{"id":6547,"date":"2020-10-30T08:02:29","date_gmt":"2020-10-30T11:02:29","guid":{"rendered":"https:\/\/addvalue.com.br\/novo\/?p=6547"},"modified":"2020-10-30T14:21:28","modified_gmt":"2020-10-30T17:21:28","slug":"resumo_vulnerabilidade","status":"publish","type":"post","link":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/","title":{"rendered":"Resumo de Vulnerabilidades da Semana de 12 de outubro de 2020"},"content":{"rendered":"<p>O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Em alguns casos, as vulnerabilidades do Boletim podem n\u00e3o ter pontua\u00e7\u00f5es CVSS atribu\u00eddas ainda. Visite o NVD (<a href=\"https:\/\/nvd.nist.gov\/vuln\/search\">https:\/\/nvd.nist.gov\/vuln\/search<\/a>) para obter informa\u00e7\u00f5es de vulnerabilidade atualizadas, que incluem as pontua\u00e7\u00f5es CVSS assim que estiverem dispon\u00edveis.<\/p>\n<p><span style=\"color: #333399;\"><strong>Destaque Semanal<\/strong><\/span><\/p>\n<p>O destaque de alerta de vulnerabilidades desta semana vai para os dispositivos de conectividade da Netgear devido a sua popularidade, exposi\u00e7\u00e3o e grau de risco.<\/p>\n<p>Vale destacar que estes dispositivos est\u00e3o geralmente conectados \u00e0 Internet e permitem o acesso remoto, juntando com vulnerabilidades que podem burlar os controles de acesso como autentica\u00e7\u00e3o, formam uma combina\u00e7\u00e3o t\u00f3xica e perigosa para o funcionamento adequado da rede.<\/p>\n<p>\u00c9 recomendado aos administradores e usu\u00e1rios destas tecnologias afetadas, consultarem o site do fabricante para uma atualiza\u00e7\u00e3o de software do produto e uma an\u00e1lise peri\u00f3dica de vulnerabilidades para manter os dispositivos sempre atualizados com os \u00faltimos patches de corre\u00e7\u00e3o.<\/p>\n<table width=\"700\">\n<tbody>\n<tr>\n<td>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>You are subscribed to National Cyber Awareness System Bulletins for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available.<\/p>\n<p><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3VzLWNlcnQuY2lzYS5nb3YvbmNhcy9idWxsZXRpbnMvc2IyMC0yOTMifQ.GiSRmllJMhfF6Dn0nVFy-Gdn69ZsQzHZGPin1nFUH_g\/s\/1193554985\/br\/87099655821-l\"><strong>Vulnerability Summary for the Week of October 12, 2020<\/strong><\/a><\/p>\n<p><em>10\/19\/2020 07:14 AM EDT<\/em><\/p>\n<p>Original release date: October 19, 2020<\/p>\n<p>The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST <a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi92dWxuL3NlYXJjaCJ9.qByT_WX0S7wwL9YO8c_OjR7jiMZn9Kq17u8drnbsfKA\/s\/1193554985\/br\/87099655821-l\">NVD<\/a>. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.<\/p>\n<h4>High Vulnerabilities<\/h4>\n<table width=\"100%\">\n<thead>\n<tr>\n<td width=\"24%\"><strong>Primary<br \/>\nVendor -- Product<\/strong><\/td>\n<td width=\"44%\"><strong>Description<\/strong><\/td>\n<td width=\"10%\"><strong>Published<\/strong><\/td>\n<td width=\"8%\"><strong>CVSS Score<\/strong><\/td>\n<td width=\"14%\"><strong>Source &amp; Patch Info<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>foxitsoftware -- foxit_reader<\/td>\n<td>This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PhantomPDF 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the configuration files used by the Foxit PhantomPDF Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-11308.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxNSZ2ZWN0b3I9QVY6TC9BQzpML0F1Ok4vQzpDL0k6Qy9BOkMifQ.Wix8vYQ4dgHz8fQK8kDZE1qEys4fJ6osThoGxUajq8g\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTUifQ.lodvmvmbRFeQIqmHWpQt8QsJWEwY9iwt_cl8hzefYP0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17415<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.LwyDL_DNvNuW7UMvjlNlXlP8olJE6mx_UAY-qyNOYQw\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzMi8ifQ.KQoH41Nsnmi6cw3YXWWiGesDK1FaT2XFHZBaV6E_JQs\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxitsoftware -- foxit_reader<\/td>\n<td>This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the configuration files used by the Foxit Reader Update Service. The issue results from incorrect permissions set on a resource used by the service. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Was ZDI-CAN-11229.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxNCZ2ZWN0b3I9QVY6TC9BQzpML0F1Ok4vQzpDL0k6Qy9BOkMifQ.FXnxhn0Q8XGdqKJnyUQAQvPy7tvI-4Y7kzedjatqG98\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTQifQ.ywiWLs5KFEYSa2U7eHTcOyorMkJqtMd9ZWKq8bfvuh0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17414<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.Bk4KXm7fExzMyJ9Tq36_k6ETRrXm8zd4do1FdE9MbAo\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzMS8ifQ.B58jwMdDrUrPxhArDi4YIb-haCL2UgEbq8jT5TnHAQQ\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In multiple settings screens, there are possible tapjacking attacks due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-155288585<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDE2JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOkMvSTpDL0E6QyJ9.rs8z_yOgleH0GP3sDh_AlSCkf9GI85FhZHpcvtW2FlU\/s\/1193554985\/br\/87099655821-l\">9.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxNiJ9.H5YpNYYjTlDRP_voC2WoXdlqvgAMUbsiyVmPZj_huJ0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0416<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.Kdi5fbfESOIDUXcfrpWrssbcMjyvfR4cq3tCIuHWv5o\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In gatt_process_read_by_type_rsp of <a href=\"http:\/\/gatt_cl.cc\/\">gatt_cl.cc<\/a>, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158833854<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzc3JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOkMvSTpOL0E6TiJ9.dTS26O7QXEJPRvYLJ-guJBObqu0gIQgKqf7VdJo_-ro\/s\/1193554985\/br\/87099655821-l\">7.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM3NyJ9.04RLoAe45HjrUGTE2eb9vZoKkQ76FQ6zl6Mqwm8-eI4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0377<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.XdD3JnDeH28XzaSGjz1pGPrOut8DQ4lf7-CTo6FoBuQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In setUpdatableDriverPath of GpuService.cpp, there is a possible memory corruption due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-162383705<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDIwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpDL0E6QyJ9.I7F6iNCpXhg7iLQDN7Z9LS-d41aBo-fcYe3b_PI_Of4\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQyMCJ9.slkq5_zLu8J-4YR5zTo6f3YqdecFbn71CAIoMVCw_yA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0420<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.rzNo2Kb544ZIfSA6aUGr6vXC7qG6tK-XBIzFwueMAMI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In appendFormatV of String8.cpp, there is a possible out of bounds write due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161894517<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDIxJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpDL0E6QyJ9.ZeY0uLI4sQK92ePOYC3AyPx1R9IZ6SKFtt-3wC1ZpyM\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQyMSJ9.eupzOwjHa5idN_PuuvFAkb5dmprwT9hOrvevsqVxir8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0421<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0._OEKmumPo2eRHSgacgXVFqMVETDtCzORwNgtnw8i22E\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008257<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMjgzJnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOk4vSTpDL0E6QyJ9.6dOkWYfhc7mWnLfH6UxEueuHkvNRvUD8vQzL1CqjgHk\/s\/1193554985\/br\/87099655821-l\">9.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDI4MyJ9.B1kVPq7vVHc9GZYrEaGhEn55RnARFeuuy8f63KdV4q4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0283<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.Q0ERNrla1jzCOOSNz1cd9FKpKltPBqz2HXxRp1pT-Ng\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163003156<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzc2JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOkMvSTpOL0E6QyJ9.ZXiuW50e2NNJL6EHq5i-oaU4WY1zWS3c-pGU9tR2vig\/s\/1193554985\/br\/87099655821-l\">9.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM3NiJ9.OdPFjKeLEdkKOTzhQqpQWzR7THjsyNI0ulfxxXnaLd4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0376<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.QceEUlpbT8MPPcnjFqpnpY0Yx_3xfeMWzypLvFNjysY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-163008256<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzcxJnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOkMvSTpOL0E6QyJ9.QkbJKlMDU4Hgzbm5C0mX9u_-wJDFq0r-CqNz0EBngCY\/s\/1193554985\/br\/87099655821-l\">9.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM3MSJ9.Np1DPvW-ixW4lq4RQsyJxtzyxnalxaQmJYhXIyxD3z8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0371<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.I1IPm5RScvqZZP2Zi4YI8Zmh8Cr-2jpQjtu8DZMvMA8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980455<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzY3JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOk4vSTpDL0E6QyJ9.nDON3pbtfXAo8uOOZRahv1LPgp6e_Ii5huCGm6R1nQs\/s\/1193554985\/br\/87099655821-l\">9.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM2NyJ9.atOKoVkqerMOmd3HZmilqWw_O-pj3UZ3PyhrskQUK8I\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0367<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.cknfqluD2XOac74Oi8h_tfKNQnk2td4NsfLZWpRd3Ps\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>There is a possible out of bounds read due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-162980705<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzM5JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOkMvSTpOL0E6QyJ9.RkT5dcaKT5JiOZBNWePtpKAEEns9PgAB1TsN8KO2Q-4\/s\/1193554985\/br\/87099655821-l\">9.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDMzOSJ9.Y2VavLXBNjQHFmfGLczirSF78KWI84jjhV33y6JMUXY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0339<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.XQUwhUSrI9KJrp3XzUETmnH2trpz4jChoRJmex2G1VY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In remove of String16.