3.5
CVSSv2

CVE-2018-3004

Published: 18/07/2018 Updated: 03/10/2019
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.3 | Impact Score: 3.6 | Exploitability Score: 1.6
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2,12.2.0.1 and 18.2. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

Vulnerability Trend

Affected Products

Vendor Product Versions
OracleDatabase Server11.2.0.4, 12.1.0.2, 12.2.0.1, 18.2

Vendor Advisories

Oracle Critical Patch Update Advisory - July 2018 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...

Github Repositories

Branch: master Go to file Clone Clone with HTTPS Use Git or checkout with SVN using the web URL. Download ZIP Downloading Want to be notified of new releases in rossw1979/ODAT? Sign in Sign up Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching Xcode If nothing happens, download Xcode and try again. Go back Launching Visual Studio If nothing happens, download the GitHub extension for Visual Studio and try again. Go back Latest commit quentinhardy committed 881c7cf on Dec 6, 2019 … Update README.md Git stats 241 commits 2 branches 8 tags Files Permalink Failed to load latest commit information. Type Name Latest commit message Commit time Docker Bug fix 2 years ago accounts New trivial credentials in accounts 3 years ago docs @ 402d044 Add the wiki https://github.com/quentinhardy/odat.wiki.git in the repo 4 years ago pictures ODAT version 2.O: New module named 'privesc', for local privilege esc… 4 years ago .gitignore Ignore file .pyc in git repository 4 years ago .gitmodules Add the wiki https://github.com/quentinhardy/odat.wiki.git in the repo 4 years ago CVE_2012_3137.py Info message to warning 3 years ago CVE_XXXX_YYYY.py Detection and exploit CVE_2018_3004 11 months ago Constants.py Version 3.0 10 months ago Ctxsys.py First Commit: Project ODAT 6 years ago DbmsAdvisor.py Fix a False negative in --test-module for DB 18c 10 months ago DbmsLob.py Update the read file method 3 years ago DbmsScheduler.py Modification of the reverse shell cmd executed on the target because … 4 years ago DbmsXslprocessor.py Bug fix False Negative when --test-module and Oracle Database 18c 10 months ago DirectoryManagement.py First Commit: Project ODAT 6 years ago ExternalTable.py Bug fixed for False negative in external table 11 months ago Http.py Improvements 5 years ago HttpUriType.py Bug fix when you want to scan only one port in http oralce modules. T… 5 years ago Info.py Delete loadInformationRemoteDatabase() from Info module 10 months ago Java.py For --test-module 10 months ago OracleDatabase.py New method for getting remote OS (for any authenticated user) 10 months ago Oradbg.py First Commit: Project ODAT 6 years ago Output.py ODAT version 2.O: New module named 'privesc', for local privilege esc… 4 years ago PasswordGuesser.py Bug fix: some creds could not be detected in passwordguesser (SYSDBA … 2 years ago Passwords.py Get hashes on version 18c 10 months ago PrivilegeEscalation.py ODAT version 2.O: New module named 'privesc', for local privilege esc… 4 years ago README.md Update