cve,vendor_name,epss,severity_score,exploit_poc_availability,vuln_prod_hw,vuln_prod_app,vuln_prod_os,vulnerability_type,cve_published_date,patch_availability,patch_release_date,advice_availability,advice_release_date,patch_timeliness,description,cvss_vector,attack_vector,attack_complexity,privileges_required,user_interaction,scope,confidentiality_impact,integrity_impact,availability_impact,base_severity,exploitability_score,impact_score,weaknesses,cpe,total_exploits,verified_exploits CVE-2016-0002,Microsoft,0.79612,7.5,0.0,0.0,1.0,0.0,1,2016-01-13,1.0,2016-02-19,,,0.0,"The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code via a crafted web site, aka ""Scripting Engine Memory Corruption Vulnerability.""",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-119'],,0,0 CVE-2016-0003,Microsoft,0.95183,9.6,0.0,0.0,1.0,0.0,1,2016-01-13,1.0,2015-12-08,,,1.0,"Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka ""Microsoft Edge Memory Corruption Vulnerability.""",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.8,6.0,['CWE-119'],['cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*'],0,0 CVE-2016-4447,Microsoft,0.0016,7.5,0.0,0.0,0.0,1.0,1,2016-06-09,0.0,,0.0,,,"The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:12.4.1:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*']",0,0 CVE-2016-4448,Microsoft,0.01018,9.8,0.0,0.0,0.0,1.0,1,2016-06-09,0.0,,0.0,,,Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-134'],"['cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:log_correlation_engine:4.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*']",0,0 CVE-2016-6914,Microsoft,0.00062,7.8,1.0,0.0,0.0,1.0,1,2017-12-27,0.0,,0.0,,,"Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-276'],"['cpe:2.3:a:ui:unifi_video:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*']",1,0 CVE-2016-7225,Microsoft,0.00046,6.1,1.0,0.0,0.0,1.0,1,2016-11-10,1.0,2016-10-31,,,1.0,"Virtual Hard Disk Driver in Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka ""VHD Driver Elevation of Privilege Vulnerability.""",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,HIGH,NONE,MEDIUM,1.8,4.2,['CWE-284'],"['cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*']",1,1 CVE-2016-7081,Microsoft,0.00135,7.8,0.0,0.0,0.0,1.0,0,2016-12-29,0.0,,0.0,,,"Multiple heap-based buffer overflows in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.",CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H,LOCAL,HIGH,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.1,6.0,['CWE-119'],"['cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*']",0,0 CVE-2017-0064,Microsoft,0.00232,6.5,0.0,0.0,1.0,0.0,0,2017-05-12,1.0,2017-05-09,,,1.0,"A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka ""Internet Explorer Security Feature Bypass Vulnerability.""",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*']",0,0 CVE-2018-17653,Microsoft,0.01175,8.8,0.0,0.0,0.0,1.0,0,2019-01-24,0.0,,0.0,,,This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode method of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6503.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2018-18098,Microsoft,0.00044,7.3,0.0,0.0,0.0,1.0,0,2019-01-10,0.0,,0.0,,,Improper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows before 2.2.100 may allow an escalation of privilege via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.3,5.9,['CWE-732'],"['cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:sgx_platform_software:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:*:*:*']",0,0 CVE-2018-21026,Microsoft,0.00273,7.5,0.0,0.0,0.0,1.0,0,2019-11-12,0.0,,0.0,,,A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.6.5-00 allows an unauthenticated remote user to read internal information.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:replication_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:*']",0,0 CVE-2018-7250,Microsoft,0.00069,5.5,0.0,0.0,0.0,1.0,0,2018-02-26,0.0,,0.0,,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-200'],"['cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tivo:safedisc:-:*:*:*:*:*:*:*']",0,0 CVE-2018-8239,Microsoft,0.00604,5.5,0.0,0.0,0.0,1.0,0,2018-06-14,1.0,2018-06-12,,,1.0,"An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka ""Windows GDI Information Disclosure Vulnerability."" This affects Windows Server 2016, Windows 10, Windows 10 Servers.