CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%
The remote Redhat Enterprise Linux 5 host has one or more packages installed that are affected by multiple vulnerabilities that have been acknowledged by the vendor but will not be patched.
ImageMagick: Insufficient shell characters filtering (CVE-2016-3714)
ImageMagick: NULL pointer dereference in CheckEventLogging function in MagickCore/log.c (CVE-2018-16328)
The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation. (CVE-2012-3437)
Note that Nessus has not tested for these issues but has instead relied on the package manager’s report that the package is installed.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory imagemagick. The text
# itself is copyright (C) Red Hat, Inc.
##
include('compat.inc');
if (description)
{
script_id(199277);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/10");
script_cve_id(
"CVE-2012-3437",
"CVE-2014-1947",
"CVE-2014-8354",
"CVE-2014-8562",
"CVE-2014-9804",
"CVE-2014-9805",
"CVE-2014-9806",
"CVE-2014-9807",
"CVE-2014-9808",
"CVE-2014-9809",
"CVE-2014-9810",
"CVE-2014-9811",
"CVE-2014-9812",
"CVE-2014-9813",
"CVE-2014-9814",
"CVE-2014-9815",
"CVE-2014-9816",
"CVE-2014-9817",
"CVE-2014-9818",
"CVE-2014-9819",
"CVE-2014-9820",
"CVE-2014-9821",
"CVE-2014-9822",
"CVE-2014-9823",
"CVE-2014-9824",
"CVE-2014-9825",
"CVE-2014-9826",
"CVE-2014-9827",
"CVE-2014-9828",
"CVE-2014-9829",
"CVE-2014-9830",
"CVE-2014-9831",
"CVE-2014-9832",
"CVE-2014-9833",
"CVE-2014-9834",
"CVE-2014-9835",
"CVE-2014-9836",
"CVE-2014-9837",
"CVE-2014-9838",
"CVE-2014-9839",
"CVE-2014-9840",
"CVE-2014-9841",
"CVE-2014-9842",
"CVE-2014-9843",
"CVE-2014-9844",
"CVE-2014-9845",
"CVE-2014-9846",
"CVE-2014-9847",
"CVE-2014-9848",
"CVE-2014-9849",
"CVE-2014-9850",
"CVE-2014-9851",
"CVE-2014-9852",
"CVE-2014-9853",
"CVE-2014-9854",
"CVE-2014-9915",
"CVE-2015-8895",
"CVE-2015-8896",
"CVE-2015-8897",
"CVE-2015-8898",
"CVE-2015-8900",
"CVE-2015-8901",
"CVE-2015-8902",
"CVE-2015-8903",
"CVE-2015-8957",
"CVE-2015-8958",
"CVE-2016-3714",
"CVE-2016-3716",
"CVE-2016-3717",
"CVE-2016-3718",
"CVE-2016-5240",
"CVE-2016-6823",
"CVE-2016-7515",
"CVE-2016-7517",
"CVE-2016-7519",
"CVE-2016-7523",
"CVE-2016-7528",
"CVE-2016-7529",
"CVE-2016-7530",
"CVE-2016-7531",
"CVE-2016-7537",
"CVE-2016-8862",
"CVE-2016-8866",
"CVE-2016-9556",
"CVE-2016-9559",
"CVE-2016-10046",
"CVE-2016-10047",
"CVE-2016-10048",
"CVE-2016-10049",
"CVE-2016-10050",
"CVE-2016-10051",
"CVE-2016-10052",
"CVE-2016-10053",
"CVE-2016-10054",
"CVE-2016-10055",
"CVE-2016-10057",
"CVE-2016-10058",
"CVE-2016-10059",
"CVE-2016-10060",
"CVE-2016-10061",
"CVE-2016-10062",
"CVE-2016-10063",
"CVE-2016-10064",
"CVE-2016-10065",
"CVE-2016-10066",
"CVE-2016-10067",
"CVE-2016-10068",
"CVE-2016-10069",
"CVE-2016-10070",
"CVE-2016-10071",
"CVE-2016-10144",
"CVE-2016-10145",
"CVE-2016-10146",
"CVE-2016-10252",
"CVE-2017-5506",
"CVE-2017-5507",
"CVE-2017-5508",
"CVE-2017-5509",
"CVE-2017-5510",
"CVE-2017-5511",
"CVE-2017-6335",
"CVE-2017-6497",
"CVE-2017-6498",
"CVE-2017-6499",
"CVE-2017-6500",
"CVE-2017-6501",
"CVE-2017-6502",
"CVE-2017-7275",
"CVE-2017-7606",
"CVE-2017-7619",
"CVE-2017-7941",
"CVE-2017-7942",
"CVE-2017-7943",
"CVE-2017-8343",
"CVE-2017-8344",
"CVE-2017-8345",
"CVE-2017-8346",
"CVE-2017-8347",
"CVE-2017-8348",
"CVE-2017-8349",
"CVE-2017-8350",
"CVE-2017-8351",
"CVE-2017-8352",
"CVE-2017-8353",
"CVE-2017-8354",
"CVE-2017-8355",
"CVE-2017-8356",
"CVE-2017-8357",
"CVE-2017-8765",
"CVE-2017-8830",
"CVE-2017-9098",
"CVE-2017-9141",
"CVE-2017-9142",
"CVE-2017-9143",
"CVE-2017-9144",
"CVE-2017-9261",
"CVE-2017-9262",
"CVE-2017-9405",
"CVE-2017-9407",
"CVE-2017-9409",
"CVE-2017-9439",
"CVE-2017-9440",
"CVE-2017-9499",
"CVE-2017-9500",
"CVE-2017-9501",
"CVE-2017-10928",
"CVE-2017-10995",
"CVE-2017-11141",
"CVE-2017-11170",
"CVE-2017-11188",
"CVE-2017-11310",
"CVE-2017-11352",
"CVE-2017-11360",
"CVE-2017-11447",
"CVE-2017-11448",
"CVE-2017-11449",
"CVE-2017-11450",
"CVE-2017-11505",
"CVE-2017-11524",
"CVE-2017-11525",
"CVE-2017-11526",
"CVE-2017-11527",
"CVE-2017-11528",
"CVE-2017-11529",
"CVE-2017-11530",
"CVE-2017-11531",
"CVE-2017-11532",
"CVE-2017-11533",
"CVE-2017-11534",
"CVE-2017-11535",
"CVE-2017-11536",
"CVE-2017-11537",
"CVE-2017-11538",
"CVE-2017-11539",
"CVE-2017-11540",
"CVE-2017-11639",
"CVE-2017-11640",
"CVE-2017-11644",
"CVE-2017-11724",
"CVE-2017-11750",
"CVE-2017-11751",
"CVE-2017-11752",
"CVE-2017-11753",
"CVE-2017-11754",
"CVE-2017-11755",
"CVE-2017-12140",
"CVE-2017-12418",
"CVE-2017-12427",
"CVE-2017-12428",
"CVE-2017-12429",
"CVE-2017-12430",
"CVE-2017-12432",
"CVE-2017-12433",
"CVE-2017-12434",
"CVE-2017-12435",
"CVE-2017-12587",
"CVE-2017-12640",
"CVE-2017-12641",
"CVE-2017-12642",
"CVE-2017-12643",
"CVE-2017-12644",
"CVE-2017-12654",
"CVE-2017-12662",
"CVE-2017-12663",
"CVE-2017-12664",
"CVE-2017-12665",
"CVE-2017-12666",
"CVE-2017-12693",
"CVE-2017-12875",
"CVE-2017-12876",
"CVE-2017-12877",
"CVE-2017-12983",
"CVE-2017-13058",
"CVE-2017-13059",
"CVE-2017-13060",
"CVE-2017-13061",
"CVE-2017-13062",
"CVE-2017-13066",
"CVE-2017-13131",
"CVE-2017-13132",
"CVE-2017-13133",
"CVE-2017-13134",
"CVE-2017-13139",
"CVE-2017-13140",
"CVE-2017-13141",
"CVE-2017-13142",
"CVE-2017-13143",
"CVE-2017-13144",
"CVE-2017-13145",
"CVE-2017-13146",
"CVE-2017-13658",
"CVE-2017-13758",
"CVE-2017-13768",
"CVE-2017-13769",
"CVE-2017-14060",
"CVE-2017-14139",
"CVE-2017-14172",
"CVE-2017-14173",
"CVE-2017-14174",
"CVE-2017-14175",
"CVE-2017-14224",
"CVE-2017-14248",
"CVE-2017-14249",
"CVE-2017-14324",
"CVE-2017-14325",
"CVE-2017-14326",
"CVE-2017-14341",
"CVE-2017-14342",
"CVE-2017-14343",
"CVE-2017-14400",
"CVE-2017-14528",
"CVE-2017-14531",
"CVE-2017-14532",
"CVE-2017-14533",
"CVE-2017-14607",
"CVE-2017-14624",
"CVE-2017-14682",
"CVE-2017-14739",
"CVE-2017-14741",
"CVE-2017-14989",
"CVE-2017-15015",
"CVE-2017-15016",
"CVE-2017-15017",
"CVE-2017-15032",
"CVE-2017-15033",
"CVE-2017-15217",
"CVE-2017-15218",
"CVE-2017-15277",
"CVE-2017-15281",
"CVE-2017-16352",
"CVE-2017-16353",
"CVE-2017-16546",
"CVE-2017-17499",
"CVE-2017-17504",
"CVE-2017-17680",
"CVE-2017-17681",
"CVE-2017-17682",
"CVE-2017-17879",
"CVE-2017-17880",
"CVE-2017-17881",
"CVE-2017-17882",
"CVE-2017-17884",
"CVE-2017-17885",
"CVE-2017-17886",
"CVE-2017-17887",
"CVE-2017-17914",
"CVE-2017-17934",
"CVE-2017-18008",
"CVE-2017-18022",
"CVE-2017-18027",
"CVE-2017-18028",
"CVE-2017-18029",
"CVE-2017-18251",
"CVE-2017-18252",
"CVE-2017-18271",
"CVE-2017-18273",
"CVE-2017-1000445",
"CVE-2017-1000476",
"CVE-2018-5246",
"CVE-2018-5247",
"CVE-2018-5357",
"CVE-2018-6405",
"CVE-2018-6876",
"CVE-2018-6930",
"CVE-2018-7443",
"CVE-2018-7470",
"CVE-2018-10177",
"CVE-2018-10804",
"CVE-2018-11656",
"CVE-2018-12599",
"CVE-2018-12600",
"CVE-2018-13153",
"CVE-2018-14434",
"CVE-2018-14435",
"CVE-2018-14436",
"CVE-2018-15607",
"CVE-2018-16323",
"CVE-2018-16328",
"CVE-2018-16640",
"CVE-2018-16642",
"CVE-2018-16643",
"CVE-2018-16644",
"CVE-2018-16645",
"CVE-2018-16749",
"CVE-2018-16750",
"CVE-2018-17966",
"CVE-2018-18016",
"CVE-2018-18024",
"CVE-2018-18544",
"CVE-2018-20467",
"CVE-2019-7175",
"CVE-2019-7397",
"CVE-2019-7398",
"CVE-2019-10131",
"CVE-2019-10650",
"CVE-2019-10714",
"CVE-2019-11470",
"CVE-2019-11472",
"CVE-2019-11597"
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/09/30");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/05/03");
script_name(english:"RHEL 5 : imagemagick (Unpatched Vulnerability)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat 5 host is affected by multiple vulnerabilities that will not be patched.");
script_set_attribute(attribute:"description", value:
"The remote Redhat Enterprise Linux 5 host has one or more packages installed that are affected by multiple
vulnerabilities that have been acknowledged by the vendor but will not be patched.
- ImageMagick: Insufficient shell characters filtering (CVE-2016-3714)
- ImageMagick: NULL pointer dereference in CheckEventLogging function in MagickCore/log.c (CVE-2018-16328)
- The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8 and earlier does not use the proper
variable type for the allocation size, which might allow remote attackers to cause a denial of service
(crash) via a crafted PNG file that triggers incorrect memory allocation. (CVE-2012-3437)
Note that Nessus has not tested for these issues but has instead relied on the package manager's report that the package
is installed.");
script_set_attribute(attribute:"solution", value:
"The vendor has acknowledged the vulnerabilities but no solution has been provided. Refer to the vendor for remediation
guidance.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-3714");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2018-16328");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vendor_unpatched", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/07/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:imagemagick");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl", "redhat_repos.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include('rpm.inc');
include('rhel.inc');
if (!get_kb_item("global_settings/vendor_unpatched"))
exit(0, "Unpatched Vulnerabilities Detection not active.");
if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');
var os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
os_ver = os_ver[1];
if (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '5')) audit(AUDIT_OS_NOT, 'Red Hat 5.x', 'Red Hat ' + os_ver);
if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
var constraints = [
{
'pkgs': [
{'reference':'ImageMagick', 'release':'5', 'rpm_spec_vers_cmp':TRUE, 'unpatched_pkg':'ImageMagick'}
]
}
];
var flag = 0;
foreach var constraint_array ( constraints ) {
var repo_relative_urls = NULL;
var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);
foreach var pkg ( constraint_array['pkgs'] ) {
var unpatched_pkg = NULL;
var _release = NULL;
var sp = NULL;
var el_string = NULL;
var rpm_spec_vers_cmp = NULL;
var exists_check = NULL;
var cves = NULL;
if (!empty_or_null(pkg['unpatched_pkg'])) unpatched_pkg = pkg['unpatched_pkg'];
if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];
if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];
if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];
if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];
if (!empty_or_null(pkg['cves'])) cves = pkg['cves'];
if (unpatched_pkg &&
_release &&
(!exists_check || rpm_exists(release:_release, rpm:exists_check)) &&
unpatched_package_exists(release:_release, package:unpatched_pkg, cves: cves)) flag++;
}
}
if (flag)
{
var extra = NULL;
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : unpatched_packages_report()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'ImageMagick');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3437
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9825
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9827
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9832
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9833
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9841
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9848
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9850
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9852
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9915
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10047
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10053
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10054
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10064
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10066
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10069
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10070
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10071
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10144
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10252
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10928
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11141
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11170
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11188
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11310
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11360
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11450
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11524
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11525
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11526
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11527
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11529
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11530
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11534
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11536
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11538
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11539
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11540
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11751
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11752
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11753
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11754
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12641
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12642
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12654
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12662
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12663
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12664
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12875
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13066
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13132
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13658
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14139
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14324
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14532
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14624
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15015
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17681
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17886
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18273
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5506
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5507
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5508
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5509
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5510
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5511
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6335
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7275
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7619
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7942
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8343
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8347
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8356
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9261
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9407
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9409
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9439
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16323
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16328
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16640
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16642
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16643
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16645
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18016
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18024
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6876
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6930
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10714
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%