README.md 7 months ago SIDGuesser.py Bug fix 3 years ago SMB.py add a SMB module to capture a SMB authentication 6 years ago Search.py option for desc each tables and --without-example option 2 years ago TODO.txt Additional SMB Auth method with TNS set_log 4 years ago Tnscmd.py Get version when >= 18c, thx to zw0nner 10 months ago Tnspoison.py Bug fix: false positive in tnspoison 2 years ago Unwrapper.py New option '--object-type' for searching on object type also 4 years ago UsernameLikePassword.py New option in usernameLikePassword module: try more pwds 2 years ago Utils.py Print credentials found with \n 4 years ago UtlFile.py First Commit: Project ODAT 6 years ago UtlHttp.py Bug fix when you want to scan only one port in http oralce modules. T… 5 years ago UtlTcp.py First Commit: Project ODAT 6 years ago createALinuxBinary.sh New deps for binary 3 years ago odat-libc2.19-x86_64.spec Now, Name server can be given to the *-s* command 6 years ago odat.py New option for setting path to shell in Java module e.g. /usr/bin.sh … 10 months ago progressbar.py Bug fix when you want to scan only one port in http oralce modules. T… 5 years ago sids.txt New SID 3 years ago testAllOdatModules.sh Improvements 5 years ago texttable.py Improvements 5 years ago View code README.md Quentin HARDY quentin.hardy@protonmail.com quentin.hardy@bt.com ODAT ODAT (Oracle Database Attacking Tool) is an open source penetration testing tool that tests the security of Oracle Databases remotely. Usage examples of ODAT: You have an Oracle database listening remotely and want to find valid SIDs and credentials in order to connect to the database You have a valid Oracle account on a database and want to escalate your privileges to become DBA or SYSDBA You have a Oracle account and you want to execute system commands (e.g. reverse shell) in order to move forward on the operating system hosting the database Tested on Oracle Database 10g, 11g, 12c and 18c. Compatible with both python 2.7 (master branch) and python 3 (master-python3 branch). ODAT linux standalone version at https://github.com/quentinhardy/odat/releases/. Notice it is recommended to use the development version (git clone), with the master-python3 branch. Changelog Version 3.0 (01/09/2019): Compatible with Oracle Database 18c New option in Java module for setting the path to shell (e.g. /usr/bin/sh when CentOS) Version 2.3.2 (16/07/2019): Bug fixes: external table and false negative Version 2.3.1 (10/08/2018): New option in Java module for exploiting CVE-2018-3004: It allows an authenticated user to arbitrarily write to files on the OS (Privilege escalation with bypass built in Oracle JVM security). More details http://obtruse.syfrtext.com/2018/07/oracle-privilege-escalation-via.html. Version 2.3 (06/03/2018): Bug fixes: Some database credentials could not be detected in passwordguesser module (when it tries to connect as SYSDBA/SYSOPER before). Important bug fix! PPoutput missing in smb module (thx to dirkjanm) False positive in tnspoison module Sometimes, impossible to get version from VSNNUM