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-200'],"['cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*']",0,0 CVE-2018-8447,Microsoft,0.13667,7.5,0.0,0.0,1.0,1.0,0,2018-09-13,1.0,2018-09-11,,,1.0,"A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka ""Internet Explorer Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8461.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*']",0,0 CVE-2018-8513,Microsoft,0.08351,7.5,0.0,0.0,1.0,1.0,0,2018-10-10,1.0,2018-10-09,,,1.0,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka ""Chakra Scripting Engine Memory Corruption Vulnerability."" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8510, CVE-2018-8511.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0 CVE-2018-8653,Microsoft,0.02264,7.5,0.0,0.0,1.0,1.0,0,2018-12-20,1.0,2018-12-19,,,1.0,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka ""Scripting Engine Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8643.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*', 'cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0 CVE-2019-1351,Microsoft,0.00255,7.5,0.0,0.0,1.0,0.0,0,2020-01-24,1.0,2019-12-10,,,1.0,"A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-706'],"['cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*']",0,0 CVE-2019-4057,Microsoft,0.00044,6.7,0.0,0.0,0.0,1.0,0,2019-07-01,0.0,,0.0,,,"IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow malicious user with access to the DB2 instance account to leverage a fenced execution process to execute arbitrary code as root. IBM X-Force ID: 156567.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:db2:9.7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.10:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.3.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.4.4:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2019-4738,Microsoft,0.00057,6.5,0.0,0.0,0.0,1.0,0,2020-12-10,1.0,2020-07-22,,,1.0,IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.1 discloses sensitive information to an authenticated user from the dashboard UI which could be used in further attacks against the system. IBM X-Force ID: 172753.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-312'],"['cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*', 'cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*', 'cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*']",0,0 CVE-2019-6748,Microsoft,0.0027,7.8,0.0,0.0,0.0,1.0,0,2019-06-03,0.0,,0.0,,,"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7637.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2019-7069,Microsoft,0.00566,8.8,0.0,0.0,0.0,1.0,0,2019-05-24,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2019-7814,Microsoft,0.05642,8.8,0.0,0.0,0.0,1.0,0,2019-05-22,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2019-8002,Microsoft,0.00239,7.5,0.0,0.0,0.0,1.0,0,2019-08-20,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2019-8021,Microsoft,0.00239,7.5,0.0,0.0,0.0,1.0,0,2019-08-20,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2020-0664,Microsoft,0.00869,6.5,0.0,0.0,0.0,1.0,0,2020-09-11,1.0,2020-09-08,,,1.0,"

An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.

To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise a system. However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system.

The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.

",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0 CVE-2020-1327,Microsoft,0.00123,6.1,0.0,0.0,0.0,1.0,0,2020-06-09,1.0,2020-06-09,,,1.0,"A spoofing vulnerability exists in Microsoft Azure DevOps Server when it fails to properly handle web requests, aka 'Azure DevOps Server HTML Injection Vulnerability'.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:microsoft:azure_devops_server:2019:update1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:azure_devops_server:2019:update1.1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:*:*:*:*:*:*:*']",0,0 CVE-2020-1366,Microsoft,0.00043,7.8,0.0,0.0,0.0,1.0,0,2020-07-14,1.0,2020-07-14,,,1.0,"An elevation of privilege vulnerability exists when the Windows Print Workflow Service improperly handles objects in memory, aka 'Windows Print Workflow Service Elevation of Privilege Vulnerability'.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0 CVE-2020-1452,Microsoft,0.0067,8.6,0.0,0.0,1.0,0.0,0,2020-09-11,1.0,2020-09-08,,,1.0,"

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.

Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.

The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.

