CVE
stringlengths
13
16
CVSS3
float64
3.1
10
EPSS
float64
0
0.98
EPSS Percentile
float64
0
1
Description
stringlengths
55
567
CVE-2011-2005
null
0.00079
0.34134
afd.sys in the Ancillary Function Driver in Microsoft Windows does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application.
CVE-2010-4398
null
0.00043
0.09681
Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows allows local users to gain privileges, and bypass the User Account Control (UAC) feature.
CVE-2022-26871
9.8
0.16792
0.96067
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow for remote code execution.
CVE-2022-1040
9.8
0.97418
0.99936
An authentication bypass vulnerability in User Portal and Webadmin of Sophos Firewall allows for remote code execution.
CVE-2021-34484
7.8
0.07365
0.94099
Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.
CVE-2021-28799
9.8
0.87991
0.98681
QNAP NAS running HBS 3 contains an improper authorization vulnerability which can allow remote attackers to log in to a device.
CVE-2021-21551
7.8
0.00301
0.69625
Dell dbutil driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial-of-service (DoS), or information disclosure.
CVE-2018-10562
9.8
0.97423
0.99937
Dasan GPON Routers contain an authentication bypass vulnerability. When combined with CVE-2018-10561, exploitation can allow an attacker to perform remote code execution.
CVE-2018-10561
9.8
0.97083
0.99776
Dasan GPON Routers contain an authentication bypass vulnerability. When combined with CVE-2018-10562, exploitation can allow an attacker to perform remote code execution.
CVE-2022-22965
9.8
0.97483
0.99973
Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.
CVE-2022-22675
7.8
0.0014
0.49734
macOS Monterey contains an out-of-bounds write vulnerability that could allow an application to execute arbitrary code with kernel privileges.
CVE-2022-22674
5.5
0.00062
0.26471
macOS Monterey contains an out-of-bounds read vulnerability that could allow an application to read kernel memory.
CVE-2021-45382
9.8
0.96916
0.9972
A remote code execution vulnerability exists in all series H/W revisions routers via the DDNS function in ncc2 binary file.
CVE-2021-3156
7.8
0.96952
0.99731
Sudo contains an off-by-one error that can result in a heap-based buffer overflow, which allows for privilege escalation.
CVE-2021-31166
9.8
0.97319
0.99879
Microsoft HTTP Protocol Stack contains a vulnerability in http.sys that allows for remote code execution.
CVE-2017-0148
8.1
0.97149
0.99806
The SMBv1 server in Microsoft allows remote attackers to execute arbitrary code via crafted packets.
CVE-2022-23176
8.8
0.01564
0.87268
WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access.
CVE-2021-42287
7.5
0.90435
0.98824
Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation.
CVE-2021-42278
7.5
0.585
0.97747
Microsoft Active Directory Domain Services contains an unspecified vulnerability that allows for privilege escalation.
CVE-2021-39793
7.8
0.00066
0.29168
Google Pixel contains a possible out-of-bounds write due to a logic error in the code that could lead to local escalation of privilege.
CVE-2021-27852
9.8
0.01562
0.87253
Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code.
CVE-2021-22600
7
0.00067
0.29412
Linux Kernel contains a flaw in the packet socket (AF_PACKET) implementation which could lead to incorrectly freeing memory. A local user could exploit this for denial-of-service (DoS) or possibly for privilege escalation.
CVE-2020-2509
9.8
0.00246
0.64759
QNAP NAS devices contain a command injection vulnerability which could allow attackers to perform remote code execution.
CVE-2017-11317
9.8
0.15702
0.95964
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
CVE-2022-24521
7.8
0.00044
0.13238
Microsoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege escalation.
CVE-2018-7602
9.8
0.97356
0.99901
A remote code execution vulnerability exists within multiple subsystems of Drupal that can allow attackers to exploit multiple attack vectors on a Drupal site.
CVE-2018-20753
9.8
0.10259
0.94974
Kaseya VSA RMM allows unprivileged remote attackers to execute PowerShell payloads on all managed devices.
CVE-2015-5123
null
0.27389
0.96818
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS).
CVE-2015-5122
null
0.97314
0.99877
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS).
CVE-2015-3113
null
0.96082
0.99504
Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code.
CVE-2015-2502
null
0.59435
0.97769
Microsoft Internet Explorer contains a memory corruption vulnerability that allows an attacker to execute code or cause a denial-of-service (DoS).
CVE-2015-0313
null
0.9729
0.99863
Use-after-free vulnerability in Adobe Flash Player allows remote attackers to execute code.
CVE-2015-0311
null
0.97275
0.99857
Unspecified vulnerability in Adobe Flash Player allows remote attackers to execute code.
CVE-2014-9163
null
0.07307
0.94077
Stack-based buffer overflow in Adobe Flash Player allows attackers to execute code remotely.
CVE-2022-22954
9.8
0.97405
0.99927
VMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection.
CVE-2022-22960
7.8
0.00078
0.3337
VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.
CVE-2022-1364
8.8
0.02049
0.89023
Google Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2019-3929
9.8
0.97359
0.99903
Multiple Crestron products are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
CVE-2019-16057
9.8
0.97561
0.99999
The login_mgr.cgi script in D-Link DNS-320 is vulnerable to remote code execution.
CVE-2018-7841
9.8
0.01227
0.8541
A SQL Injection vulnerability exists in U.motion Builder software which could cause unwanted code execution when an improper set of characters is entered.
CVE-2016-4523
7.5
0.27062
0.96802
The WAP interface in Trihedral VTScada (formerly VTS) allows remote attackers to cause a denial-of-service (DoS).
CVE-2014-0780
null
0.96383
0.99571
InduSoft Web Studio NTWebServer contains a directory traversal vulnerability that allows remote attackers to read administrative passwords in APP files, allowing for remote code execution.
CVE-2010-5330
9.8
0.02693
0.90494
Certain Ubiquiti devices contain a command injection vulnerability via a GET request to stainfo.cgi.
CVE-2007-3010
null
0.97313
0.99876
masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server allows remote attackers to execute arbitrary commands.
CVE-2018-6882
6.1
0.00749
0.81031
Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that might allow remote attackers to inject arbitrary web script or HTML.
CVE-2019-3568
9.8
0.02813
0.90685
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number.
CVE-2022-22718
7.8
0.00343
0.7163
Microsoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation.
CVE-2022-29464
9.8
0.97306
0.99871
Multiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.
CVE-2022-26904
7
0.00102
0.41808
Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.
CVE-2022-21919
7
0.00202
0.58354
Microsoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.
CVE-2022-0847
7.8
0.07584
0.94157
Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."
CVE-2021-41357
7.8
0.00654
0.79547
Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
CVE-2021-40450
7.8
0.00654
0.79547
Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
CVE-2019-1003029
9.9
0.00941
0.83144
Jenkins Script Security Plugin contains a protection mechanism failure, allowing an attacker to bypass the sandbox.
CVE-2021-1789
8.8
0.00821
0.81933
A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.
CVE-2019-8506
8.8
0.06777
0.93888
A type confusion issue affecting multiple Apple products allows processing of maliciously crafted web content, leading to arbitrary code execution.
CVE-2014-4113
null
0.02281
0.89676
Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.
CVE-2014-0322
null
0.97382
0.99911
Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute code.
CVE-2014-0160
7.5
0.9746
0.99959
The TLS and DTLS implementations in OpenSSL do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information.
CVE-2022-1388
9.8
0.9748
0.99971
F5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.
CVE-2022-30525
9.8
0.97456
0.99957
A command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.
CVE-2022-22947
10
0.97478
0.9997
Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.
CVE-2022-20821
6.5
0.00367
0.72576
Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.
CVE-2021-1048
7.8
0.00064
0.27749
Android kernel contains a use-after-free vulnerability that allows for privilege escalation.
CVE-2021-0920
6.4
0.00064
0.27922
Android kernel contains a race condition, which allows for a use-after-free vulnerability. Exploitation can allow for privilege escalation.
CVE-2021-30883
7.8
0.0027
0.67913
Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for remote code execution.
CVE-2020-1027
7.8
0.00072
0.31309
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
CVE-2020-0638
7.8
0.00069
0.30078
Microsoft Update Notification Manager contains an unspecified vulnerability that allows for privilege escalation.
CVE-2019-7286
7.8
0.00339
0.71462
Apple iOS, macOS, watchOS, and tvOS contain a memory corruption vulnerability that could allow for privilege escalation.
CVE-2019-7287
7.8
0.00125
0.4721
Apple iOS contains a memory corruption vulnerability which could allow an attacker to perform remote code execution.
CVE-2019-0676
6.5
0.01989
0.88841
An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.
CVE-2019-5786
6.5
0.97223
0.9984
Google Chrome Blink contains a heap use-after-free vulnerability that allows an attacker to potentially perform out of bounds memory access via a crafted HTML page.
CVE-2019-0703
6.5
0.00207
0.58826
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclosure from the server.
CVE-2019-0880
7.8
0.00042
0.05192
A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity.
CVE-2019-13720
8.8
0.9742
0.99937
Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2019-11707
8.8
0.7517
0.98163
Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop, allowing for an exploitable crash.
CVE-2019-11708
10
0.00822
0.8195
Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.
CVE-2019-8720
8.8
0.00706
0.80423
WebKitGTK contains a memory corruption vulnerability which can allow an attacker to perform remote code execution.
CVE-2019-18426
8.2
0.00936
0.83105
A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading.
CVE-2019-1385
7.8
0.00281
0.68553
A privilege escalation vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.
CVE-2019-1130
7.8
0.87735
0.98667
A privilege escalation vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links.
CVE-2018-5002
9.8
0.03103
0.91077
Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution.
CVE-2018-8589
7.8
0.00101
0.41789
A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerability could run remote code in the security context of the local system.
CVE-2018-8611
7.8
0.00061
0.26159
A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory.
CVE-2018-19953
6.1
0.00379
0.72984
A cross-site scripting vulnerability affecting QNAP NAS File Station could allow remote attackers to inject malicious code.
CVE-2018-19949
9.8
0.00672
0.79883
A command injection vulnerability affecting QNAP NAS File Station could allow remote attackers to run commands.
CVE-2018-19943
5.4
0.00176
0.54864
A cross-site scripting vulnerability affecting QNAP NAS File Station could allow remote attackers to inject malicious code.
CVE-2017-0147
5.9
0.97112
0.9979
The SMBv1 server in Microsoft Windows allows remote attackers to obtain sensitive information from process memory via a crafted packet.
CVE-2017-0022
4.3
0.96787
0.99685
Microsoft XML Core Services (MSXML) improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site.
CVE-2017-0005
7
0.00136
0.49079
The Graphics Device Interface (GDI) in Microsoft Windows allows local users to gain privileges via a crafted application.
CVE-2017-0149
7.5
0.09474
0.9475
Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS) via a crafted website.
CVE-2017-0210
4.3
0.00397
0.73535
A privilege escalation vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information.
CVE-2017-8291
7.8
0.25459
0.96721
Artifex Ghostscript allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile.
CVE-2017-8543
9.8
0.39628
0.97272
Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory.
CVE-2017-18362
9.8
0.04496
0.92496
ConnectWise ManagedITSync integration for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database.
CVE-2016-0162
4.3
0.05124
0.92985
An information disclosure vulnerability exists when Internet Explorer does not properly handle JavaScript. The vulnerability could allow an attacker to detect specific files on the user's computer.
CVE-2016-3351
3.1
0.10115
0.94944
An information disclosure vulnerability exists in the way that certain functions in Internet Explorer and Edge handle objects in memory. The vulnerability could allow an attacker to detect specific files on the user's computer.
CVE-2016-4655
5.5
0.86291
0.98597
The Apple iOS kernel allows attackers to obtain sensitive information from memory via a crafted application.
CVE-2016-4656
7.8
0.00643
0.79329
A memory corruption vulnerability in Apple iOS kernel allows attackers to execute code in a privileged context or cause a denial-of-service (DoS) via a crafted application.
CVE-2016-4657
8.8
0.87543
0.98657
Apple iOS WebKit contains a memory corruption vulnerability that allows attackers to execute remote code or cause a denial-of-service (DoS) via a crafted web site. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.