Improvements: Performence improvements when you bruteforce accounts. Option for connection with a TNS Connection String New trivial credentials in accounts file Better read file method in dbmsLob module (thx to omair2084) Version 2.2.1 (12/04/2017): Bug fixes: Version in tnscmd (info) External module (Catch an Oracle error) Catch error when "connection to server failed" Tnscmd: "The server SID must be given with the '-d SID' option TypeError Bug Fix in tnspoison module TNS poisoning module when port!=1521 (Integer bug) Improvements: New SIDs Version 2.2 (25/03/2016): A new module (tnspoison) for exploiting the TNS listener poisoning attack (CVE-2012-1675). Big thanks to Joxean Koret and donctl. Some bug fixes Better help menu WIKI pages in the ODAT repository Version 2.1 (04/03/2016) : A new module (cve) for exploiting some CVE (Common Vulnerabilities and Exposures). CVE-2012-3137 (perhaps this number, I'm not sure...) implemented at the moment: A user authenticated can modify all tables who can select even if he can't modify them normally (no ALTER privilege). new option (--accounts-files) for remote authentication attack which uses 2 distinct files: a login list and password list. Print 10g passwords for oclHashcat compatibility. bug fixes (listening with nc). Version 2.0 (21/02/2016) : A new module (privesc) for using system privileges of an Oracle user (e.g. CREATE ANY PROCEDURE) in order to gain privileged access (i.e. DBA). System privileges that can be used by ODAT in this version: CREATE ANY PROCEDURE: execution of arbitrary requests with APEX_040200's privileges (e.g. modification of Oracle users' passwords) CREATE PROCEDURE and EXECUTE ANY PROCEDURE: execution of arbitrary requests as SYS (e.g. gives DBA role to a user) CREATE ANY TRIGER (and CREATE PROCEDURE): execution of arbitrary requests as SYS (e.g. gives DBA role to a user) ANALYZE ANY (and CREATE PROCEDURE): execution of arbitrary requests as SYS (e.g. gives DBA role to a user) CREATE ANY INDEX (and CREATE PROCEDURE): execution of arbitrary requests as SYS (e.g. gives DBA role to a user) The module privesc can be used to get all system privileges and roles granted. It shows system privileges that can be used to gain privileged access. new option (-vvv) for showing SQL requests sent by ODAT in debugs standalone version moved to releases (https://github.com/quentinhardy/odat/releases/) Version 1.6 (14/07/2015) : new feature to detect if a target is vulnerable to TNS poisoning (CVE-2012-1675) new module named unwrapper to unwrap PL/SQL source code wrapped, from a file or a remote database some improvements done Version 1.5 (17/03/2015) : new module named search in order to search in column names some improvements done (ex: output of tables) new option : output encoding Version 1.4 (07/12/2014) : fix some false positives improve the CVE-2012-3137 module: check more easily if the vulnerability can be exploited Version 1.3 (07/10/2014) : add the -C option in the all module. This module can be used to use file which contains credentials (disable the -U and -P option) add the tnscmd module to get TNS alias, database version (thanks to VSNNUM) and TNS status bug fix: name server can be given to the -s option Version 1.2 (08/08/2014) : add the SMB module to capture a SMB authentication add an option (SHOW_SQL_REQUESTS_IN_VERBOSE_MODE) in Constants.py to show SQL requests sent to the database server Version 1.1 (28/07/2014) : add the DBMS_LOB module useful in order to download files stored on a remote server through Oracle Database. bug fix: java source code: "getenv no longer supported, use properties and -D instead" Version 1.0 (26/06/2014) : first ODAT version. Features Thanks to ODAT, you can: search valid SID on a remote Oracle Database listener via: a dictionary attack a brute force attack ALIAS of the listener search Oracle accounts using: a dictionary attack each Oracle user like the password (need an account before to use this attack) execute system commands on the database server using: DBMS_SCHEDULER JAVA external tables oradbg download files stored on the database server using: UTL_FILE external tables CTXSYS DBMS_LOB upload files on the database server using: UTL_FILE DBMS_XSLPROCESSOR DBMS_ADVISOR delete files using: UTL_FILE gain privileged access using these following system privileges combinations (see help for privesc module commands): (NEW : 2016/02/21) CREATE ANY PROCEDURE CREATE PROCEDURE and EXECUTE ANY PROCEDURE CREATE ANY TRIGER (and CREATE PROCEDURE) ANALYZE ANY (and CREATE PROCEDURE) CREATE ANY INDEX (and CREATE PROCEDURE) send/reveive HTTP requests from the database server using: UTL_HTTP HttpUriType scan ports of the local server or a remote server using: UTL_HTTP HttpUriType UTL_TCP capture a SMB authentication through: an index in order trigger a SMB connection exploit some CVE: the CVE-2012-3137 pickup the session key and salt for arbitrary users attack by dictionary on sessions the CVE-2012-????: A user authenticated can modify all tables who can select even if he can't modify them normally (no ALTER privilege). the CVE-2012-1675 (aka TNS poisoning attack) (NEW : 25/03/2016) search in column names thanks to the search module: search a pattern (ex: password) in column names unwrap PL/SQL source code (10g/11g and 12c) get system privileges and roles granted. It is possible to get privileges and roles of roles granted also (NEW : 21/02/2016) Supported Platforms and dependencies ODAT is compatible with Linux only. Standalone versions exist in order to don't have need to install dependencies and slqplus (see https://github.com/quentinhardy/odat/releases/). The ODAT standalone has been generated thanks to pyinstaller. If you want to have the development version installed on your computer, these following tools and dependencies are needed: Langage: Python 2.7 & Python 3 Oracle dependancies: Instant Oracle basic Instant Oracle sdk Python libraries: cx_Oracle passlib pycrypto python-scapy colorlog (recommended) termcolor (recommended) argcomplete (recommended) pyinstaller (recommended) Installation (optional, for development version) This part describes how to install instantclient, CX_Oracle and some others python libraries on Ubuntu in order to have the ODAT development version. Don't forget that an ODAT standalone version exists at https://github.com/quentinhardy/odat/releases/: It is not required to install something for use the standalone version Clone the repository to get the ODAT source code: git clone https://github.com/quentinhardy/odat.git Update wiki pages in this repository for getting the ODAT documentation locally: cd odat/ git submodule init git submodule update Get instant client basic, sdk (devel) and sqlplus from the Oracle web site: X64: http://www.oracle.com/technetwork/topics/linuxx86-64soft-092277.html X86: http://www.oracle.com/technetwork/topics/linuxsoft-082809.html Install python-dev, alien and libaio1 package (for sqlplus): sudo apt-get install libaio1 python-dev alien python-pip Generate DEB files from RPM files with : sudo alien --to-deb oracle-instantclient19.3-basic-???.x???.rpm sudo alien --to-deb oracle-instantclient19.3-devel-???.x???.rpm Install instant client basic, sdk and sqlplus: sudo dpkg -i oracle-instantclient19.3-basic-???.x???.deb sudo dpkg -i oracle-instantclient19.3-devel_???_???.deb Put these lines in your /etc/profile file in order to define Oracle env variables: export ORACLE_HOME=/usr/lib/oracle/19.3/client64/ export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:$ORACLE_HOME/lib export PATH=$ORACLE_HOME/bin:$PATH Restart your session (to apply env variables) Create the /etc/ld.so.conf.d/oracle.conf file and add the path to Oracle home: /usr/lib/oracle/19.3/client64/lib/ Update the ldpath using: sudo ldconfig Install CX_Oracle sudo -s source /etc/profile pip install cx_Oracle Test if all is good: python -c 'import cx_Oracle' This command should just return without errors. Install some python libraries: sudo apt-get install python-scapy sudo pip install colorlog termcolor pycrypto passlib sudo pip install argcomplete && sudo activate-global-python-argcomplete Install the development version of pyinstaller (http://www.pyinstaller.org/). python setup.py install Run ODAT: ./odat.py -h Good job if you have not errors:) Docs and examples Docs and examples are on the WIKI Donation If you want to support my work doing a donation, I will appreciate a lot: Via BTC: 36FugL6SnFrFfbVXRPcJATK9GsXEY6mJbf About No description, website, or topics provided. Resources Readme Latest release 4.2a60a372 on Apr 2 + 7 releases Contributors 7 Languages Python 97.8% Shell 1.7% Dockerfile 0.5%

Quentin HARDY quentinhardy@protonmailcom quentinhardy@btcom ODAT ODAT (Oracle Database Attacking Tool) is an open source penetration testing tool that tests the security of Oracle Databases remotely Usage examples of ODAT: You have an Oracle database listening remotely and want to find valid SIDs and credentials in order to connect to the database You have a vali

Java-Deserialization-Cheat-Sheet A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries Please, use #javadeser hash tag for tweets Table of content Java Native Serialization (binary) Overview Main talks & presentations & docs Payload generators Exploits Detect Vulnerable apps (without

master 1 branch 1 tag Go to file Code Clone with HTTPS Use Git or checkout with SVN using the web URL. Download ZIP Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching Xcode If nothing happens, download Xcode and try again. Go back Launching Visual Studio If nothing happens, download the GitHub extension for Visual Studio and try again. Go back Latest commit engn33r Add table of CVEs … 935822a 5 hours ago Add table of CVEs 935822a Git stats 3 commits Files Permalink Failed to load latest commit information. Type Name Latest commit message Commit time Java-deserialization-CVEs-quantity-by-year.png Add graphs 5 hours ago Java-deserialization-CVEs-risk-by-year.png Add graphs 5 hours ago README.md Add table of CVEs 5 hours ago View code README.md Java-Deserialization-CVEs This is a dataset of CVEs related to Java Deserialization. Since existing CVE databases do not allow for granular searches by vulnerability type and language, this list was compiled by manually searching the NIST NVD CVE database with different queries. If you notice any discrepancies, contributions are very welcome! CVE ID Year CVSS 3/3.1 risk CVSS 2 risk CVE-2004-2540 2004 5 CVE-2005-0223 2005 5 CVE-2005-3583 2005 7.8 CVE-2006-6745 2006 9.3 CVE-2008-1013 2008 6.8 CVE-2008-5353 2008 10 CVE-2009-1094 2009 10 CVE-2009-1103 2009 6.4 CVE-2009-1190 2009 5 CVE-2009-2723 2009 10 CVE-2010-0094 2010 7.5 CVE-2010-3568 2010 10 CVE-2010-3569 2010 10 CVE-2011-0865 2011 2.6 CVE-2011-2894 2011 6.8 CVE-2011-3521 2011 10 CVE-2012-0505 2012 7.5 CVE-2012-4858 2012 9.3 CVE-2013-0433 2013 5 CVE-2013-0441 2013 10 CVE-2013-1768 2013 7.5 CVE-2013-1777 2013 10 CVE-2013-2165 2013 7.5 CVE-2013-2185 2013 7.5 CVE-2013-2186 2013 7.5 CVE-2013-2417 2013 5 CVE-2013-2450 2013 5 CVE-2013-2456 2013 5 CVE-2013-4271 2013 7.5 CVE-2013-4444 2013 6.8 CVE-2013-5456 2013 9.3 CVE-2013-6288 2013 10 CVE-2014-0416 2014 5 CVE-2014-1972 2014 7.8 CVE-2014-7911 2014 7.2 CVE-2014-9515 2014 9.8 7.5 CVE-2014-9757 2014 9.8 7.5 CVE-2015-1920 2015 10 CVE-2015-2828 2015 9 CVE-2015-3253 2015 9.8 7.5 CVE-2015-3837 2015 9.3 CVE-2015-4805 2015 10 CVE-2015-4852 2015 7.5 CVE-2015-5254 2015 9.8 7.5 CVE-2015-5344 2015 9.8 7.5 CVE-2015-5348 2015 8.1 6.8 CVE-2015-6420 2015 7.5 CVE-2015-6554 2015 7.5 CVE-2015-6555 2015 8.5 CVE-2015-6576 2015 8.8 6.5 CVE-2015-6934 2015 7.3 7.5 CVE-2015-7253 2015 10 CVE-2015-7450 2015 9.8 10 CVE-2015-7501 2015 9.8 10 CVE-2015-8103 2015 7.5 CVE-2015-8360 2015 9.8 7.5 CVE-2015-8765 2015 8.3 7.5 CVE-2016-0276 2016 6.3 6.5 CVE-2016-0360 2016 9.8 7.5 CVE-2016-0376 2016 8.1 5.1 CVE-2016-0686 2016 9.6 10 CVE-2016-0714 2016 8.8 6.5 CVE-2016-0750 2016 8.8 6.5 CVE-2016-0779 2016 9.8 7.5 CVE-2016-0788 2016 9.8 10 CVE-2016-0958 2016 7.5 7.8 CVE-2016-1000027 2016 9.8 7.5 CVE-2016-1000031 2016 9.8 7.5 CVE-2016-10304 2016 6.5 4 CVE-2016-10750 2016 8.1 6.8 CVE-2016-1114 2016 9.8 7.5 CVE-2016-1291 2016 9.8 9.3 CVE-2016-1487 2016 8.8 6.8 CVE-2016-1985 2016 10 10 CVE-2016-1986 2016 9.8 7.5 CVE-2016-1997 2016 9.8 10 CVE-2016-1998 2016 9.8 10 CVE-2016-1999 2016 9.8 10 CVE-2016-2000 2016 9.8 7.5 CVE-2016-2003 2016 9.8 7.5 CVE-2016-2009 2016 8.8 6.5 CVE-2016-2170 2016 9.8 7.5 CVE-2016-2173 2016 9.8 7.5 CVE-2016-2397 2016 9.8 10 CVE-2016-2510 2016 8.1 6.8 CVE-2016-3415 2016 9.1 6.4 CVE-2016-3427 2016 9 10 CVE-2016-3461 2016 7.2 4.3 CVE-2016-3642 2016 9.8 10 CVE-2016-4000 2016 9.8 7.5 CVE-2016-4368 2016 9.8 7.5 CVE-2016-4369 2016 8.8 6.5 CVE-2016-4372 2016 9.8 7.5 CVE-2016-4373 2016 9.8 7.5 CVE-2016-4385 2016 7.3 7.5 CVE-2016-4398 2016 8.8 6.5 CVE-2016-4405 2016 8.8 6.5 CVE-2016-4974 2016 7.5 6 CVE-2016-4978 2016 7.2 6 CVE-2016-5003 2016 9.8 7.5 CVE-2016-5004 2016 6.5 4.3 CVE-2016-5019 2016 9.8 7.5 CVE-2016-5229 2016 9.8 7.5 CVE-2016-5983 2016 7.5 6.5 CVE-2016-6199 2016 9.8 7.5 CVE-2016-6496 2016 9.8 7.5 CVE-2016-6500 2016 8.1 6.8 CVE-2016-6501 2016 9.8 7.5 CVE-2016-6793 2016 9.1 6.4 CVE-2016-6809 2016 9.8 7.5 CVE-2016-6814 2016 9.8 7.5 CVE-2016-7065 2016 8.8 6.5 CVE-2016-7462 2016 8.5 7.5 CVE-2016-8511 2016 9.8 7.5 CVE-2016-8648 2016 7.2 6.5 CVE-2016-8735 2016 9.8 7.5 CVE-2016-8736 2016 9.8 7.5 CVE-2016-8744 2016 8.8 9 CVE-2016-8749 2016 9.8 7.5 CVE-2016-9299 2016 9.8 7.5 CVE-2016-9498 2016 9.8 10 CVE-2016-9606 2016 8.1 6.8 CVE-2017-1000034 2017 8.1 9.3 CVE-2017-1000353 2017 9.8 7.5 CVE-2017-1000355 2017 6.5 4 CVE-2017-10108 2017 5.3 5 CVE-2017-10109 2017 5.3 5 CVE-2017-10271 2017 7.5 5 CVE-2017-10281 2017 5.3 5 CVE-2017-10345 2017 3.1 2.6 CVE-2017-10347 2017 5.3 5 CVE-2017-10357 2017 5.3 5 CVE-2017-10932 2017 9.8 10 CVE-2017-10934 2017 9.8 7.5 CVE-2017-10992 2017 9.8 10 CVE-2017-11283 2017 9.8 7.5 CVE-2017-11284 2017 9.8 7.5 CVE-2017-12149 2017 9.8 7.5 CVE-2017-12557 2017 9.8 10 CVE-2017-12628 2017 7.8 7.2 CVE-2017-12633 2017 9.8 7.5 CVE-2017-12634 2017 9.8 7.5 CVE-2017-13286 2017 7.8 7.2 CVE-2017-15089 2017 8.8 6.5 CVE-2017-15095 2017 9.8 7.5 CVE-2017-15692 2017 9.8 7.5 CVE-2017-15693 2017 7.5 6 CVE-2017-15703 2017 5 3.5 CVE-2017-15708 2017 9.8 7.5 CVE-2017-17485 2017 9.8 7.5 CVE-2017-2608 2017 8.8 6.5 CVE-2017-3066 2017 9.8 10 CVE-2017-3159 2017 9.8 7.5 CVE-2017-3199 2017 8.1 6.8 CVE-2017-3200 2017 8.1 6.8 CVE-2017-3201 2017 8.1 6.8 CVE-2017-3202 2017 9.8 7.5 CVE-2017-3203 2017 8.1 6.8 CVE-2017-3206 2017 9.8 7.5 CVE-2017-3207 2017 9.8 7.5 CVE-2017-3208 2017 9.8 7.5 CVE-2017-3241 2017 9 6.8 CVE-2017-3248 2017 9.8 7.5 CVE-2017-3506 2017 7.4 5.8 CVE-2017-3523 2017 8.5 6 CVE-2017-4995 2017 8.1 6.8 CVE-2017-5586 2017 9.8 7.5 CVE-2017-5636 2017 9.8 7.5 CVE-2017-5641 2017 9.8 7.5 CVE-2017-5645 2017 9.8 7.5 CVE-2017-5792 2017 9.8 7.5 CVE-2017-5878 2017 9.8 7.5 CVE-2017-5929 2017 9.8 7.5 CVE-2017-5983 2017 9.8 7.5 CVE-2017-7504 2017 9.8 7.5 CVE-2017-7525 2017 9.8 7.5 CVE-2017-8012 2017 7.4 5.8 CVE-2017-9363 2017 9.8 7.5 CVE-2017-9805 2017 8.1 6.8 CVE-2017-9830 2017 9.8 7.5 CVE-2017-9844 2017 9.8 7.5 CVE-2018-0147 2018 9.8 10 CVE-2018-1000058 2018 8.8 6.5 CVE-2018-1000613 2018 9.8 7.5 CVE-2018-1000861 2018 9.8 10 CVE-2018-1000873 2018 6.5 4.3 CVE-2018-10237 2018 5.9 4.3 CVE-2018-10654 2018 8.1 6.8 CVE-2018-11247 2018 9.8 7.5 CVE-2018-11779 2018 9.8 7.5 CVE-2018-12532 2018 9.8 7.5 CVE-2018-12539 2018 7.8 4.6 CVE-2018-1295 2018 9.8 7.5 CVE-2018-1297 2018 9.8 7.5 CVE-2018-1310 2018 7.5 5 CVE-2018-14667 2018 9.8 7.5 CVE-2018-14718 2018 9.8 7.5 CVE-2018-14719 2018 9.8 7.5 CVE-2018-14720 2018 9.8 7.5 CVE-2018-14721 2018 10 7.5 CVE-2018-15381 2018 9.8 10 CVE-2018-1567 2018 9.8 7.5 CVE-2018-15890 2018 9.8 10 CVE-2018-17200 2018 9.8 7.5 CVE-2018-18013 2018 7.8 7.2 CVE-2018-18628 2018 9.8 10 CVE-2018-1904 2018 9.8 7.5 CVE-2018-19276 2018 9.8 10 CVE-2018-19360 2018 9.8 7.5 CVE-2018-19361 2018 9.8 7.5 CVE-2018-19362 2018 9.8 7.5 CVE-2018-1999042 2018 5.3 5 CVE-2018-20732 2018 9.8 7.5 CVE-2018-2628 2018 9.8 7.5 CVE-2018-2657 2018 5.3 5 CVE-2018-2677 2018 4.3 4.3 CVE-2018-2815 2018 5.3 5 CVE-2018-2893 2018 9.8 7.5 CVE-2018-3004 2018 5.3 3.5 CVE-2018-3191 2018 9.8 7.5 CVE-2018-3245 2018 9.8 7.5 CVE-2018-3252 2018 9.8 7.5 CVE-2018-4939 2018 9.8 10 CVE-2018-5393 2018 9.8 10 CVE-2018-5968 2018 8.1 5.1 CVE-2018-6331 2018 9.8 7.5 CVE-2018-7489 2018 9.8 7.5 CVE-2018-8013 2018 9.8 7.5 CVE-2018-8016 2018 9.8 7.5 CVE-2018-8018 2018 9.8 7.5 CVE-2018-9522 2018 7.8 7.2 CVE-2018-9523 2018 7.8 7.2 CVE-2019-0187 2019 9.8 7.5 CVE-2019-0189 2019 9.8 7.5 CVE-2019-0192 2019 9.8 7.5 CVE-2019-0195 2019 9.8 7.5 CVE-2019-0305 2019 4.3 4.3 CVE-2019-0344 2019 9.8 7.5 CVE-2019-10086 2019 7.3 7.5 CVE-2019-10202 2019 9.8 7.5 CVE-2019-12384 2019 5.9 4.3 CVE-2019-12630 2019 9.8 7.5 CVE-2019-13116 2019 9.8 7.5 CVE-2019-14224 2019 7.2 9 CVE-2019-14540 2019 9.8 7.5 CVE-2019-14892 2019 9.8 7.5 CVE-2019-14893 2019 9.8 7.5 CVE-2019-16112 2019 8.8 6.5 CVE-2019-16891 2019 8.8 6.5 CVE-2019-17556 2019 9.8 10 CVE-2019-17564 2019 9.8 6.8 CVE-2019-17570 2019 9.8 7.5 CVE-2019-17571 2019 9.8 7.5 CVE-2019-18364 2019 9.8 7.5 CVE-2019-18580 2019 10 10 CVE-2019-18956 2019 9.8 7.5 CVE-2019-2725 2019 9.8 7.5 CVE-2019-2983 2019 3.7 4.3 CVE-2019-5326 2019 7.2 6.5 CVE-2019-6503 2019 9.8 7.5 CVE-2019-7727 2019 9.8 7.5 CVE-2019-7839 2019 9.8 10 CVE-2019-8352 2019 9.8 7.5 CVE-2019-9212 2019 9.8 7.5 CVE-2020-0082 2020 7.8 7.2 CVE-2020-10189 2020 9.8 10 CVE-2020-10644 2020 7.5 5 CVE-2020-10672 2020 8.8 6.8 CVE-2020-10673 2020 8.8 6.8 CVE-2020-10969 2020 8.8 6.8 CVE-2020-11111 2020 8.8 6.8 CVE-2020-11112 2020 8.8 6.8 CVE-2020-11113 2020 8.8 6.8 CVE-2020-11620 2020 9.8 6.8 CVE-2020-11972 2020 9.8 7.5 CVE-2020-11973 2020 9.8 7.5 CVE-2020-12000 2020 7.5 5 CVE-2020-12133 2020 9.8 10 CVE-2020-12760 2020 8.8 6.5 CVE-2020-12835 2020 9.8 7.5 CVE-2020-1714 2020 8.8 6.5 CVE-2020-1947 2020 9.8 7.5 CVE-2020-2551 2020 9.8 7.5 CVE-2020-2555 2020 9.8 7.5 CVE-2020-2583 2020 3.7 4.3 CVE-2020-2604 2020 8.1 6.8 CVE-2020-2756 2020 3.7 4.3 CVE-2020-2757 2020 3.7 4.3 CVE-2020-2883 2020 9.8 7.5 CVE-2020-2950 2020 9.8 7.5 CVE-2020-3280 2020 9.8 10 CVE-2020-4448 2020 9.8 10 CVE-2020-4449 2020 7.5 5 CVE-2020-4450 2020 9.8 10 CVE-2020-5327 2020 9.8 9.3 CVE-2020-7961 2020 9.8 7.5 CVE-2020-8840 2020 9.8 7.5 CVE-2020-9484 2020 7 4.4 CVE-2020-9546 2020 9.8 6.8 CVE-2020-9547 2020 9.8 6.8 CVE-2020-9548 2020 9.8 6.8 About No description, website, or topics provided. Resources Readme Releases 1 Initial release Latest 5 hours ago