",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,HIGH,LOW,HIGH,3.9,4.7,['CWE-494'],"['cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*']",0,0 CVE-2020-3927,Microsoft,0.00071,7.5,0.0,0.0,0.0,1.0,0,2020-02-03,0.0,,0.0,,,"An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-552'],"['cpe:2.3:a:changingtec:servisign:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2020-4414,Microsoft,0.00042,4.4,0.0,0.0,0.0,1.0,0,2020-07-01,1.0,2020-12-10,,,0.0,"IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local attacker to perform unauthorized actions on the system, caused by improper usage of shared memory. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service. IBM X-Force ID: 179989.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,NONE,LOW,MEDIUM,1.8,2.5,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:db2:9.7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2020-4842,Microsoft,0.00196,4.9,0.0,0.0,0.0,1.0,0,2020-12-21,1.0,2020-09-16,,,1.0,IBM Security Secret Server 10.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190046.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-209'],"['cpe:2.3:a:ibm:security_secret_server:10.6:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2020-4935,Microsoft,0.0005,5.4,0.0,0.0,0.0,1.0,0,2021-07-01,1.0,2021-06-30,,,1.0,IBM Datacap Fastdoc Capture (IBM Datacap Navigator 9.1.7 ) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191753.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:a:ibm:datacap_navigator:9.1.7:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2020-6938,Microsoft,0.00149,7.5,0.0,0.0,0.0,1.0,0,2020-07-08,0.0,,0.0,,,"A sensitive information disclosure vulnerability in Tableau Server 10.5, 2018.x, 2019.x, 2020.x released before June 26, 2020, could allow access to sensitive information in log files.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-532'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tableau:tableau_server:10.5:*:*:*:*:*:*:*']",0,0 CVE-2020-8844,Microsoft,0.54609,7.8,0.0,0.0,0.0,1.0,0,2020-02-14,0.0,,0.0,,,"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG files within CovertToPDF. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9102.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2021-0076,Microsoft,0.00044,5.5,0.0,0.0,0.0,1.0,0,2022-02-09,0.0,,0.0,,,"Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2021-1051,Microsoft,0.00042,8.4,0.0,0.0,0.0,1.0,0,2021-01-08,0.0,,0.0,,,"NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a local user can get elevated privileges to modify display configuration data, which may result in denial of service of the display.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H,LOCAL,LOW,LOW,NONE,CHANGED,NONE,HIGH,HIGH,HIGH,2.0,5.8,['CWE-269'],"['cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*']",0,0 CVE-2021-1088,Microsoft,0.00044,4.4,0.0,0.0,0.0,1.0,0,2021-11-20,0.0,,0.0,,,"NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to utilize debug mechanisms with insufficient access control, which may lead to information disclosure.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.8,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-1_p100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-1_v100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx_station_a100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:drive_constellation:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_605:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_625:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_635:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_705:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_720:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_740:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1050_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1070_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1080_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1650_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_645:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650_ti_boost:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_660_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_670:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_680:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_690:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_745:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_750_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_760:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_760_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_770:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_780:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_780_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_980:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_titan_x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2060:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2060_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2070:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2070_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan_black:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan_z:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:-:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:developer_kit:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:developer_kit:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:production:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_hgx-2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_gv100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p2200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p3200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p4200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p5200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_8000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:shield_tv_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m40:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p40:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_v100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_v100s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_rtx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_xp:-:*:*:*:*:*:*:*']",0,0 CVE-2021-1492,Microsoft,0.00042,7.1,0.0,0.0,0.0,1.0,0,2021-03-25,0.0,,0.0,,,"The Duo Authentication Proxy installer prior to 5.2.1 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Duo Authentication Proxy installer, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. This is only exploitable during new installations, while the installer is running, and is not exploitable once installation has finished. Versions 5.2.1 of Duo Authentication Proxy installer addresses this issue.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,1.8,5.2,['CWE-64'],"['cpe:2.3:a:duo:authentication_proxy:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2022-2188,Microsoft,0.00042,5.5,0.0,0.0,0.0,1.0,0,2022-11-07,1.0,2022-06-29,,,1.0,"Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker. ",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-732'],"['cpe:2.3:a:mcafee:data_exchange_layer:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2022-22319,Microsoft,0.00096,5.4,0.0,0.0,0.0,1.0,0,2022-05-09,1.0,2022-04-01,,,1.0,IBM Robotic Process Automation 21.0.1 could allow a register user on the system to physically delete a queue that could cause disruption for any scripts dependent on the queue. IBM X-Force ID: 218366.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,LOW,LOW,MEDIUM,2.8,2.5,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:robotic_process_automation:21.0.1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:robotic_process_automation_as_a_service:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2022-23764,Microsoft,0.0048,9.8,0.0,0.0,0.0,1.0,0,2022-08-17,0.0,,0.0,,,"The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-346'],"['cpe:2.3:a:teruten:webcube:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0 CVE-2016-0862,General Electric,0.00184,6.5,1.0,1.0,0.0,1.0,1,2016-02-05,1.0,2018-08-23,,,0.0,General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to obtain sensitive cleartext account information via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:ge:snmp\\/web_adapter_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024746:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024747:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024748:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024921:-:*:*:*:*:*:*:*']",1,1 CVE-2016-2310,General Electric,0.00423,9.8,0.0,1.0,0.0,1.0,1,2016-06-09,1.0,2016-06-07,,,1.0,"General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml1600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml2400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml800:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml3100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*']",0,0 CVE-2016-5788,General Electric,0.00637,10.0,0.0,1.0,0.0,1.0,1,2016-11-25,1.0,2016-10-16,,,1.0,"General Electric (GE) Bently Nevada 3500/22M USB with firmware before 5.0 and Bently Nevada 3500/22M Serial have open ports, which makes it easier for remote attackers to obtain privileged access via unspecified vectors.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,['CWE-254'],"['cpe:2.3:o:ge:bently_nevada_3500\\/22m_usb_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:bently_nevada_3500\\/22m_usb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:bently_nevada_3500\\/22m_serial_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:bently_nevada_3500\\/22m_serial:-:*:*:*:*:*:*:*']",0,0 CVE-2016-9360,General Electric,0.00067,6.7,0.0,0.0,1.0,0.0,1,2017-02-13,0.0,,0.0,,,"An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session.",CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L,LOCAL,HIGH,HIGH,NONE,CHANGED,HIGH,LOW,LOW,MEDIUM,0.8,5.3,['CWE-522'],"['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:historian:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*']",0,0 CVE-2017-12732,General Electric,0.00612,6.8,0.0,0.0,1.0,0.0,1,2017-10-05,0.0,,0.0,,,"A Stack-based Buffer Overflow issue was discovered in GE CIMPLICITY Versions 9.0 and prior. A function reads a packet to indicate the next packet length. The next packet length is not verified, allowing a buffer overwrite that could lead to an arbitrary remote code execution.",CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,"['CWE-119', 'CWE-121']",['cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:*:*:*:*:*:*:*:*'],0,0 CVE-2017-14002,General Electric,0.00231,9.8,0.0,1.0,0.0,1.0,1,2018-03-20,1.0,2018-03-13,,,1.0,GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']","['cpe:2.3:o:ge:infinia_hawkeye_4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:infinia_hawkeye_4:-:*:*:*:*:*:*:*']",0,0 CVE-2017-14006,General Electric,0.00355,9.8,0.0,0.0,1.0,0.0,1,2018-03-20,1.0,2018-03-13,,,1.0,"GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']","['cpe:2.3:a:ge:xeleris:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:3.1:*:*:*:*:*:*:*']",0,0 CVE-2017-7905,General Electric,0.00207,9.8,0.0,1.0,0.0,1.0,1,2017-06-30,0.0,,0.0,,,"A Weak Cryptography for Passwords issue was discovered in General Electric (GE) Multilin SR 750 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 760 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 469 Motor Protection Relay, firmware versions prior to Version 5.23; SR 489 Generator Protection Relay, firmware versions prior to Version 4.06; SR 745 Transformer Protection Relay, firmware versions prior to Version 5.23; SR 369 Motor Protection Relay, all firmware versions; Multilin Universal Relay, firmware Version 6.0 and prior versions; and Multilin URplus (D90, C90, B95), all versions. Ciphertext versions of user passwords were created with a non-random initialization vector leaving them susceptible to dictionary attacks. Ciphertext of user passwords can be obtained from the front LCD panel of affected products and through issued Modbus commands.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-326', 'CWE-261']","['cpe:2.3:o:ge:multilin_sr_750_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_750_feeder_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_760_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_760_feeder_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_469_motor_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_469_motor_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_489_generator_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_489_generator_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_745_transformer_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_745_transformer_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_369_motor_protection_relay_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_369_motor_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_universal_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_universal_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_d90_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_d90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_c90_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_c90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_b95_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_b95:-:*:*:*:*:*:*:*']",0,0 CVE-2018-10611,General Electric,0.03999,9.8,0.0,0.0,1.0,0.0,1,2018-06-04,1.0,2018-05-31,,,1.0,Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:enterprise:*:*:*']",0,0 CVE-2018-10615,General Electric,0.00168,8.1,0.0,0.0,1.0,0.0,1,2018-06-04,1.0,2018-05-31,,,1.0,Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,"['CWE-22', 'CWE-23']","['cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:enterprise:*:*:*']",0,0 CVE-2018-15362,General Electric,0.0028,9.1,0.0,0.0,1.0,0.0,1,2018-12-07,1.0,2018-12-06,,,1.0,"XXE in GE Proficy Cimplicity GDS versions 9.0 R2, 9.5, 10.0",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-611'],"['cpe:2.3:a:ge:cimplicity:9.0_r2:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:cimplicity:9.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:cimplicity:10.0:*:*:*:*:*:*:*']",0,0 CVE-2018-17925,General Electric,0.00044,4.8,0.0,0.0,1.0,0.0,1,2018-10-10,1.0,2017-06-30,,,1.0,"Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted.",CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,LOW,LOW,LOW,MEDIUM,1.3,3.4,"['NVD-CWE-noinfo', 'CWE-623']",['cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*'],0,0 CVE-2018-5473,General Electric,0.03792,9.8,0.0,1.0,0.0,1.0,1,2018-02-19,1.0,2018-02-12,,,1.0,An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. The SSH functions of the device are vulnerable to buffer overflow conditions that may allow a remote attacker to execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*']",0,0 CVE-2018-5475,General Electric,0.01753,9.8,0.0,1.0,0.0,1.0,1,2018-02-19,1.0,2018-02-12,,,1.0,"A Stack-based Buffer Overflow issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. Multiple stack-based buffer overflow vulnerabilities have been identified, which may allow remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*']",0,0 CVE-2018-8867,General Electric,0.00132,7.5,0.0,1.0,0.0,1.0,1,2018-05-18,1.0,2018-05-21,,,0.0,"In GE PACSystems RX3i CPE305/310 version 9.20 and prior, RX3i CPE330 version 9.21 and prior, RX3i CPE 400 version 9.30 and prior, PACSystems RSTi-EP CPE 100 all versions, and PACSystems CPU320/CRU320 RXi all versions, the device does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:ge:pacsystems_rx3i_cpe305_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rx3i_cpe305:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rx3i_cpe310_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rx3i_cpe310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rx3i_cpe330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rx3i_cpe330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rx3i_cpe_400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rx3i_cpe_400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rsti-ep_cpe_100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rsti-ep_cpe_100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_cpu320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_cpu320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_cru320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_cru320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rxi_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rxi:-:*:*:*:*:*:*:*']",0,0 CVE-2019-10966,General Electric,0.00073,5.3,0.0,1.0,0.0,1.0,1,2019-07-10,0.0,,1.0,2019-07-24,,"In GE Aestiva and Aespire versions 7100 and 7900, a vulnerability exists where serial devices are connected via an added unsecured terminal server to a TCP/IP network configuration, which could allow an attacker to remotely modify device configuration and silence alarms.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,3.9,1.4,['CWE-287'],"['cpe:2.3:o:ge:aestiva_7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aestiva_7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aestiva_7900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aestiva_7900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aespire_7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aespire_7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aespire_7900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aespire_7900:-:*:*:*:*:*:*:*']",0,0 CVE-2019-18255,General Electric,0.00042,5.5,0.0,0.0,1.0,0.0,1,2021-02-18,1.0,2021-02-09,,,1.0,HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-732'],['cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*'],0,0 CVE-2020-16242,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,1,2020-09-25,1.0,2020-09-28,,,0.0,"The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow an attacker to trick application users into performing critical application actions that include, but are not limited to, adding and updating accounts.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ge:s2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2024_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2024:-:*:*:*:*:*:*:*']",0,0 CVE-2020-27263,General Electric,0.01554,9.1,0.0,0.0,1.0,0.0,1,2021-01-14,1.0,2021-01-05,,,1.0,"KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,"['CWE-787', 'CWE-122']","['cpe:2.3:a:ge:industrial_gateway_server:7.66:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:industrial_gateway_server:7.68.804:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:opc-aggregator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_industrial_connectivity:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.6.504.0:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.9.572.0:*:*:*:*:*:*:*', 'cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:*']",0,0 CVE-2020-27267,General Electric,0.01554,9.1,0.0,0.0,1.0,0.0,1,2021-01-14,1.0,2021-01-05,,,1.0,"KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,"['CWE-787', 'CWE-416']","['cpe:2.3:a:ge:industrial_gateway_server:7.66:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:industrial_gateway_server:7.68.804:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:opc-aggregator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_industrial_connectivity:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.6.504.0:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.9.572.0:*:*:*:*:*:*:*', 'cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:*']",0,0 CVE-2020-6992,General Electric,0.00042,6.7,0.0,0.0,1.0,0.0,1,2020-04-15,1.0,2020-01-31,,,1.0,"A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-269'],['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*'],0,0 CVE-2021-27438,General Electric,0.0009,8.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,The software contains a hard-coded password it uses for its own inbound authentication or for outbound communication to external components on the Reason DR60 (all firmware versions prior to 02A04.1).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-798', 'CWE-94']","['cpe:2.3:o:ge:reason_dr60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:reason_dr60:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27450,General Electric,0.00044,7.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,"SSH server configuration file does not implement some best practices. This could lead to a weakening of the SSH protocol strength, which could lead to additional misconfiguration or be leveraged as part of a larger attack on the MU320E (all firmware versions prior to v04A00.1).",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-326'],"['cpe:2.3:o:ge:mu320e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:mu320e:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27454,General Electric,0.00044,7.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,"The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1).",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['CWE-269', 'CWE-250']","['cpe:2.3:h:ge:reason_dr60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:reason_dr60_firmware:*:*:*:*:*:*:*:*']",0,0 CVE-2022-21798,General Electric,0.00193,9.8,0.0,0.0,1.0,0.0,1,2022-02-25,1.0,2022-02-24,,,1.0,"The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-319'],['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*'],0,0 CVE-2017-14004,General Electric,0.00355,9.8,0.0,0.0,1.0,0.0,0,2018-03-20,1.0,2018-03-13,,,1.0,GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']",['cpe:2.3:a:ge:gemnet_license_server:-:*:*:*:*:*:*:*'],0,0 CVE-2017-7908,General Electric,0.00081,7.6,0.0,0.0,1.0,0.0,0,2018-10-02,1.0,2018-10-02,,,1.0,"A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,LOW,LOW,HIGH,HIGH,2.8,4.7,"['CWE-119', 'CWE-122']","['cpe:2.3:a:gigasoft:proessentials:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*']",0,0 CVE-2018-19003,General Electric,0.00116,7.5,0.0,1.0,0.0,1.0,0,2018-12-14,1.0,2018-12-13,,,1.0,"GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e Versions 03.03.28C to 05.02.04C, EX2100e All versions prior to v04.09.00C, EX2100e_Reg All versions prior to v04.09.00C, and LS2100e All versions prior to v04.09.00C The affected versions of the application have a path traversal vulnerability that fails to restrict the ability of an attacker to gain access to restricted information.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:ge:ex2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ex2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ls2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ls2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ex2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ex2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ls2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ls2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:mark_vle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:mark_vle:-:*:*:*:*:*:*:*']",0,0 CVE-2019-13554,General Electric,0.00104,8.8,0.0,0.0,0.0,1.0,0,2020-04-07,0.0,,1.0,2019-10-15,,GE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['NVD-CWE-Other', 'CWE-285']",['cpe:2.3:o:ge:mark_vie_control_system:-:*:*:*:*:*:*:*'],0,0 CVE-2019-6544,General Electric,0.00093,5.6,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,HIGH,NONE,NONE,UNCHANGED,LOW,LOW,LOW,MEDIUM,2.2,3.4,"['NVD-CWE-Other', 'CWE-284']",['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0 CVE-2019-6546,General Electric,0.00065,7.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0 CVE-2019-6548,General Electric,0.00213,9.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0 CVE-2019-6564,General Electric,0.00065,7.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0 CVE-2020-12017,General Electric,0.0024,9.8,0.0,1.0,0.0,1.0,0,2020-06-02,1.0,2020-06-02,,,1.0,"GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*']",0,0 CVE-2020-16240,General Electric,0.0008,5.3,0.0,0.0,1.0,0.0,0,2020-09-23,1.0,2021-01-05,,,0.0,"GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-639'],['cpe:2.3:a:ge:asset_performance_management_classic:*:*:*:*:*:*:*:*'],0,0 CVE-2020-16244,General Electric,0.00104,7.2,0.0,0.0,1.0,0.0,0,2020-09-23,1.0,2020-09-22,,,1.0,"GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,"['NVD-CWE-Other', 'CWE-759']",['cpe:2.3:a:ge:asset_performance_management_classic:*:*:*:*:*:*:*:*'],0,0 CVE-2020-16246,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,0,2020-10-20,1.0,2020-09-28,,,1.0,"The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:h:ge:s2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2024:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2024_firmware:*:*:*:*:*:*:*:*']",0,0 CVE-2020-25193,General Electric,0.00074,5.3,0.0,1.0,0.0,1.0,0,2022-03-18,1.0,2021-01-05,,,1.0,"By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,"['CWE-798', 'CWE-321']","['cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*']",0,0 CVE-2020-25197,General Electric,0.00271,8.8,0.0,1.0,0.0,1.0,0,2022-03-18,1.0,2021-01-05,,,1.0,"A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-94'],"['cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*']",0,0 CVE-2020-6977,General Electric,0.00067,6.8,0.0,1.0,0.0,1.0,0,2020-02-20,0.0,,1.0,2020-02-18,,"A restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devices. Specially crafted inputs can allow the user to escape the restricted environment, resulting in access to the underlying operating system. Affected devices include the following GE Ultrasound Products: Vivid products - all versions; LOGIQ - all versions not including LOGIQ 100 Pro; Voluson - all versions; Versana Essential - all versions; Invenia ABUS Scan station - all versions; Venue - all versions not including Venue 40 R1-3 and Venue 50 R4-5",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,"['CWE-20', 'CWE-693']","['cpe:2.3:h:ge:vivid_e95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_e95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_e90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_e90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_s70n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_s70n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_t8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_t8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_t9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_t9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_iq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_iq_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_s8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_s8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_s7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_s7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_p9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_p9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e9_with_xdclear_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e9_with_xdclear:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:voluson_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:voluson:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:versana_essential_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:versana_essential:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:invenia_abus_scan_station_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:invenia_abus_scan_station:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:venue_go_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:venue_go:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27418,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,"['CWE-79', 'CWE-20']","['cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27420,General Electric,0.00086,5.3,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['CWE-20'],"['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27422,General Electric,0.00152,7.5,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-319', 'CWE-200']","['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27426,General Electric,0.00213,9.8,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR IED firmware versions prior to version 8.1x with “Basic” security variant does not allow the disabling of the “Factory Mode,” which is used for servicing the IED by a “Factory” user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['NVD-CWE-Other', 'CWE-453']","['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27428,General Electric,0.00213,9.8,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-434'],"['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0 CVE-2021-27430,General Electric,0.00065,6.8,0.0,0.0,1.0,0.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-798'],"['cpe:2.3:a:ge:ur_bootloader_binary:7.00:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ur_bootloader_binary:7.01:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ur_bootloader_binary:7.02:*:*:*:*:*:*:*']",0,0 CVE-2021-31477,General Electric,0.00924,7.3,0.0,1.0,0.0,1.0,0,2021-06-16,1.0,2021-03-26,,,1.0,This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-coded default credentials. An attacker can leverage this vulnerability to execute code in the context of the download user. Was ZDI-CAN-11852.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,LOW,HIGH,3.9,3.4,['CWE-798'],"['cpe:2.3:h:ge:rpv311:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:reason_rpv311_firmware:14a03:*:*:*:*:*:*:*']",0,0 CVE-2021-44477,General Electric,0.00195,7.5,0.0,0.0,1.0,0.0,0,2022-03-25,1.0,2022-01-25,,,1.0,GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-611'],['cpe:2.3:a:ge:toolboxst:*:*:*:*:*:*:*:*'],0,0 CVE-2022-23921,General Electric,0.00042,7.8,0.0,0.0,1.0,0.0,0,2022-02-25,1.0,2022-02-22,,,1.0,"Exploitation of this vulnerability may result in local privilege escalation and code execution. GE maintains exploitation of this vulnerability is only possible if the attacker has login access to a machine actively running CIMPLICITY, the CIMPLICITY server is not already running a project, and the server is licensed for multiple projects.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-269'],['cpe:2.3:a:ge:proficy_cimplicitiy:*:*:*:*:*:*:*:*'],0,0 CVE-2022-37952,General Electric,0.00072,6.1,0.0,0.0,1.0,0.0,0,2022-08-25,1.0,2022-08-24,,,1.0,"A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (