Analyst command view

MSRC Driver CVE Board

Latest-state board for filtered MSRC CVEs from 2020-01-01 to today, tuned for fast triage across module, CWE, release window, exploitation signal, and acknowledgement context.

Live snapshot
Last Sync
2026-05-20T07:39:30Z
Freshness
1 day(s) ago
Refresh Policy
24h baseline + release watch
Storage
Latest snapshot only
Rows In View
443
Current result set after filter and search.
Exploited Flagged
399
Rows with a non-empty exploitation signal.
Distinct CWE
8
Unique weakness classes in this view.
Modules
185
Unique inferred driver or component labels.
Reset
Active filters CWE CWE-416: Use After Free Clear filters
Release Month
March 2023
3 CVE | last update 1 day(s) ago
Release 2023-03-14 Patch Tuesday Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-23392
HTTP Protocol Stack
Exploitation More Likely
HTTP Protocol Stack Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-03-14 No -
Release 2023-03-10 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-3748
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU resulting in a
No latest release note
A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU resulting in a denial of service condition or potentially execute code on the host with the privileges of the QEMU process.
CVSS vector: AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
2023-03-10 - -
Release 2023-03-08 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-0934
A single-byte non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq potentially causing a
No latest release note
A single-byte non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq potentially causing a denial of service.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2023-03-08 - -
Release Month
February 2023
3 CVE | last update 1 day(s) ago
Release 2023-02-14 Patch Tuesday Count 2
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21822
Windows Graphics Component
Exploitation More Likely
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-02-14 No
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
CVE-2023-21688
NT OS Kernel
Exploitation More Likely
NT OS Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-02-14 No
Release 2023-02-02 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-0469
A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a
No latest release note
A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2023-02-02 - -
Release Month
January 2023
11 CVE | last update 1 day(s) ago
Release 2023-01-10 Patch Tuesday Count 11
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2023-21680
Windows Win32k
Exploitation Less Likely
Windows Win32k Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
CVE-2023-21679
Windows Layer 2 Tunneling Protocol (L2TP)
Exploitation Less Likely
Windows Layer 2 Tunneling Protocol (L2TP) Remote Code Execution Vulnerability
CVSS vector: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
CVE-2023-21774
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-21773
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-21755
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
CVE-2023-21747
Windows Kernel
Exploitation Less Likely
Windows Kernel Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Mateusz Jurczyk of Google Project Zero
CVE-2023-21552
Windows GDI
Exploitation More Likely
Windows GDI Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
2023-01-10 No
Reported By
CVE-2023-21532
Windows GDI
Exploitation More Likely
Windows GDI Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Marcin Wiazowski working with Trend Micro Zero Day Initiative
CVE-2023-21674
Windows Advanced Local Procedure Call (ALPC)
Exploitation Detected
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
2023-01-10 Yes
Reported By
Jan Vojtěšek, Milánek, and Przemek Gmerek with Avast
CVE-2023-21724
Microsoft DWM Core Library
Exploitation Less Likely
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
CVE-2023-21551
Microsoft Cryptographic Services
Exploitation Less Likely
Microsoft Cryptographic Services Elevation of Privilege Vulnerability
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2023-01-10 No
Reported By
Microsoft Offensive Research and Security Engineering (MORSE)
Release Month
October 2022
1 CVE | last update 1 day(s) ago
Release 2022-10-22 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-3586
A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local unprivileged user to crash the system causing a
No latest release note
A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local unprivileged user to crash the system causing a denial of service.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2022-10-22 - -
Release Month
August 2022
1 CVE | last update 1 day(s) ago
Release 2022-08-16 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-1158
A flaw was found in KVM. When updating a guest's page table entry vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel resulting in a
No latest release note
A flaw was found in KVM. When updating a guest's page table entry vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel resulting in a denial of service condition.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2022-08-16 - -
Release Month
June 2022
3 CVE | last update 1 day(s) ago
Release 2022-06-29 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-33981
drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a
No latest release note
drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
2022-06-29 - -
Release 2022-06-11 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-1652
Linux Kernel could allow a local attacker to execute arbitrary code on the system caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program an attacker could exploit this vulnerability to execute arbitrary code or cause a
No latest release note
Linux Kernel could allow a local attacker to execute arbitrary code on the system caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2022-06-11 - -
Release 2022-06-02 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-30065
A use-after-free in Busybox 1.35-x's awk applet leads to
No latest release note
A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.
CVSS vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2022-06-02 - -
Release Month
May 2022
2 CVE | last update 1 day(s) ago
Release 2022-05-17 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-3750
A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a
No latest release note
A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service condition or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2022-05-17 - -
Release 2022-05-12 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-1195
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a
No latest release note
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2022-05-12 - -
Release Month
March 2022
1 CVE | last update 1 day(s) ago
Release 2022-03-31 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-4150
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a
No latest release note
A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2022-03-31 - -
Release Month
February 2022
2 CVE | last update 1 day(s) ago
Release 2022-02-24 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2022-0581
Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows
No latest release note
Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2022-02-24 - -
Release 2022-02-10 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-4154
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a
No latest release note
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2022-02-10 - -
Release Month
November 2021
8 CVE | last update 1 day(s) ago
Release 2021-11-18 Other / OOB Count 8
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-42386
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42385
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42384
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42382
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42381
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42380
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42379
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
CVE-2021-42378
A use-after-free in Busybox's awk applet leads to
No latest release note
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
CVSS vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-11-18 - -
Release Month
August 2021
1 CVE | last update 1 day(s) ago
Release 2021-08-13 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-38204
drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a
No latest release note
drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.
CVSS vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2021-08-13 - -
Release Month
June 2021
2 CVE | last update 1 day(s) ago
Release 2021-06-09 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2020-35506
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a
No latest release note
A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a denial of service or potential code execution with the privileges of the QEMU process.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2021-06-09 - -
Release 2021-06-02 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-33574
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller leading to a
No latest release note
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller leading to a denial of service (application crash) or possibly unspecified other impact.
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2021-06-02 - -
Release Month
March 2021
2 CVE | last update 1 day(s) ago
Release 2021-03-30 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-3392
A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a
No latest release note
A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
2021-03-30 - -
Release 2021-03-27 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2021-20227
A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a
No latest release note
A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2021-03-27 - -
Release Month
December 2020
1 CVE | last update 1 day(s) ago
Release 2020-12-03 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2020-15436
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a
No latest release note
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
CVSS vector: AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
2020-12-03 - -
Release Month
September 2020
1 CVE | last update 1 day(s) ago
Release 2020-09-25 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2020-8428
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free which allows local users to cause a
No latest release note
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket if the socket is being moved to a new parent directory and its old parent directory is being removed.
CVSS vector: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
2020-09-25 - -
Release Month
August 2020
1 CVE | last update 1 day(s) ago
Release 2020-08-18 Other / OOB Count 1
CVE Module CWE Title Advisory text and compact technical context Release Exploited Acknowledgement
CVE-2018-13410
Info-ZIP Zip 3.0 when the -T and -TT command-line options are used allows attackers to cause a
No latest release note
Info-ZIP Zip 3.0 when the -T and -TT command-line options are used allows attackers to cause a denial of service (invalid free and application crash) or possibly have unspecified other impact because of an off-by-one error. NOTE: it is unclear whether there are realistic scenarios in which an untrusted party controls the -TT value given that the entire purpose of -TT is execution of arbitrary commands
CVSS vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2020-08-18 - -
Prev Page 9 / 9 | rows 401-443 of 443