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-156999009<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDA4JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpDL0E6QyJ9.EcRWbnO5OzbpOLPrnyO_zvf5ILnkbqH_zkPEOL20emg\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQwOCJ9.0E5V00xsUp6WisqgfjVnw2diHT7mYiGWWl1XpLVrScc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0408<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.o5lYYji3c0TvnvkG_bIptE0wbCu_paMWBDc6KqLDz4g\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- p30_pro_firmware<\/td>\n<td>HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have an out-of-bounds read and write vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the process reboot.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MTA4JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOk4vSTpOL0E6QyJ9.UvI0a5RiKVwKA7i_yNgLovpx1cdVkL9AnM_Lo9y7mRk\/s\/1193554985\/br\/87099655821-l\">7.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEwOCJ9.JQ2S7sBlw6TJIFUUaO-XjH8Jo3JoRNNYXxAbYWoLM_w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9108<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLW91dG9mYm91bmQtZW4ifQ.1iWDI88MOyAFHHNJQ646nzyCKs6bPkwEcEJ3klYk9RY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- p30_pro_firmware<\/td>\n<td>HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have an out-of-bounds read and write vulnerability. An unauthenticated attacker crafts malformed message with specific parameter and sends the message to the affected products. Due to insufficient validation of message, which may be exploited to cause the process reboot.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MTA3JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOk4vSTpOL0E6QyJ9.HRYO1dycEYpkYCf-1qBtUkfDmmv-YdfZuwDkcW2JoE8\/s\/1193554985\/br\/87099655821-l\">7.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEwNyJ9.fPhX9nBcpWvW-msbJuuz3E4NKYNyUony_EuzyEn-jOQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9107<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLXJlYWR3cml0ZW91dGJvdW5kLWVuIn0.OraR6HkYw-NE3aYfv5w1cp_QvJ6nNWkRsnW3BkEubuE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- cognos_analytics<\/td>\n<td>IBM Cognos Analytics 11.0 and 11.1 could allow a remote attacker to execute arbitrary code on the system, caused by a CSV injection. By persuading a victim to open a specially-crafted excel file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 176610.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00MzAyJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOkMvSTpDL0E6QyJ9.CDQQfGgzH8kQuai_KBtAsI3z7qZtKWcoUgZRYI8bsBI\/s\/1193554985\/br\/87099655821-l\">9.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDMwMiJ9.6HX_E1RDWdHOLYUzqtIkNLOhl9qFaCr4B0EeWC6_QwU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4302<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE3NjYxMCJ9.hJaGUyZ4TkhY9TXYt437SC0rd3ymwW9AFko-hbeAb2c\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2OTIyIn0.jAMksloCgqLQGGljnvB1PB3uzocqxW7YYoMshcglm0A\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium<\/td>\n<td>IBM Security Guardium 11.2 is vulnerable to CVS Injection. A remote privileged attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-ForceID: 186696.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00Njg5JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOkMvSTpDL0E6QyJ9.9gDBVAIfCxUfQhVfsrAfAGsEM4KdjGdfkbsK4UjH7hI\/s\/1193554985\/br\/87099655821-l\">8.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY4OSJ9.wrm8oAIziOP1WbkdZwF1TdIgJlWZ-_YkG-FC46lmU7s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4689<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjY5NiJ9.LUVBqjvRlXvoxL4g_VlMqbf5BE-wyzpbbhkd3EOjpdM\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2ODg0In0.95ZCcjGMItxbVVeMLU6T3zbfNaSLR8I4k3J4oJF-pJM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>lenovo -- diagnostics<\/td>\n<td>A DLL search path vulnerability was reported in Lenovo Diagnostics prior to version 4.35.4 that could allow a user with local access to execute code on the system.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC04MzM4JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpDL0E6QyJ9.ZYpyrnuZv4CQAlAv0iljYtXoEILWE5Qo4-24X8o1gvw\/s\/1193554985\/br\/87099655821-l\">7.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODMzOCJ9.tpqS25_tUKf1zziXUocJs6F_K5ZEFp3jO3O_4K4zatY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8338<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQubGVub3ZvLmNvbS91cy9lbi9wcm9kdWN0X3NlY3VyaXR5L0xFTi0zMjcwMiJ9.lV4rgUu6_Qhuuhme3Ld7ZQNVk49Ns6pGtcVCBBaTZ7A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6200_firmware<\/td>\n<td>Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6050 before 1.0.1.22, JR6150 before 1.0.1.22, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R69002 before 1.2.0.62, and WNR2020 before 1.1.0.62.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwOCZ2ZWN0b3I9QVY6Ti9BQzpML0F1Ok4vQzpDL0k6Qy9BOkMifQ.Yw06K3oDCQOuPt2s36wOPMB75BS9wvt0t8-SooGz5hQ\/s\/1193554985\/br\/87099655821-l\">10<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDgifQ.duoRRDTFWHdVYApi5bUBte5pMgBgCLL61fMkueJR6_o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26908<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0Ni9TZWN1cml0eS1BZHZpc29yeS1mb3ItQXV0aGVudGljYXRpb24tQnlwYXNzLVNvbWUtTW9kZW1zLWFuZC1Sb3V0ZXJzLVBTVi0yMDE5LTAwMDEifQ.SBx6wuMtmXvk2hVKqsSyJ9MAzcJCV-ZWUqkl_yDJC2w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d7800_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.58 and R7500v2 before 1.0.3.48.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwOSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpDL0k6Qy9BOkMifQ.Ci9xT49zXNULpH_cvr4Qej3S_-qFmsR6nYKiwRnppGQ\/s\/1193554985\/br\/87099655821-l\">8.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDkifQ.0CWkuQiSfNpe6DEQPWLcbCyiFgcJOHP1Pe7EqTSEAlk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26909<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0NC9TZWN1cml0eS1BZHZpc29yeS1mb3ItUHJlLUF1dGhlbnRpY2F0aW9uLUNvbW1hbmQtSW5qZWN0aW9uLW9uLVNvbWUtUm91dGVycy1QU1YtMjAyMC0wMTYzIn0.hxeIkVeKDjfG0RpAmGI2ClG4C3W5gzCTdgVWpBNCqqM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- rbk752_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwMiZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpDL0k6Qy9BOkMifQ.DiHcXNGgqf9MIQjAWyTWTOXw9LpkaIdWZRgaQfzFUDQ\/s\/1193554985\/br\/87099655821-l\">8.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDIifQ.9RjJB_TyyH656p3U3-sbyQZr9Bi6yVuGZiZo5CeI1LM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26902<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1Mi9TZWN1cml0eS1BZHZpc29yeS1mb3ItUHJlLUF1dGhlbnRpY2F0aW9uLUNvbW1hbmQtSW5qZWN0aW9uLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwNDEifQ.3ph4tchuc8hSlk2ei3R0JyXtFcnNW-RX87Bn_Au_2_w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- rbk852_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwNyZ2ZWN0b3I9QVY6QS9BQzpML0F1OlMvQzpDL0k6Qy9BOkMifQ.aSMFtXIZBG8x4zAVsF-m2noeAPlIljGPHhLs-upKSIs\/s\/1193554985\/br\/87099655821-l\">7.7<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDcifQ.NN7ZWCqcNPKvuPtu-7AY1ZhXSKSCBlQ-zJRs9KjbcIE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26907<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0Ny9TZWN1cml0eS1BZHZpc29yeS1mb3ItUHJlLUF1dGhlbnRpY2F0aW9uLUNvbW1hbmQtSW5qZWN0aW9uLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAyNjQifQ.GEvnFa0fmovjwp4njTtz-Oj6Tc5kGNjyk2Zq0LtD6OI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Medium Vulnerabilities<\/h4>\n<table width=\"100%\">\n<thead>\n<tr>\n<td width=\"24%\"><strong>Primary<br \/>\nVendor -- Product<\/strong><\/td>\n<td width=\"44%\"><strong>Description<\/strong><\/td>\n<td width=\"10%\"><strong>Published<\/strong><\/td>\n<td width=\"8%\"><strong>CVSS Score<\/strong><\/td>\n<td width=\"14%\"><strong>Source &amp; Patch Info<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>apache -- fineract<\/td>\n<td>The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAxOC0yMDI0MyZ2ZWN0b3I9QVY6Ti9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.HjZe6_abooTUuitnDZJAwR1tGxdeFgyNoTOiVd-ElQg\/s\/1193554985\/br\/87099655821-l\">5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTgtMjAyNDMifQ.sJc0pqh5CqBgXaUKZB_o3iueOwUZUN4AO-Us4T0FCcg\/s\/1193554985\/br\/87099655821-l\">CVE-2018-20243<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjA0MGQ0NjgzNWFmZjNjMTkyNjU2YjU0OWNhODJmNjJkODdmYjA0NGVmOWE5ZGQ0OTQwOGI0OWI0JTQwJTNDZGV2LmZpbmVyYWN0LmFwYWNoZS5vcmclM0UifQ.646tGeX8WT1GOTN0Z6B-f9Cx6SOBguykolob-rRm6g0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxitsoftware -- 3d<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11226.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxMyZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6UC9BOlAifQ.54GNeQSa22RDl2T8AuWM1O54kSEiXVu0PnHje1mu2v4\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTMifQ.0Iry0Y88wXOGz0XUNBzG97aJEKMMNK4YjKxlukgXW0A\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17413<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.HUHec_zR7di50v_8AOitidgiCdOWNFAfEYfd8KDQg2A\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzNS8ifQ.TQUta8_8mkxHlMQaraf9e0Xb6XJoT4dyZ3xQKduBV7I\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxitsoftware -- 3d<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11224.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxMiZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6UC9BOlAifQ.5vtbs36tKGl1pTJWEtj157-hxRQmKWJ45CtTQB5Fuvs\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTIifQ.CxAeSMjWLHEvoPs3AUrFS7d-hOjj9gOtW6JKFFRla3M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17412<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxNzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.tQJ_XzzzHhtgBQ00O8CdJRkInwewtUZbI-VxdECmZ_0\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzMC8ifQ.EmVxjK9mJSmq3fIrA85qOBgkoBCcjdSy3w1it8m6yzY\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxitsoftware -- 3d<\/td>\n<td>This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11190.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxMSZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6Ti9BOk4ifQ.HaTrcJEYkJgPNw3gqAaKNufH-0d4tafYRUIPzxR3r-k\/s\/1193554985\/br\/87099655821-l\">4.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTEifQ.1QO7TU8p-l-tcuEOgTZTemqd2DZoFiWEhLNCqcUK8N8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17411<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.apebh4rYXh6AWKPPkCUFmRcW26TzCbp3jPrsxo57v-g\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIyOS8ifQ.96QJECw51medV7Ur-kUzz3StycgjaV6cum5F7cyCSBg\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxitsoftware -- foxit_reader<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of GIF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11135.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xNzQxMCZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6UC9BOlAifQ.vHlh0aTE_ch62G1Lg2jNYBvm2LHSicU7OnTOtEzWtCc\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTAifQ.hgQEXPHh3Hd9SDOFYMSFBRaRiI_BEnf6uvv4F9tKYkA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17410<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.sBZT_qVwSh27NyHIiekKIBfhHcswI_MQlJObhTESm2I\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIyOC8ifQ.4sD--chvd75dKDk1biRAP43EemxUrAwviIH4lalHax8\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>garfield_petshop_project -- garfield_petshop<\/td>\n<td>A cross-site request forgery (CSRF) vulnerability in mod\/user\/act_user.php in Garfield Petshop through 2020-10-01 allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjUyMiZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6UC9BOlAifQ.77g6Os42ha2gXhXI_dKSO0NUToo9kiV9Uzo5FE_2rPo\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY1MjIifQ.AZiOdoOfkE7K3zRzVBsmxaNnLgIhbS0j5WLCNHdL1sY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26522<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vcGFja2V0c3Rvcm1zZWN1cml0eS5jb20vZmlsZXMvMTU5NTIwL0dhcmZpZWxkLVBldHNob3AtMjAyMC0xMC0wMS1Dcm9zcy1TaXRlLVJlcXVlc3QtRm9yZ2VyeS5odG1sIn0.BigV2gFcTfOEevlY-DdKYteh9OgVVgBE5EF01D68IK0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vcnlzZWMuaW8vYWR2L1BldHNob3BfQWRkQWRtaW5fRXhwbG9pdC50eHQifQ.DQ8mXNLX_XyAiLLLa15arxn8j7e2bKAuvvRM6evThWI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2RlbW8uZGV0YXBvcy5jby5pZC9wZXRzaG9wLyJ9.RyLDG3VdJuXz6zFz6d1jWyN2PbJPfekgpPel1Cn0YXY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2RldGFwb3MuY28vIn0.0bzVsETH1w_8vPSWPEfcE924hyIWdekut_eSoohqz5I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In getCarrierPrivilegeStatus of UiccAccessRule.java, there is a missing permission check. This could lead to local information disclosure of EID data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-159062405<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMjQ2JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpOL0E6TiJ9.5_Lx9jHUjpmK3Hzrh_z7a0xlsZstP7LXTBxqepeFERg\/s\/1193554985\/br\/87099655821-l\">4.9<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDI0NiJ9.rSqVfU2I2KkXlso0VC_QTu1cVgOLuelthzwzhLJsDpQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0246<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.nF0k_SkE5G0o06CPyyNO0B9UZvtvE6WsoOLYv7lbhxo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In ~AACExtractor() of AACExtractor.cpp, there is a possible out of bounds write due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-142641801<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDExJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOlAvSTpOL0E6TiJ9.OkR2URAJPmzZfAUM_dXnHCZ4o9rAMUpOmd3zoe-lbjw\/s\/1193554985\/br\/87099655821-l\">4.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxOTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxMSJ9.b5hSojDLXjmJbj8EJRbgNV7iCDiFOMtjM5SNkYzXjYU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0411<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.5vTzzeTEA6IB1rohZzVvuKn7SuZoxdT93IY0T8VRfNI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In gatt_process_read_by_type_rsp of <a href=\"http:\/\/gatt_cl.cc\/\">gatt_cl.cc<\/a>, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-158778659<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDEzJnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.KqusopsH8_Lg-_JyIrc4awtV1XCzXTiqfSwUOfxDxjc\/s\/1193554985\/br\/87099655821-l\">5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxMyJ9.gTlvgRWBLSsaTrL7ZXfYibW6aCo1zF7x4sroEipuMI0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0413<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.Q5VZcjbezFLpvyrsOR78l4kguGMQ1z16s9betGXkfUQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In showDataRoamingNotification of NotificationMgr.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-153356561<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDAwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpOL0E6TiJ9._CAXge3VKaXH3s6IesuNcM-Y7lptri-ZECBuUzUcaJk\/s\/1193554985\/br\/87099655821-l\">4.9<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQwMCJ9.VJWNju_kZus0YzFUNs9bN0AbB8jerglm2I6vRXlOJeA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0400<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.3-8RxdOGtrt3IU9ZBRb1I2_yrC4tMhEUhtHB2HoY7L4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-157748906<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzc4JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpOL0E6TiJ9.pvngHPoCdQDAzBlEKszz3H076tQqbt-eBH6RPnWgZrM\/s\/1193554985\/br\/87099655821-l\">4.9<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM3OCJ9.2v5VneEfKTLmTSOIfZuBVIQqX3dOxgyHRknZgJnURIg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0378<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.L6DcrtcDQUHSoEP_SoIgxx1GK2xL6P5emhLR8VAW2S8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In updateMwi of NotificationMgr.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-154323381<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wMzk4JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOkMvSTpOL0E6TiJ9.-zAwFVp4Fnmyj977CXZI_wSR8rQ042vyIkLa17TQh10\/s\/1193554985\/br\/87099655821-l\">4.9<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDM5OCJ9.6xOuWRGgebLYZbOIhn8pXqvRUwr-cSS_bvSSE6EHRTk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0398<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.kKeycel1lmrMccjwoWlV-9QN-1ahRk6EK4tMwISokKE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In SurfaceFlinger::createLayer of SurfaceFlinger.cpp, there is a possible arbitrary code execution due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-137284057<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAxOS0yMTk0JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpQL0E6UCJ9.dngmOyj2TOQdDgziROKpgseCk9v1hwSQEWpChT-mDiw\/s\/1193554985\/br\/87099655821-l\">4.6<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMjE5NCJ9.8aPiojnIFKnMTt6qytn2WEQOfGKSHoQLQrIrQ3XeuAk\/s\/1193554985\/br\/87099655821-l\">CVE-2019-2194<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.7-2y0AxEDO8T9DmVPWBE_zGFAi3anqQoHrJFtJVhRhg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In AudioFlinger::RecordThread::threadLoop of audioflinger\/Threads.cpp, there is a possible non-silenced audio buffer due to a permissions bypass. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-157708122<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDE0JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOlAvSTpOL0E6TiJ9.CTKdS4Nmci1RiP0zmAfG494n6gkFZ2XpTuMfuSDYvqQ\/s\/1193554985\/br\/87099655821-l\">4.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxNCJ9.TmbOFgTy9ID2OrqZB55McsbfSzuzJs3i3i45jxTtAS4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0414<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.ZeRCLVahwAzV66NAPmiRd4gTCSIzigRwvVNHGqBcFaI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- fusionaccess<\/td>\n<td>FusionAccess version 6.5.1 has an improper authorization vulnerability. A command is authorized with incorrect privilege. Attackers with other privilege can execute the command to exploit this vulnerability. This may compromise normal service of the affected product.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MDkwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpQL0E6UCJ9.CKcD4Kppzy2Zp0j1bkeIIkO33zBvSHUQbIXisvJLzAA\/s\/1193554985\/br\/87099655821-l\">4.6<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTA5MCJ9.sQk5EdjaE6Ifgxtdkk6OYMFrbfyXgrODlzRYhtGgQCE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9090<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLWZhLWVuIn0.3qT9038b9MYrKlbomEZOlMgQr5Ua1sAXJcxuQyCCAqQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- cognos_analytics<\/td>\n<td>IBM Cognos Analytics 11.0 and 11.1 could be vulnerable to a denial of service attack by failing to catch exceptions in a servlet also exposing debug information could also be used in future attacks. IBM X-Force ID: 179270.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00Mzg4JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Ti9DOlAvSTpOL0E6UCJ9.a8_I7hkg1mkoxyVQt-wm4OhvrHs2BJvU92bIbsgA_TE\/s\/1193554985\/br\/87099655821-l\">6.4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDM4OCJ9.HSvAZjFgSmos4tAxee8YKd1t524omMdOF9uX8ePME0U\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4388<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE3OTI3MCJ9.7IQFZoignuUp_pfWzMULjsVxaDi4GUky2tjOyS9vs0s\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2OTIyIn0.Hnj_n4_0HuEfmKjZ2sVnZy9oO4FgpF61OBmAMPztCVA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- infosphere_information_server<\/td>\n<td>IBM InfoSphere Information Server 11.5 and 11.7 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-Force ID: 188150.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00NzQwJnZlY3Rvcj1BVjpBL0FDOk0vQXU6Ti9DOlAvSTpQL0E6TiJ9.R4dsgC7qe7Fwvde66K5k5kNkXmeIMFOhtSpWpGS5xe4\/s\/1193554985\/br\/87099655821-l\">4.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc0MCJ9.v6mHH_FtcGmbZ6V-LDXup5FlCUTLdfBrfotnrUChfD8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4740<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4ODE1MCJ9.KGW49faawOAnt3qYErcXMisDjShtcmjqLZ1OEDosMBw\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2OTIwIn0.B-Z0yMrs00mAxEEwDaHU4JTJhnxG-bR-Rvkl8DKWNAg\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium<\/td>\n<td>IBM Security Guardium 11.2 could allow an attacker with admin access to obtain and read files that they normally would not have access to. IBM X-Force ID: 186423.