentile": null, + "poc_count": 5, + "product": "Multiple Devices", + "required_action": "Apply updates per vendor instructions. If the affected device has since entered end-of-life, it should be disconnected if still in use.", + "short_description": "Multiple NETGEAR devices are prone to admin password disclosure via simple crafted requests to the web management server.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2017-5638", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-5638", + "percentile": null, + "poc_count": 399, + "product": "Struts", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Apache Struts Jakarta Multipart parser allows for malicious file upload using the Content-Type value, leading to remote code execution.", + "vendor": "Apache" + }, + { + "cve": "CVE-2017-5689", + "date_added": "2022-01-28", + "due_date": "2022-07-28", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-5689", + "percentile": null, + "poc_count": 75, + "product": "Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Intel products contain a vulnerability which can allow attackers to perform privilege escalation.", + "vendor": "Intel" + }, + { + "cve": "CVE-2017-6077", + "date_added": "2022-03-07", + "due_date": "2022-09-07", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6077", + "percentile": null, + "poc_count": 3, + "product": "Wireless Router DGN2200", + "required_action": "Apply updates per vendor instructions.", + "short_description": "NETGEAR DGN2200 wireless routers contain a vulnerability that allows for remote code execution.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2017-6316", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6316", + "percentile": null, + "poc_count": 3, + "product": "NetScaler SD-WAN Enterprise, CloudBridge Virtual WAN, and XenMobile Server", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability has been identified in the management interface of Citrix NetScaler SD-WAN Enterprise and Standard Edition and Citrix CloudBridge Virtual WAN Edition that could result in an unauthenticated, remote attacker being able to execute arbitrary code as a root user. This vulnerability also affects XenMobile Server.", + "vendor": "Citrix" + }, + { + "cve": "CVE-2017-6327", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6327", + "percentile": null, + "poc_count": 5, + "product": "Symantec Messaging Gateway", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Symantec Messaging Gateway contains an unspecified vulnerability which can allow for remote code execution. With the ability to perform remote code execution, an attacker may also desire to perform privilege escalating actions.", + "vendor": "Symantec" + }, + { + "cve": "CVE-2017-6334", + "date_added": "2022-03-25", + "due_date": "2022-04-15", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6334", + "percentile": null, + "poc_count": 5, + "product": "DGN2200 Devices", + "required_action": "The impacted product is end-of-life and should be disconnected if still in use.", + "short_description": "dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2017-6627", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6627", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the UDP processing code of Cisco IOS and IOS XE could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and denial of service.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6663", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6663", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in denial-of-service (DoS).", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6736", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6736", + "percentile": null, + "poc_count": 10, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6737", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6737", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6738", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6738", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6739", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6739", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6740", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6740", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6742", + "date_added": "2023-04-19", + "due_date": "2023-05-10", + "epss": null, + "notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742", + "percentile": null, + "poc_count": 3, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6743", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6743", + "percentile": null, + "poc_count": 1, + "product": "IOS and IOS XE Software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6744", + "date_added": "2022-03-03", + "due_date": "2022-03-24", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6744", + "percentile": null, + "poc_count": 1, + "product": "IOS software", + "required_action": "Apply updates per vendor instructions.", + "short_description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 1 contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6.", + "vendor": "Cisco" + }, + { + "cve": "CVE-2017-6862", + "date_added": "2022-06-08", + "due_date": "2022-06-22", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6862", + "percentile": null, + "poc_count": 2, + "product": "Multiple Devices", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Multiple NETGEAR devices contain a buffer overflow vulnerability that allows for authentication bypass and remote code execution.", + "vendor": "NETGEAR" + }, + { + "cve": "CVE-2017-6884", + "date_added": "2023-09-18", + "due_date": "2023-10-09", + "epss": null, + "notes": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https://www.zyxelguard.com/Zyxel-EOL.asp; https://nvd.nist.gov/vuln/detail/CVE-2017-6884", + "percentile": null, + "poc_count": 6, + "product": "EMG2926 Routers", + "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "short_description": "Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.", + "vendor": "Zyxel" + }, + { + "cve": "CVE-2017-7269", + "date_added": "2021-11-03", + "due_date": "2022-05-03", + "epss": null, + "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-7269", + "percentile": null, + "poc_count": 115, + "product": "Internet Information Services (IIS)", + "required_action": "Apply updates per vendor instructions.", + "short_description": "Microsoft Windows Server 2003 R2 contains a buffer overflow vulnerability in Internet Information Services (IIS) 6.0 which allows remote attackers to execute code via a long header beginning with \"If: