CVE
stringlengths 13
16
| CVSS3
float64 3.1
10
⌀ | EPSS
float64 0
0.98
| EPSS Percentile
float64 0
1
| Description
stringlengths 55
567
|
---|---|---|---|---|
CVE-2011-2005 | null | 0.00079 | 0.34134 | afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application. |
CVE-2010-4398 | null | 0.00043 | 0.09681 | Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature. |
CVE-2022-26871 | 9.8 | 0.16792 | 0.96067 | An arbitrary file upload vulnerability in Trend Micro Apex Central could allow for remote code execution. |
CVE-2022-1040 | 9.8 | 0.97418 | 0.99936 | An authentication bypass vulnerability in User Portal and Webadmin of Sophos Firewall allows for remote code execution. |
CVE-2021-34484 | 7.8 | 0.07365 | 0.94099 | Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2021-28799 | 9.8 | 0.87991 | 0.98681 | QNAP NAS running HBS 3 contains an improper authorization vulnerability which can allow remote attackers to log in to a device. |
CVE-2021-21551 | 7.8 | 0.00301 | 0.69625 | Dell dbutil driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial-of-service (DoS), or information disclosure. |
CVE-2018-10562 | 9.8 | 0.97423 | 0.99937 | Dasan GPON Routers contain an authentication bypass vulnerability. When combined with CVE-2018-10561, exploitation can allow an attacker to perform remote code execution. |
CVE-2018-10561 | 9.8 | 0.97083 | 0.99776 | Dasan GPON Routers contain an authentication bypass vulnerability. When combined with CVE-2018-10562, exploitation can allow an attacker to perform remote code execution. |
CVE-2022-22965 | 9.8 | 0.97483 | 0.99973 | Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. |
CVE-2022-22675 | 7.8 | 0.0014 | 0.49734 | macOS Monterey contains an out-of-bounds write vulnerability that could allow an application to execute arbitrary code with kernel privileges. |
CVE-2022-22674 | 5.5 | 0.00062 | 0.26471 | macOS Monterey contains an out-of-bounds read vulnerability that could allow an application to read kernel memory. |
CVE-2021-45382 | 9.8 | 0.96916 | 0.9972 | A remote code execution vulnerability exists in all series H/W revisions routers via the DDNS function in ncc2 binary file. |
CVE-2021-3156 | 7.8 | 0.96952 | 0.99731 | Sudo contains an off-by-one error that can result in a heap-based buffer overflow, which allows for privilege escalation. |
CVE-2021-31166 | 9.8 | 0.97319 | 0.99879 | Microsoft HTTP Protocol Stack contains a vulnerability in http.sys that allows for remote code execution. |
CVE-2017-0148 | 8.1 | 0.97149 | 0.99806 | The SMBv1 server in Microsoft allows remote attackers to execute arbitrary code via crafted packets. |
CVE-2022-23176 | 8.8 | 0.01564 | 0.87268 | WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access. |
CVE-2021-42287 | 7.5 | 0.90435 | 0.98824 | Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2021-42278 | 7.5 | 0.585 | 0.97747 | Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2021-39793 | 7.8 | 0.00066 | 0.29168 | Google Pixel contains a possible out-of-bounds write due to a logic error in the code that could lead to local escalation of privilege. |
CVE-2021-27852 | 9.8 | 0.01562 | 0.87253 | Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code. |
CVE-2021-22600 | 7 | 0.00067 | 0.29412 | Linux Kernel contains a flaw in the packet socket (AF_PACKET) implementation which could lead to incorrectly freeing memory. A local user could exploit this for denial-of-service (DoS) or possibly for privilege escalation. |
CVE-2020-2509 | 9.8 | 0.00246 | 0.64759 | QNAP NAS devices contain a command injection vulnerability which could allow attackers to perform remote code execution. |
CVE-2017-11317 | 9.8 | 0.15702 | 0.95964 | Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX allows remote attackers to perform arbitrary file uploads or execute arbitrary code. |
CVE-2022-24521 | 7.8 | 0.00044 | 0.13238 | Microsoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2018-7602 | 9.8 | 0.97356 | 0.99901 | A remote code execution vulnerability exists within multiple subsystems of Drupal that can allow attackers to exploit multiple attack vectors on a Drupal site. |
CVE-2018-20753 | 9.8 | 0.10259 | 0.94974 | Kaseya VSA RMM allows unprivileged remote attackers to execute PowerShell payloads on all managed devices. |
CVE-2015-5123 | null | 0.27389 | 0.96818 | Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS). |
CVE-2015-5122 | null | 0.97314 | 0.99877 | Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS). |
CVE-2015-3113 | null | 0.96082 | 0.99504 | Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code. |
CVE-2015-2502 | null | 0.59435 | 0.97769 | Microsoft Internet Explorer contains a memory corruption vulnerability that allows an attacker to execute code or cause a denial-of-service (DoS). |
CVE-2015-0313 | null | 0.9729 | 0.99863 | Use-after-free vulnerability in Adobe Flash Player allows remote attackers to execute code. |
CVE-2015-0311 | null | 0.97275 | 0.99857 | Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute code. |
CVE-2014-9163 | null | 0.07307 | 0.94077 | Stack-based buffer overflow in Adobe Flash Player allows attackers to execute code remotely. |
CVE-2022-22954 | 9.8 | 0.97405 | 0.99927 | VMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection. |
CVE-2022-22960 | 7.8 | 0.00078 | 0.3337 | VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts. |
CVE-2022-1364 | 8.8 | 0.02049 | 0.89023 | Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. |
CVE-2019-3929 | 9.8 | 0.97359 | 0.99903 | Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. |
CVE-2019-16057 | 9.8 | 0.97561 | 0.99999 | The login_mgr.cgi script in D-Link DNS-320 is vulnerable to remote code execution. |
CVE-2018-7841 | 9.8 | 0.01227 | 0.8541 | A SQL Injection vulnerability exists in U.motion Builder software which could cause unwanted code execution when an improper set of characters is entered. |
CVE-2016-4523 | 7.5 | 0.27062 | 0.96802 | The WAP interface in Trihedral VTScada (formerly VTS) allows remote attackers to cause a denial-of-service (DoS). |
CVE-2014-0780 | null | 0.96383 | 0.99571 | InduSoft Web Studio NTWebServer contains a directory traversal vulnerability that allows remote attackers to read administrative passwords in APP files, allowing for remote code execution. |
CVE-2010-5330 | 9.8 | 0.02693 | 0.90494 | Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi. |
CVE-2007-3010 | null | 0.97313 | 0.99876 | masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands. |
CVE-2018-6882 | 6.1 | 0.00749 | 0.81031 | Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that might allow remote attackers to inject arbitrary web script or HTML. |
CVE-2019-3568 | 9.8 | 0.02813 | 0.90685 | A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. |
CVE-2022-22718 | 7.8 | 0.00343 | 0.7163 | Microsoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation. |
CVE-2022-29464 | 9.8 | 0.97306 | 0.99871 | Multiple WSO2 products allow for unrestricted file upload, resulting in remote code execution. |
CVE-2022-26904 | 7 | 0.00102 | 0.41808 | Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2022-21919 | 7 | 0.00202 | 0.58354 | Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2022-0847 | 7.8 | 0.07584 | 0.94157 | Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe." |
CVE-2021-41357 | 7.8 | 0.00654 | 0.79547 | Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2021-40450 | 7.8 | 0.00654 | 0.79547 | Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2019-1003029 | 9.9 | 0.00941 | 0.83144 | Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox. |
CVE-2021-1789 | 8.8 | 0.00821 | 0.81933 | A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution. |
CVE-2019-8506 | 8.8 | 0.06777 | 0.93888 | A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution. |
CVE-2014-4113 | null | 0.02281 | 0.89676 | Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2014-0322 | null | 0.97382 | 0.99911 | Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code. |
CVE-2014-0160 | 7.5 | 0.9746 | 0.99959 | The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information. |
CVE-2022-1388 | 9.8 | 0.9748 | 0.99971 | F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services. |
CVE-2022-30525 | 9.8 | 0.97456 | 0.99957 | A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device. |
CVE-2022-22947 | 10 | 0.97478 | 0.9997 | Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. |
CVE-2022-20821 | 6.5 | 0.00367 | 0.72576 | Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container. |
CVE-2021-1048 | 7.8 | 0.00064 | 0.27749 | Android kernel contains a use-after-free vulnerability that allows for privilege escalation. |
CVE-2021-0920 | 6.4 | 0.00064 | 0.27922 | Android kernel contains a race condition, which allows for a use-after-free vulnerability. Exploitation can allow for privilege escalation. |
CVE-2021-30883 | 7.8 | 0.0027 | 0.67913 | Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution. |
CVE-2020-1027 | 7.8 | 0.00072 | 0.31309 | An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. |
CVE-2020-0638 | 7.8 | 0.00069 | 0.30078 | Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation. |
CVE-2019-7286 | 7.8 | 0.00339 | 0.71462 | Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation. |
CVE-2019-7287 | 7.8 | 0.00125 | 0.4721 | Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution. |
CVE-2019-0676 | 6.5 | 0.01989 | 0.88841 | An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk. |
CVE-2019-5786 | 6.5 | 0.97223 | 0.9984 | Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page. |
CVE-2019-0703 | 6.5 | 0.00207 | 0.58826 | An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server. |
CVE-2019-0880 | 7.8 | 0.00042 | 0.05192 | A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. |
CVE-2019-13720 | 8.8 | 0.9742 | 0.99937 | Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
CVE-2019-11707 | 8.8 | 0.7517 | 0.98163 | Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash. |
CVE-2019-11708 | 10 | 0.00822 | 0.8195 | Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution. |
CVE-2019-8720 | 8.8 | 0.00706 | 0.80423 | WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution. |
CVE-2019-18426 | 8.2 | 0.00936 | 0.83105 | A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading. |
CVE-2019-1385 | 7.8 | 0.00281 | 0.68553 | A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. |
CVE-2019-1130 | 7.8 | 0.87735 | 0.98667 | A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. |
CVE-2018-5002 | 9.8 | 0.03103 | 0.91077 | Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution. |
CVE-2018-8589 | 7.8 | 0.00101 | 0.41789 | A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system. |
CVE-2018-8611 | 7.8 | 0.00061 | 0.26159 | A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory. |
CVE-2018-19953 | 6.1 | 0.00379 | 0.72984 | A cross-site scripting vulnerability affecting QNAP NAS File Station could allow remote attackers to inject malicious code. |
CVE-2018-19949 | 9.8 | 0.00672 | 0.79883 | A command injection vulnerability affecting QNAP NAS File Station could allow remote attackers to run commands. |
CVE-2018-19943 | 5.4 | 0.00176 | 0.54864 | A cross-site scripting vulnerability affecting QNAP NAS File Station could allow remote attackers to inject malicious code. |
CVE-2017-0147 | 5.9 | 0.97112 | 0.9979 | The SMBv1 server in Microsoft Windows allows remote attackers to obtain sensitive information from process memory via a crafted packet. |
CVE-2017-0022 | 4.3 | 0.96787 | 0.99685 | Microsoft XML Core Services (MSXML) improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site. |
CVE-2017-0005 | 7 | 0.00136 | 0.49079 | The Graphics Device Interface (GDI) in Microsoft Windows allows local users to gain privileges via a crafted application. |
CVE-2017-0149 | 7.5 | 0.09474 | 0.9475 | Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS) via a crafted website. |
CVE-2017-0210 | 4.3 | 0.00397 | 0.73535 | A privilege escalation vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information. |
CVE-2017-8291 | 7.8 | 0.25459 | 0.96721 | Artifex Ghostscript allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile. |
CVE-2017-8543 | 9.8 | 0.39628 | 0.97272 | Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory. |
CVE-2017-18362 | 9.8 | 0.04496 | 0.92496 | ConnectWise ManagedITSync integration for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. |
CVE-2016-0162 | 4.3 | 0.05124 | 0.92985 | An information disclosure vulnerability exists when Internet Explorer does not properly handle JavaScript. The vulnerability could allow an attacker to detect specific files on the user's computer. |
CVE-2016-3351 | 3.1 | 0.10115 | 0.94944 | An information disclosure vulnerability exists in the way that certain functions in Internet Explorer and Edge handle objects in memory. The vulnerability could allow an attacker to detect specific files on the user's computer. |
CVE-2016-4655 | 5.5 | 0.86291 | 0.98597 | The Apple iOS kernel allows attackers to obtain sensitive information from memory via a crafted application. |
CVE-2016-4656 | 7.8 | 0.00643 | 0.79329 | A memory corruption vulnerability in Apple iOS kernel allows attackers to execute code in a privileged context or cause a denial-of-service (DoS) via a crafted application. |
CVE-2016-4657 | 8.8 | 0.87543 | 0.98657 | Apple iOS WebKit contains a memory corruption vulnerability that allows attackers to execute remote code or cause a denial-of-service (DoS) via a crafted web site. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing. |
Subsets and Splits