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00Njc4JnZlY3Rvcj1BVjpOL0FDOkwvQXU6Uy9DOlAvSTpOL0E6TiJ9.MhT7roEAOqnITcC74QC2wj1ZH-eBihlYIBmahHL_Uuc\/s\/1193554985\/br\/87099655821-l\">4<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY3OCJ9.j6NdDNOw2xmKRfLz5a6ZryqNWJVHh7-_BlwvkIzoeEQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4678<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjQyMyJ9.cUN2A1mCKASjInWcjEnWqB8ZdjHuTTCwG8hps31SA0k\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2ODg0In0.8mt0Ixuf-0a6ekJ0nTg5z8KrgbuI3W-o2GjLsA5v-vc\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>linux -- linux_kernel<\/td>\n<td>A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNTY0NSZ2ZWN0b3I9QVY6Ti9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.DqI7KS8QPd4AkDlO1YrZs4uvt3T4C8fzeuYb04oJH4c\/s\/1193554985\/br\/87099655821-l\">5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjU2NDUifQ.B5X3adwO1QHEchY2FCD5cjVRLVtG98xHHIjGNc5U8xM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25645<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vbGlzdHMub3BlbnN1c2Uub3JnL29wZW5zdXNlLXNlY3VyaXR5LWFubm91bmNlLzIwMjAtMTAvbXNnMDAwMzUuaHRtbCJ9.MEEa97VNEbk-HiLbzj6EH7Hywy12JsUqLJ2BqlAKdX8\/s\/1193554985\/br\/87099655821-l\">SUSE<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2J1Z3ppbGxhLnJlZGhhdC5jb20vc2hvd19idWcuY2dpP2lkPTE4ODM5ODgifQ.dAMdwWAkOQ42bQwmWIabsoJctiv4H-kutiZZyCiGPKs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxMCZ2ZWN0b3I9QVY6QS9BQzpML0F1OlMvQzpQL0k6UC9BOlAifQ.FrOwSsSGKwZKxHzNsH4JGnf-k6agfiWulnkpmIgpZb4\/s\/1193554985\/br\/87099655821-l\">5.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyMzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTAifQ.RGULuhns5bnhCEfkg7X7IJeksrx3_VfYjTEjH6jmpms\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26910<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0My9TZWN1cml0eS1BZHZpc29yeS1mb3ItUG9zdC1BdXRoZW50aWNhdGlvbi1Db21tYW5kLUluamVjdGlvbi1vbi1Tb21lLVdpRmktU3lzdGVtcy1QU1YtMjAyMC0wMDMxIn0.5LHKF02WZDGGoPNaeGl4gUMsknhU7n46c-OejPtAySU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyOCZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.2SJAmX4iqLNjNrh3mpoDO03lsi-Oe1DMA_4YGQXWVF0\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjgifQ.pDczbz_C_SOSgNJRojC57WKLyMlufFK-70LFH532YyM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26928<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyNC9TZWN1cml0eS1BZHZpc29yeS1mb3ItQXV0aGVudGljYXRpb24tQnlwYXNzLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwMjcifQ.6_Ya_DQTVmPdwXu7oVf89JhCsFzKTjWuoQbkINzoUrM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyNiZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.z-_uR-xpOFzl6Cl-oQaxVjL5zsCbSTL-qb6M6mBtGlQ\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjYifQ.Gr0jH6YmRSijnGUnkpC_cwMki8PflS9dHabFsTstvFw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26926<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyNi9TZWN1cml0eS1BZHZpc29yeS1mb3ItQXV0aGVudGljYXRpb24tQnlwYXNzLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwMjgifQ.PwGJiO5LU0cQdxiu5Tnzb6J5aB5lkwft8lQq-lveQK4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6100_firmware<\/td>\n<td>Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.63, R7800 before 1.0.2.60, R8900 before 1.0.4.26, R9000 before 1.0.4.26, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, SRK60 before 2.2.2.20, SRR60 before 2.2.2.20, SRS60 before 2.2.2.20, WN3000RPv2 before 1.0.0.78, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.70, XR450 before 2.3.2.40, and XR500 before 2.3.2.40.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxMyZ2ZWN0b3I9QVY6QS9BQzpML0F1OlMvQzpQL0k6UC9BOlAifQ.HHBYX0gnXEWJ9PXFwcpgtUNHsW9OefDMi1C4WN7DhE8\/s\/1193554985\/br\/87099655821-l\">5.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTMifQ.0Dia2vgmKhVdILrUphS-cdgyrKpBTD0KoRWG39ur4x0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26913<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0MC9TZWN1cml0eS1BZHZpc29yeS1mb3ItUG9zdC1BdXRoZW50aWNhdGlvbi1TdGFjay1PdmVyZmxvdy1vbi1Tb21lLVJvdXRlcnMtYW5kLVdpRmktU3lzdGVtcy1QU1YtMjAxOC0wMTQwIn0.28G0b-Ql7b7FS5Jqh3JhKGRX12F5YwzCdmrtSzHwKfE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6200_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxNCZ2ZWN0b3I9QVY6QS9BQzpML0F1OlMvQzpQL0k6UC9BOlAifQ.rQSQozOKEEuM8g33hfBhuPTi953sIw0MV19CoGswRAU\/s\/1193554985\/br\/87099655821-l\">5.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTQifQ.ciye1za5ZqlppIjZi8B2i4qngZmtBX8g73oG_YCtpOM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26914<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzOS9TZWN1cml0eS1BZHZpc29yeS1mb3ItUG9zdC1BdXRoZW50aWNhdGlvbi1Db21tYW5kLUluamVjdGlvbi1vbi1Tb21lLVJvdXRlcnMtUFNWLTIwMTktMDAxNCJ9.E1_S3aDQ_b0lHFi8qvaIvZaE3W5ZTeCgfFX108pJP8U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6200_firmware<\/td>\n<td>Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.50, and WNR2020 before 1.1.0.62.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxNiZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.95gB0-rWr2yQWeOwAAHhIOC2HsjZPpZd878cJI1Wvnw\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTYifQ.LxwOrrRZlbp71VAJTll4TD2bLm9Me4TG7PVN9Z59-QI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26916<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzNy9TZWN1cml0eS1BZHZpc29yeS1mb3ItU2VjdXJpdHktTWlzY29uZmlndXJhdGlvbi1vbi1Tb21lLVJvdXRlcnMtUFNWLTIwMTktMDAxMiJ9.eGvEKzcNCCWMZ9IAt2_ySVVMlddTtddYOrZvXpqwC6U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6200_firmware<\/td>\n<td>Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxMSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.7eLf0XYmfofZLMM2HM1JGrGx7nF_RClnxXh0izINE7c\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTEifQ.6qaU6ObVmDyJAt0B69sA5qygiLUGuhz9jOliuZ7C7N4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26911<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0Mi9TZWN1cml0eS1BZHZpc29yeS1mb3ItTWlzc2luZy1GdW5jdGlvbi1MZXZlbC1BY2Nlc3MtQ29udHJvbC1vbi1Tb21lLVJvdXRlcnMtUFNWLTIwMTktMDAxNiJ9.woiTQ3H3Jit4IB3UF5uxyhzjP9RrLz61et62JZFLDlM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d6200_firmware<\/td>\n<td>Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxMiZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpQL0k6UC9BOlAifQ.u88b__NODmhQhwim8gFrzjTvKXz5M31S1LvISZZl1Fc\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTIifQ.9-DFfYgJogBbhhpGLluZdZ7OFVBDp8uNMjicT4MX22s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26912<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0MS9TZWN1cml0eS1BZHZpc29yeS1mb3ItQ3Jvc3MtU2l0ZS1SZXF1ZXN0LUZvcmdlcnktb24tU29tZS1Sb3V0ZXJzLVBTVi0yMDE5LTAwMTgifQ.3CjM3ZXnrtKuQB28qELyU0rfrlMvlK4r4hdkkZiRBw8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- ex7700_firmware<\/td>\n<td>NETGEAR EX7700 devices before 1.0.0.210 are affected by incorrect configuration of security settings.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkzMCZ2ZWN0b3I9QVY6Ti9BQzpML0F1OlMvQzpQL0k6UC9BOk4ifQ.pQTZ3LuEynk2Z01YkPy7mYiu_ifpJOSkLuNrXOFT1zs\/s\/1193554985\/br\/87099655821-l\">5.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MzAifQ.KWeBBo4KAxioQbMYSFebJxX3Mey2JIz5r8hLrDF-mFA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26930<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyMi9TZWN1cml0eS1BZHZpc29yeS1mb3ItU2VjdXJpdHktTWlzY29uZmlndXJhdGlvbi1vbi1FWDc3MDAtUFNWLTIwMjAtMDEwOSJ9.9aXAMFPpLb1ULB_xTqKxj5jxWgYJ5VbCOjS6GMKoOx0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- gs110emx_firmware<\/td>\n<td>Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyMSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.iK4k7WeNmVZsli7ogX6dJiBB5O2OzumTU_A4HAQqW9U\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjEifQ.BdH7nIQgWAeZFx-5OLwk6M1_YWLn5sds-Z9cK97FBt0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26921<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzMi9TZWN1cml0eS1BZHZpc29yeS1mb3ItQXV0aGVudGljYXRpb24tQnlwYXNzLW9uLVNvbWUtU21hcnQtTWFuYWdlZC1QbHVzLVN3aXRjaGVzLVBTVi0yMDIwLTAzMDUifQ.ir8LZfP7_Zkr97kHpFLJCqqkGgM7weiSMjBFUF-X9hU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- r6230_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6220 before 1.1.0.100 and R6230 before 1.1.0.100.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyOSZ2ZWN0b3I9QVY6QS9BQzpML0F1OlMvQzpQL0k6UC9BOlAifQ.ub8ePYiTPaf8xnXApA_nNGZ42ZklVVuWwdUTJytqh0A\/s\/1193554985\/br\/87099655821-l\">5.2<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjkifQ.vAKM3A628sGo85U9jVVEE-Y8A73WARRqfd-tF3IxP-c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26929<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyMy9TZWN1cml0eS1BZHZpc29yeS1mb3ItUG9zdC1BdXRoZW50aWNhdGlvbi1Db21tYW5kLUluamVjdGlvbi1vbi1Tb21lLVJvdXRlcnMtUFNWLTIwMTktMDAxMSJ9.nTZhgM53OjDi0P7Tqyza6ag3duw9wLyG2cfJRYdrkgo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- srk60_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects SRK60 before 2.5.3.110, SRR60 before 2.5.3.110, and SRS60 before 2.5.3.110.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyMCZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.q_cmIQ7b7dZlopG1bdv8_6PzIbqVLtOYMwOKRfJqbeI\/s\/1193554985\/br\/87099655821-l\">5.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjAifQ.9axLPSIleM2TXm5F4iETl0iEohjGaKtLJpcDJWTGTXI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26920<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzMy9TZWN1cml0eS1BZHZpc29yeS1mb3ItUHJlLUF1dGhlbnRpY2F0aW9uLUNvbW1hbmQtSW5qZWN0aW9uLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAzMjcifQ.AaFl_ODswQqtGv45MVuXOGEmaFqTD047g_bqTedzMhs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- wc7500_firmware<\/td>\n<td>Certain NETGEAR devices are affected by command injection by an authenticated user. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyMiZ2ZWN0b3I9QVY6TC9BQzpML0F1Ok4vQzpQL0k6UC9BOlAifQ.42TqFf90pf-JdMP-UhnAZKfVv6XqevYWpqL7wUWnfxE\/s\/1193554985\/br\/87099655821-l\">4.6<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjIifQ.AQ4zK6GgHAOTiV3LCiaInSZcEU0xGgNtqm65J-kIXK4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26922<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzMC9TZWN1cml0eS1BZHZpc29yeS1mb3ItUG9zdC1BdXRoZW50aWNhdGlvbi1Db21tYW5kLUluamVjdGlvbi1vbi1Tb21lLVdpcmVsZXNzLUNvbnRyb2xsZXJzLVBTVi0yMDIwLTAxMzkifQ.f01cpIxnOyPgrr2N-i1IR1fsflhBLTeRpN08PNCdzig\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>onwebchat -- live_chat_-_live_support<\/td>\n<td>Cross-site request forgery (CSRF) vulnerability in Live Chat - Live support version 3.1.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC01NjQyJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Ti9DOlAvSTpQL0E6UCJ9.qeh2uQaJOGEMOnv6Mz2u2uDc5AzYcAD0xUZAk68TXTw\/s\/1193554985\/br\/87099655821-l\">6.8<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNTY0MiJ9.6xadO-AxTEN0SZBwpxI_FJ6gTM7VX7iN0t7c6L0zBIc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5642<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyNzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2p2bi5qcC9lbi9qcC9KVk45MjQwNDg0MS9pbmRleC5odG1sIn0.ry0R-MhoLI7PeK4ezPeVk-9EDEABJFLrdfvuSxAOaYc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BsdWdpbnMudHJhYy53b3JkcHJlc3Mub3JnL2NoYW5nZXNldD9uZXc9MjM4NDQ0MCU0MG9ud2ViY2hhdCZvbGQ9MjM2NDU4OSU0MG9ud2ViY2hhdCJ9.ovnNsWXUb_T1NYZ2mM7wh4d_ZHex3C9Cxk_dk5v-9MI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3dvcmRwcmVzcy5vcmcvcGx1Z2lucy9vbndlYmNoYXQvIn0.OIwjyfB9hWbgQa_8ROadQfwqpIr3rXfbQFITeasU6Ho\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>webmin -- webmin<\/td>\n<td>XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module \/ mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View function, which sanitizes the input correctly. A malicious user can send any JavaScript payload into the message body and execute it if the user decides to save that email.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0xMjY3MCZ2ZWN0b3I9QVY6Ti9BQzpNL0F1Ok4vQzpOL0k6UC9BOk4ifQ.x2o95_5SIpL6CjewEppqpxdGuyFqgeAXT-jgtdtOvLk\/s\/1193554985\/br\/87099655821-l\">4.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTI2NzAifQ.BNGKjktjNuNQyCKjlDf5GkZKkh7WnU7wdZR_ToprZno\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12670<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy53ZWJtaW4uY29tL3NlY3VyaXR5Lmh0bWwifQ.CJEoYqh3wdAgl7MsP6Js5qUJphGpZc4h7ZVF91b7Ql0\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Low Vulnerabilities<\/h4>\n<table width=\"100%\">\n<thead>\n<tr>\n<td width=\"24%\"><strong>Primary<br \/>\nVendor -- Product<\/strong><\/td>\n<td width=\"44%\"><strong>Description<\/strong><\/td>\n<td width=\"10%\"><strong>Published<\/strong><\/td>\n<td width=\"8%\"><strong>CVSS Score<\/strong><\/td>\n<td width=\"14%\"><strong>Source &amp; Patch Info<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>google -- android<\/td>\n<td>In setNotification of SapServer.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-156021269<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDEwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.5O18nBgsCp-3Jlxi84lLCh6blukAQM9OnhUJKI5hv0s\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxMCJ9.cnL0kInNWV3iCNUmeH2oB5e2O1wr_R6ltuxZtpcyo1E\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0410<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.fXrXwjvmtGP_ktZ08Xk4_q3RU5Hf9M77BjEqVzqmPzk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In various locations in SystemUI, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure of contact data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-156020795<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDE1JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.9DkDnDvdL0Z1s2sO3qZdg55fZmt60TSiwwUf8LDIkVA\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxNSJ9.qRvrL9IiHdYovN8o_NZNe55_3vpjuKygjwo03QUbqtQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0415<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.UPAkzhfqlWEykN-oGp7H_5BGe6Ijk7iF1M3DFbtxWFE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In generateInfo of PackageInstallerSession.java, there is a possible leak of cross-profile URI data during app installation due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-142125338<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDE5JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.vxvTfdyKh208ydsCAQ7-IicFqnCN_wjlEXSC3aDXlEw\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxOSJ9.UgS1NDH5zGdcQ6SLiqkXKV_7iXkviP2FkOjSWLDaN0k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0419<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.j7gt90KuHAQ4CKO72BOYDYkkNG3222wYlWqMjoVR18w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In constructImportFailureNotification of NotificationImportExportListener.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local information disclosure of contact data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-161718556<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDIyJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.tegT1E8DvKK1W69A_dIGolVG2IhZy4a-Udvx_QWN8Ww\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQyMiJ9.MFh2QWVd2IJwAuPap-c_e40heE1O1lR4o8p4fK6oAHM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0422<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.gkYOKOONFxshzbqN85GqKpGS0idNVsIpLQfUZ6t4m9M\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In setProcessMemoryTrimLevel of ActivityManagerService.java, there is a missing permission check. This could lead to local information disclosure of foreground processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-160390416<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0wNDEyJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.Yr0vx6vpN8FXbaDgQLRqD1Aizuv3F16Jim6Jf_hyUfE\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoyOTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQxMiJ9.taYbTxSmekePz8xRwLMtY4vygtoXZgiPLAW60VJiD20\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0412<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.AF0yI1yhWmKhL_xQOFDMO-xPodQEu2Wh-j5OqaUyQ74\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- hirouter-cd30-10_firmware<\/td>\n<td>Some Huawei products have an insufficient input verification vulnerability. Attackers can exploit this vulnerability in the LAN to cause service abnormal on affected devices.Affected product versions include:HiRouter-CD30-10 version 10.0.2.5;HiRouter-CT31-10 version 10.0.2.20;WS5200-12 version 10.0.1.9;WS5281-10 version 10.0.5.10;WS5800-10 version 10.0.3.25;WS7100-10 version 10.0.5.21;WS7200-10 version 10.0.5.21.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MTIyJnZlY3Rvcj1BVjpBL0FDOkwvQXU6Ti9DOk4vSTpOL0E6UCJ9.WYmCmxp9EvunduNY8UsvztHxhRPDIUZaU7D7nHaOoRE\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEyMiJ9.wvmf976zsuC9_VlAJvLoK03mXE0HqtYnU2NzbUeM79w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9122<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLXZlcmlmaWNhdGlvbi1lbiJ9.kVQBygpJWSTV_c1qdmnTee6wwqN_4eJdH9LWwgavS2c\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- p30_pro_firmware<\/td>\n<td>HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) have a path traversal vulnerability. The system does not sufficiently validate certain pathname, successful exploit could allow the attacker access files and cause information disclosure.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MTA2JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.8wF9lldw8O9YXaAviAXRREcjIMHKFCHolBjkocVfhkI\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEwNiJ9.r9fFuKYr-OdVxPW7iamNmy28KEkfdeeUbUTwSazxP1Y\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9106<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLXBhdGh0cmF2ZXJzYWwtZW4ifQ.OLyKSvoVsr6bcArj2N6T7fCUtEW7U8U6GIdUWFI5o_I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- taurus-al00a_firmware<\/td>\n<td>Taurus-AL00A version 10.0.0.1(C00E1R1P1) has an out-of-bounds read vulnerability in XFRM module. An authenticated, local attacker may perform a specific operation to exploit this vulnerability. Due to insufficient validation of the parameters, which may be exploited to cause information leak.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MDg3JnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.9FgCG3b0-G7G10dyi6nTsd6STc0CO9jGOBmV77bEtAM\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTA4NyJ9.5_VkjSwpB0lP9sQrHmb-87GFEz6YxKIOcIVcysiaGVk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9087<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAyLXNtYXJ0cGhvbmUtZW4ifQ.jvb57ZYyy0uRuAM9RN14MPhlhOmBdv5s3hRyCKLbbcA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- taurus-an00b_firmware<\/td>\n<td>Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a buffer overflow vulnerability. A function in a module does not verify inputs sufficiently. Attackers can exploit this vulnerability by sending specific request. This could compromise normal service of the affected device.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MjM4JnZlY3Rvcj1BVjpBL0FDOkwvQXU6Ti9DOk4vSTpOL0E6UCJ9.HvlUltMUrga0O_LkcZPIOAzstp14GlzKRUATFfFiDHI\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTIzOCJ9.-CP4qbHIIlR9OZPa8jllePtd_YiLF__WCUJ780rFEok\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9238<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLWJ1ZmZlcm92ZXJmbG93LWVuIn0.x1J0s_x-ptC3LfB7N0sgJWLNn5Ix0O5fcwwFcWxRrIA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- taurus-an00b_firmware<\/td>\n<td>Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have a buffer overflow vulnerability. A function in a module does not verify inputs sufficiently. Attackers can exploit this vulnerability by sending specific request. This could compromise normal service of the affected device.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MjQwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOk4vSTpOL0E6UCJ9.ihR_Z_GBs60FwANo_4PhW7T0dJm2sFEsjfZ-F41QiIc\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTI0MCJ9.qmS42Tor2pPVynCpFA2sMYLHlwkEXyPJ9a4zkUMOKI4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9240<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAyLWJ1ZmZlcm92ZXJmbG93LWVuIn0.Mfkx68e26L8ww-NqzceBHDQLtjcyyZIb9R5G-dGVMUk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- taurus-an00b_firmware<\/td>\n<td>Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an information disclosure vulnerability. The device does not sufficiently validate the output of device in certain specific scenario, the attacker can gain information in the victim's smartphone to launch the attack, successful exploit could cause information disclosure.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MTEwJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOlAvSTpOL0E6TiJ9.pQ2-7ODpiIw9JMoDCkQfCKlDLHT7El9syr1qs5wKHg0\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTExMCJ9.soPbo7g86Hm_CQAq3OZriz-vFN9fNMYbu7NmlqwYPRg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9110<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAyLWluZm9ybWF0aW9ubGVhay1lbiJ9.MS19M7hPVKjeGnb22FljrufQ5vHfjwbVfAB3cEs5Hrs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- taurus-an00b_firmware<\/td>\n<td>Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an out-of-bounds read and write vulnerability. Some functions do not verify inputs sufficiently. Attackers can exploit this vulnerability by sending specific request. This could compromise normal service of the affected device.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MDkxJnZlY3Rvcj1BVjpML0FDOkwvQXU6Ti9DOk4vSTpOL0E6UCJ9.j-S1_g9bTxOnSrlgVDuReY3bp0b5Duj6F2ingnsRbaM\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTA5MSJ9.7tOm5rGv9T21igAGzelEAY12Fh32PNxmtisHg2T1i5c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9091<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAzLXNtYXJ0cGhvbmUtZW4ifQ.1GuQCNPeU6zBlVHhDSIqsVBJ8btR_FWkiwgFUZFtUaI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- ws5800-10_firmware<\/td>\n<td>WS5800-10 version 10.0.3.25 has a denial of service vulnerability. Due to improper verification of specific message, an attacker may exploit this vulnerability to cause specific function to become abnormal.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC05MjMwJnZlY3Rvcj1BVjpBL0FDOkwvQXU6Ti9DOk4vSTpOL0E6UCJ9.sFUGKBwrEJbKcOvtPxxddtOXrmFpmUw7RI6ZLfXEI2w\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTIzMCJ9.PjtN1WJ2khY0MU6pp6kWg13xWXD-XU-CFtnkAi9cYDo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9230<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLWhvbWVyb3V0ZXItZW4ifQ.qfgLG7PQovaniTNceSQLiW3zF2iovn6ga28b_t0fyn4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>A cross-site scripting (XSS) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. This vulnerability allows attackers to inject malicious scripts into web applications for the purpose of running unwanted actions on the end user's device, restricted to a single location. IBM X-Force ID: 189153.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00Nzc1JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.-okJ2qpX120r6jNHeH6Q67owFyUetf1n-jpHZXUXGDE\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3NSJ9.iCv1u-emMipiEc3Tnk5wrhrQEHCf68uMs89icMHFAGs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4775<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1MyJ9.rZ9FbGuSO7BkKTNE6U2oH313--uPKkYWsiAwXRDCMXc\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTcxIn0.2F04vD8z0e__yoRWxjyQ-TUxMF_9ulueubgt0WUiTbY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- infosphere_information_server<\/td>\n<td>IBM InfoSphere Information Server 11.5 and 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188197.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00NzQxJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.xqDg7bvQgh5ZCvVlwfcrKgzWHvOJO4ZxxSfMb04JpsA\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc0MSJ9.hefcMLHNanZs9-lA2RNffwo40Awq_qKmQm91kHA4_aw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4741<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4ODE5NyJ9.n0BTW1X2HZIzqryNFWprtuOfAcljX2p8HDwyS5evjmA\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2OTA2In0.gxtXXUb9Yqc2TuoLMXdgn0ifSJze55pLk6MaAsGi-gM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium<\/td>\n<td>IBM Security Guardium 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186424.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00Njc5JnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.0LyoeKuw-gB6vwbsRRcf6y04hjppjUYadcPKwsNQ_4g\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY3OSJ9.70nnubHM4TyDBnWY0eA5F4P3N2vZ1Dq1Ihj5dxMAMlQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4679<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjQyNCJ9.u27lOi8og4lmfkm9lE9qFRdAbtUgcaG-MOrv7UTq958\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2ODg0In0.DoraTTk8I17OSrP71X4e1VjcWJuZ4Xn4FBbqkUQOx1c\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium<\/td>\n<td>IBM Security Guardium 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186427.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00NjgxJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.ndls-bfbCw4rTxDpcuFAmUAM2yxFph-vfmdw56wDsF0\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY4MSJ9.Cih5MqP0MlINjevXLOK5b605iy5FhkbaMOvH8716GuI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4681<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozMzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjQyNyJ9.VZuwdB2jqF2N0OWg18TYogIhc40y9c5aUUYV6aENWJc\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2ODg0In0.Hfxk48HQvsX360r75oXccRIFiglyH2I3JuxofR4v698\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium<\/td>\n<td>IBM Security Guardium 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 186426.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC00NjgwJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.jK_o0uL5G3vMC9nv6tjvfctT0hUsBEakizzW5Kbjgzw\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY4MCJ9.4IVaxk-SM4eGkSWxHIo85PDrhJuug1aPq87sjmMlN4k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4680<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjQyNiJ9.jA9iYufL_QRYkyYnL--hOGuLUxGOKg4fS5-fkEyjT-4\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2ODg0In0.93RmVJrfCwC_3oOtJxp-gzBSE278Y_xR9vOUHKss9bM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwNSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.HzJVLSC832DwWfhlwmNNDzSm9lqlsQG1g8kkfuicO7s\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDUifQ.Nvg1bjnnaTTbxWlAYuUj-gPWZlCV0w29zoAYfUfJpqQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26905<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM0OS9TZWN1cml0eS1BZHZpc29yeS1mb3ItQWRtaW4tQ3JlZGVudGlhbC1EaXNjbG9zdXJlLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwNDcifQ.lv-FYRFCTNRRnGUPBpiCvFG09JIOaS-Vbm1ZRfpBL3U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwNCZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.ANiRLrgvqXq9PhT-q4BkSh-I1oLjLdoAg_zy61svmA8\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDQifQ.zt5knI4-GukHWqKGHjb6os0BcpqKsbAIxqE07_ENq3I\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26904<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1MC9TZWN1cml0eS1BZHZpc29yeS1mb3ItQWRtaW4tQ3JlZGVudGlhbC1EaXNjbG9zdXJlLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwNDYifQ.JHnCudjdLz3ROC94tW8ljUFkOgkz6K1Hsk6MaU390Po\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwMyZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.9o83MEVYypSj1de85dSodNSUb-1U7UyoECeSMthaS5g\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDMifQ.xBmhgsRwS6hb_KN5cMF6qE0REd7lOl8xwotaWpmIAF0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26903<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1MS9TZWN1cml0eS1BZHZpc29yeS1mb3ItQWRtaW4tQ3JlZGVudGlhbC1EaXNjbG9zdXJlLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwNDMifQ.sjTyQQM9F1S2DBOOUKmcv9tqbiOq0fDimR_oBUwGXMw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwMCZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.cE3Po1PAyQLThot2ABf_CTdN6MRmrJy8VoN5h-EpjCU\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDAifQ.IWo_m9f2tGfbdaTy49_vK1KugtyB9fh1X_eP5OFnEqo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26900<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1NC9TZWN1cml0eS1BZHZpc29yeS1mb3ItQWRtaW4tQ3JlZGVudGlhbC1EaXNjbG9zdXJlLW9uLVNvbWUtV2lGaS1TeXN0ZW1zLVBTVi0yMDIwLTAwMzIifQ.mVN8pMGO7cdd2vZH3B1dQXreECtP_tiJnup9dk8yeKM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- cbr40_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of sensitive information. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjg5OSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.EdrQ4MaGY7GtlIEaBF3_tUlhOH9azafUygdmoY_Rgr8\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY4OTkifQ.HyAqyroVdRud2DPDck1tyTfL5u923jD39BnOJOe1zHI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26899<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1NS9TZWN1cml0eS1BZHZpc29yeS1mb3ItU2Vuc2l0aXZlLUluZm9ybWF0aW9uLURpc2Nsb3N1cmUtb24tU29tZS1XaUZpLVN5c3RlbXMtUFNWLTIwMjAtMDAzMCJ9.3IygN7k7jJUQ4hLJpKE0qbPL9w53VmnovKvzFAFjlLw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- d7800_firmware<\/td>\n<td>Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxNSZ2ZWN0b3I9QVY6Ti9BQzpNL0F1OlMvQzpOL0k6UC9BOk4ifQ.EG58Ck3kCKWc1FZBd3qumYdeOpNBGDbkwLDfj2D3xKc\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTUifQ.Vh9p3bfm_ERWZTiglruNaPcfNhHRKbFpdKhxukLPLMs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26915<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzOC9TZWN1cml0eS1BZHZpc29yeS1mb3ItU3RvcmVkLUNyb3NzLVNpdGUtU2NyaXB0aW5nLW9uLVNvbWUtUm91dGVycy1hbmQtV2lGaS1TeXN0ZW1zLVBTVi0yMDE4LTA1NTQifQ.E6YsO_5vbHPJsdYOI1kFQ-Obalv1a0Bzvjqupxcguv4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- ex7000_firmware<\/td>\n<td>Certain NETGEAR devices are affected by stored XSS. This affects EX7000 before 1.0.1.78, R6250 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkxNyZ2ZWN0b3I9QVY6Ti9BQzpNL0F1OlMvQzpOL0k6UC9BOk4ifQ.Y58i2ppx24CTGbbSkQ6PTtE_VHZfNmH1FSTpNNQf7ME\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MTcifQ.JQhiiA4mV7Au9GY3CGgkN2aXUvrqjW6Q0ebYL6PHI_k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26917<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMzNi9TZWN1cml0eS1BZHZpc29yeS1mb3ItU3RvcmVkLUNyb3NzLVNpdGUtU2NyaXB0aW5nLW9uLVNvbWUtRXh0ZW5kZXItYW5kLVJvdXRlcnMtUFNWLTIwMTgtMDI0MiJ9.mNcQzhUEHn6xZXXm_4j4xUdW0o0ar7A1IKKoNjffXNQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- gs808e_firmware<\/td>\n<td>NETGEAR GS808E devices before 1.7.1.0 are affected by denial of service.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyNSZ2ZWN0b3I9QVY6TC9BQzpML0F1Ok4vQzpOL0k6Ti9BOlAifQ.MwqSzND9vnY1IyfPFqWVo5rnCPeUFZ9Z-TdB1gwR9T8\/s\/1193554985\/br\/87099655821-l\">2.1<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjUifQ.vlMO-hg04REZmk2G_Rh3jOGuLpXOUgTNsMWGFwA4lUI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26925<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyNy9TZWN1cml0eS1BZHZpc29yeS1mb3ItRGVuaWFsLW9mLVNlcnZpY2Utb24tR1M4MDhFLVBTVi0yMDE5LTAyMDAifQ.ArmXcVgQnAPwKawyQCrAo9hJGgxiM9kOZUQSiOgi0Jk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- rbk752_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkwMSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.niV6SIxaBeKaoB4F87WsVL4yWOj7sKXCYQPkUPwn7kY\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MDEifQ.AmZKdBcPAODn_7drZ1F_iPwaEFA7PufPQbNDtSBer5k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26901<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjM1My9TZWN1cml0eS1BZHZpc29yeS1mb3ItU2Vuc2l0aXZlLUluZm9ybWF0aW9uLURpc2Nsb3N1cmUtb24tU29tZS1XaUZpLVN5c3RlbXMtUFNWLTIwMjAtMDAzNiJ9.v3nc4srcjr7LYETkhflk9O78hCVt3zNLuUje-wkXHUQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- wc7500_firmware<\/td>\n<td>Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkzMSZ2ZWN0b3I9QVY6QS9BQzpML0F1Ok4vQzpQL0k6Ti9BOk4ifQ.JgKpNaMNnPLJg_eZ8_X1R3N3tfZYd4AvgIppuh-Tscs\/s\/1193554985\/br\/87099655821-l\">3.3<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MzEifQ.FflRgVRba4jDbem79y8wfe75NRefW5b_bsGQ1_1Kk04\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26931<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyMS9TZWN1cml0eS1BZHZpc29yeS1mb3ItU2Vuc2l0aXZlLUluZm9ybWF0aW9uLURpc2Nsb3N1cmUtb24tU29tZS1XaXJlbGVzcy1Db250cm9sbGVycy1QU1YtMjAyMC0wMjY4In0.Tv0Ldo9Va4y07KWnx1vJQQ-HvrCnnGyTEAf1b8JbtH4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- wc7500_firmware<\/td>\n<td>Certain NETGEAR devices are affected by stored XSS. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.<\/td>\n<td>2020-10-09<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC0yNjkyMyZ2ZWN0b3I9QVY6Ti9BQzpNL0F1OlMvQzpOL0k6UC9BOk4ifQ.xvLWWxPaWi0FrREHRBtVhdUsBP-geA6KUzWLHbFjvPU\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MjMifQ.7-8yKtK-s3ToGtKdNtvFD8iFyXrWR_IY5EWJEe8eURk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26923<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLm5ldGdlYXIuY29tLzAwMDA2MjMyOS9TZWN1cml0eS1BZHZpc29yeS1mb3ItU3RvcmVkLUNyb3NzLVNpdGUtU2NyaXB0aW5nLW9uLVNvbWUtV2lyZWxlc3MtQ29udHJvbGxlcnMtUFNWLTIwMjAtMDE4MCJ9.L107-VYG3PfoQlB-CyRGsS0MywEDoJR8e52cEPdKV1I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>webmin -- webmin<\/td>\n<td>An Improper Data Validation Vulnerability exists in Webmin 1.941 and earlier affecting the Command Shell Endpoint. A user may enter HTML code into the Command field and submit it. Then, after visiting the Action Logs Menu and displaying logs, the HTML code will be rendered (however, JavaScript is not executed). Changes are kept across users.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC04ODIxJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.80b0ZqqRkJkovQEZYHBhIoLqkFBVS8N-7S5-5Y8gnrQ\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozNzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODgyMSJ9.UblPTGQZNS7NYZA6QzwRznchVPyodmEk3vrXu-nDUpw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8821<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy53ZWJtaW4uY29tL3NlY3VyaXR5Lmh0bWwifQ.cPx3zWmJUzO0tRRSQ1PdohczEqIaTb63jEUQHZSAzKE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>webmin -- webmin<\/td>\n<td>An XSS Vulnerability exists in Webmin 1.941 and earlier affecting the Cluster Shell Commands Endpoint. A user may enter any XSS Payload into the Command field and execute it. Then, after revisiting the Cluster Shell Commands Menu, the XSS Payload will be rendered and executed.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\"><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9jdnNzLmNmbT92ZXJzaW9uPTImbmFtZT1DVkUtMjAyMC04ODIwJnZlY3Rvcj1BVjpOL0FDOk0vQXU6Uy9DOk4vSTpQL0E6TiJ9.o4-tCB7ZxBdgb05DIO5x1qmHlnucJdRmPYSajAH_odc\/s\/1193554985\/br\/87099655821-l\">3.5<\/a><\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODgyMCJ9.N5VQ0cYCIcF_VW3yF8MAfbEW2XQd7xRMPlVos1HxkDY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8820<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy53ZWJtaW4uY29tL3NlY3VyaXR5Lmh0bWwifQ.3gV20fY_O3wtED3MMVxIIfr__L_7pfp2TihqciaB2iA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4>Severity Not Yet Assigned<\/h4>\n<table width=\"100%\">\n<thead>\n<tr>\n<td width=\"24%\"><strong>Primary<br \/>\nVendor -- Product<\/strong><\/td>\n<td width=\"44%\"><strong>Description<\/strong><\/td>\n<td width=\"10%\"><strong>Published<\/strong><\/td>\n<td width=\"8%\"><strong>CVSS Score<\/strong><\/td>\n<td width=\"14%\"><strong>Source &amp; Patch Info<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>adobe -- flash_player<\/td>\n<td>Adobe Flash Player version 32.0.0.433 (and earlier) are affected by an exploitable NULL pointer dereference vulnerability that could result in a crash and arbitrary code execution. Exploitation of this issue requires an attacker to insert malicious strings in an HTTP response that is by default delivered over TLS\/SSL.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTc0NiJ9.s6YkeLRhrG_ZTnvt8XbOz99SeQx3dYZmJ0wYpqdzKYM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9746<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2hlbHB4LmFkb2JlLmNvbS9zZWN1cml0eS9wcm9kdWN0cy9mbGFzaC1wbGF5ZXIvYXBzYjIwLTU4Lmh0bWwifQ.DyB8G_4OpJLRnIsahJBHmkkfajS-zVZZbAyMqabfh10\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>adobe -- magento<\/td>\n<td>Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by a persistent XSS vulnerability that allows users to upload malicious JavaScript via the file upload component. This vulnerability could be abused by an unauthenticated attacker to execute XSS attacks against other Magento users. This vulnerability requires a victim to browse to the uploaded file.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjQ0MDgifQ.Padc5AQVehDllTLpmz-naUeT-VQ5rKk33TmS-MDniJY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-24408<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2hlbHB4LmFkb2JlLmNvbS9zZWN1cml0eS9wcm9kdWN0cy9tYWdlbnRvL2Fwc2IyMC01OS5odG1sIn0.fuNq4HcMDjb238juGAF5SxElQAQ_xD8aIDLZsY0dvig\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>amazon -- aws_firecracker<\/td>\n<td>In Amazon AWS Firecracker before 0.21.3, and 0.22.x before 0.22.1, the serial console buffer can grow its memory usage without limit when data is sent to the standard input. This can result in a memory leak on the microVM emulation thread, possibly occupying more memory than intended on the host.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjcxNzQifQ.9-XZRUrW_l7BOqGlMA41dg9QDlETSaYwKTAMEzRdm3A\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27174<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZmlyZWNyYWNrZXItbWljcm92bS9maXJlY3JhY2tlci9pc3N1ZXMvMjE3NyJ9.spsv8Bx-CBo9__b2SHL7Vt37N6cX-KNozR2BHqwSxdw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZmlyZWNyYWNrZXItbWljcm92bS9maXJlY3JhY2tlci9wdWxsLzIxNzgifQ.QrmfjQJJJra3M885k3gaTJ6jxLTBjYBnukQbnQx_m7o\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZmlyZWNyYWNrZXItbWljcm92bS9maXJlY3JhY2tlci9wdWxsLzIxNzkifQ.vXC0L48CXWhRFpuvEzEyghmEv_wYdsUALz6sTAe-9tQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>amd -- multiple_graphics_drivers<\/td>\n<td>A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTI5MzMifQ.5AfXHDUAFbs2rDoX5AtKHpDfj1zRC-v8j_1T0Vep52Q\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12933<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5hbWQuY29tL2VuL2NvcnBvcmF0ZS9wcm9kdWN0LXNlY3VyaXR5In0.KGBJnyqJkC6Lo73Zk8_H4k-lKxDxjdFc0KrOLlS3omo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>amd -- multiple_graphics_drivers<\/td>\n<td>A denial of service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a non-privileged account.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTI5MTEifQ.Lut0YirAlfKqHNPsUD6xqUQeYizzdruJ-8ubdO0aIYw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12911<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5hbWQuY29tL2VuL2NvcnBvcmF0ZS9wcm9kdWN0LXNlY3VyaXR5In0.DxGvsqrHQjhEWf32XEoCLMiOimo8yqNGVP1uFaHX2WY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>amd -- ryzen_master<\/td>\n<td>A vulnerability in a dynamically loaded AMD driver in AMD Ryzen Master V15 may allow any authenticated user to escalate privileges to NT authority system.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTI5MjgifQ.fbBYeVlklPOAfKXQcu1FkxDtR2PH1wx6Z77qPf7bolM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12928<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5hbWQuY29tL2VuL2NvcnBvcmF0ZS9wcm9kdWN0LXNlY3VyaXR5In0.46560uEP1SE1jScjCIIMNyc9WFesAtJtEstq2jKwOZ0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>anuko -- time_tracker<\/td>\n<td>In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjozOTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUyNTUifQ.92VwWTGw7XQIezZGEKUR_tvglWQk113bzYEhM15oe0I\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15255<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYW51a28vdGltZXRyYWNrZXIvY29tbWl0L2Q5NDcyOTA0MzYxNDk1ZjMxOGM5ZDAyOTRmZmQyOGFjYWFlYWU0MmYifQ.pBvCa0OfNuuzB5_RVxYaHHfQjfhwtB1mJkpT5AfE50U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYW51a28vdGltZXRyYWNrZXIvc2VjdXJpdHkvYWR2aXNvcmllcy9HSFNBLXByamYtOW1naC04ZnB2In0.PopGo-Gqt5NEYUP3U3vgT8OAMaeSi0982wPtIGNLXOA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>apache -- solr<\/td>\n<td>Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication\/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD\/CREATE actions.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTM5NTcifQ.E2Gaf0C8PFrMMwprnXujVSxwBii0Ee4vU3Ce9mJQDHQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-13957<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjIyNmMxMTEyYmI0MWU3Y2Q0Mjc4NjJkODc1ZWZmOTg3N2EyMGE0MDI0MmMyNTQyZjRkZDM5ZTRhQCUzQ2lzc3Vlcy5sdWNlbmUuYXBhY2hlLm9yZyUzRSJ9.waJpnOmDr0BSrN13G2pYOYuGZLdFHGYWSkYRDEgiJRY\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL21haWwtYXJjaGl2ZXMudXMuYXBhY2hlLm9yZy9tb2RfbWJveC93d3ctYW5ub3VuY2UvMjAyMDEwLm1ib3gvJTNDQ0FFQ3dqQVdDVkxvVmFaeSUzRFROUlE2V2s5S1dWeGRQUmlHUzhOVCUyQlBITUpDeGJic0VWZyU0MG1haWwuZ21haWwuY29tJTNFIn0.LjHloRYalhnxbjeQcFgU-qXoONvNKvd4Akuv897drfc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apache -- tomcat<\/td>\n<td>If an HTTP\/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP\/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP\/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTM5NDMifQ.JfI5Y30x7LEcAtKY0H5Hf1KEuubwSHapJuhpoFM6TO4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-13943<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjRhMzkwMDI3ZWIyN2U0NTUwMTQyZmFjNmM4MzE3Y2M2ODRiMTU3YWUzMTRkMzE1MTQ3NDdmMzA3JTQwJTNDYW5ub3VuY2UudG9tY2F0LmFwYWNoZS5vcmclM0UifQ.v5DDcF3ZxovjGkAR5Ddc4tYPKcKlG5KdARqVIzKRJpU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmRlYmlhbi5vcmcvZGViaWFuLWx0cy1hbm5vdW5jZS8yMDIwLzEwL21zZzAwMDE5Lmh0bWwifQ.kwexlWcCVEvSMWsWw3VjTryCEarAGJE4dGcF4CpWYnM\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NlY3VyaXR5Lm5ldGFwcC5jb20vYWR2aXNvcnkvbnRhcC0yMDIwMTAxNi0wMDA3LyJ9.RFNkCKGy__2BnlJA98nAn9Mkia9OUaitutoST3s9ilc\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>apereo -- cas<\/td>\n<td>Apereo CAS 5.3.x before 5.3.16, 6.x before 6.1.7.2, 6.2.x before 6.2.4, and 6.3.x before 6.3.0-RC4 mishandles secret keys with Google Authenticator for multifactor authentication.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjcxNzgifQ.E99G3Ge-e88U0i2VhGnIqLoqZQJHKqNUcP4SB7p2JI8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27178<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2FwZXJlby5naXRodWIuaW8vMjAyMC8xMC8xNC9nYXV0aHZ1bG4vIn0.FAlQWUJZCfVy9Q9V0DR3NN-EyR2VzpiitZdavl-nnNs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- ios_and_ipados<\/td>\n<td>An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.0 and iPadOS 14.0. An application may be able to cause unexpected system termination or write kernel memory.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk1OCJ9.ChOl7aXy7To-Eo8B_Ulm4ffhUMVqPHa693MzACa9NfU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9958<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.-Tu4EG3VlQUvCDX64KEPvEk4qZoVw1EE9bJj0S0Ihqw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- ios_and_ipados<\/td>\n<td>This issue was addressed with improved checks. This issue is fixed in iOS 13.6 and iPadOS 13.6. A remote attacker may be able to cause a denial of service.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxNyJ9.EKe-V2YnKrQMbFz0Looyy8kdgcgD3rlbbCGD0Hi4Rr4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9917<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.PfrQv-4lxepSDsni7kEO3GOwufgNp0DncWwu12J5gtY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- ios_and_ipados<\/td>\n<td>A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. A local user may be able to read kernel memory.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk2NCJ9.x0PWoN1jn3G3MHF2NLRgZAfmJ6Kw2J9NFvPBTxrR9LQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9964<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0._WPTfwiwQ29XXZXy0yrN8jpt3vpTyhJczez7Rh-0AGU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- ios_and_ipados<\/td>\n<td>A denial of service issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6. A remote attacker may cause an unexpected application termination.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkzMSJ9.iyZaIsc-LJiKuPpMKNwjTTVJy9B5pQk8OB88V4uKLLU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9931<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.RmINa6OsLccv6Pxc2fJodqMCFowrRkIrCCFTmt1ZI8Y\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- ios_and_ipados<\/td>\n<td>A lock screen issue allowed access to messages on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0. A person with physical access to an iOS device may be able to view notification contents from the lockscreen.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk1OSJ9.-jmM0l5ESn4RkMGQWfQQaEeOTcyB_xxQ5-bJp7c9JHk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9959<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.SGGpRoaHYqEhvWeP74PXRXaszvQ0O-xrdhfQfXSrWJQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- macos_catalina<\/td>\n<td>An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.6. A malicious application may be able to execute arbitrary code with kernel privileges.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTc5OSJ9.L2Hr_0FIpVyKcpnI4IVs6jbuSUGQPjxPwuqmz4wr19A\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9799<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.AF211JXVSAxDvq3iLVEPVSNRBq32WBCOKP6kM40vESA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- macos_catalina<\/td>\n<td>A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.6. An application may be able to execute arbitrary code with kernel privileges.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg2NCJ9.QCZMwBSYBYhxjYXvwmJ9TzD8FAGk703OTplaW3Nrp4g\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9864<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.V8wVPbLFndRRN-KAy4VLpY7FvAcY0pYuGojxFYcvdY0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- macos_catalina<\/td>\n<td>This issue was addressed with improved data protection. This issue is fixed in macOS Catalina 10.15.6. A local user may be able to leak sensitive user information.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxMyJ9.QcaWSKMjXjl1C4UjorTepDsRDm8VtXj1GCsYhRN7_Gs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9913<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.GCkTLnmKETh06h9UOYiZzy82rc6l57YrilHC06cCbWs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg3OCJ9.5ffkTS1550X_YBLj3GeykZeTzGl7Tei8RqMB5zxsLdU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9878<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.2TpaZuXrgigfMFAqOmOBf6oRDDf4dFjvteH0Wkv74X0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.z6vFAQJQ9fMz6TX4jf5D-_hVAob_rh3JfvAGKBrFELo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.ldUHpdYiyGsLkGUKaXrClsjS-cWoIxspBlNCcgYzhXw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An issue existed in the handling of iMessage tapbacks. The issue was resolved with additional verification. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A user that is removed from an iMessage group could rejoin the group.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg4NSJ9.m_unXKnqycK9rTghiHHOGjUONWyEaqzZQ1StB7VzySo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9885<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.puo5YhOjeQEIBsL8nExPt2nnZGsGtjbEyYE1NgbJM_I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.vrPjkjWCqnpNY8HZmJCIQuedxyeZmWHojAu1Rn_SHpU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.UxY7KR7JgVjVL2hVViSmjTy8l8mB7Ul1_1HTWSlCkIw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.fjp7gxUR5EXdCQU09Dr_iqK9unLnC3DcGcgrE2QlCzA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An attacker in a privileged network position may be able to perform denial of service attack using malformed Bluetooth packets.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxNCJ9.RBoq4Kg4EYOt8inDa5BVNoM7TNKaKXSVi2_aUrFMMc0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9914<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.GN5yfZ8rb1tjzIzK-BUhos8MdiSbMBo9XCjrDhfKwcM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.RUX3Kn71hyFreLDhe_zgZe_LJKE753H6r2AW0Bv4gBo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg5MyJ9.WObit08pzdkGrK_VvhbukS-r4oZTj2LFzocvJ5buMZA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9893<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.dhAOSu21BSxMDlD7dVOs0Arj9ZvgZWVxtzd_b-Uc7Mo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.1kKN2zAYfbjA9g_TCvDH7EHIumI5xHO_uhNHLalxK9U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.iWP98ElgqGG3KI-4Cl6Ou-0PsYRJRQ13GssLY7QjB3g\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.K0eqy3TcSis2Grc8b8wVI9P3-XL1xI86psc4W61BVPw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.h49nC6pKAwiQALsoocQT8doxLv4cwfEg-jKVJIB8Eyo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.fPoIbU1HjB3v78kDeZqJxRoa0doWXziA4EaNmBnQ1fU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.13j3YI42C8hEAkLBF8FtUA5QnV8ho6S_7u8iOJreKoc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to break out of its sandbox.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg2NSJ9.4GNbIez7oHzCyVyWV9GwxUbqcSS1BD8ue6ibQZb1mqo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9865<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0._mQhxijOgOZ7Nbw6f78AMMwCf7iwWGJjoumJM63p4mw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.JgI9l6pkILxIPP5yBk_WK_AiVYAurr0eMbxJ6YE-ne8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.MgUdpE87Mw1FI_REKePNndqeAYrGXkB8LqjChjMBvcc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.JfI4I5ltusuaSWf4A68cOQDnueyX54EzF3sSmCnz9XE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg4OCJ9._eIaASCdGnmoZg0zh_zTtNftIKqBYPKasOhqPEJleNg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9888<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.86KBb9z-rQ4wQIj-XkVtUmgxNwcCYgi5U-WTFiJ_UBI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.Lbo3j08asQIZnEDbzXcmzsu2OSW34OXzs-bOPLO-Lgs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.WF4TAkuqsw3Ski-qalHZEwLxWUCkKJud0700rMlbsIA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.8dg4nDdF_nfi4xdgYBtQwv5p4hNrT23FPwK0yVxFOPg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>This issue was addressed by encrypting communications over the network to devices running iOS 14, iPadOS 14, tvOS 14, and watchOS 7. This issue is fixed in iOS 14.0 and iPadOS 14.0, Xcode 12.0. An attacker in a privileged network position may be able to execute arbitrary code on a paired device during a debug session over the network.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk5MiJ9.txE9u6PG13oiFrudPPrLt9Hmbdqh7CGx59OyklJIjh4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9992<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ4In0.FbMgXeJVn7iHJljgnJc4Um2vGJF-NZMzCamT_ccW4jE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.-8Q16U9nfAStWKYoXphdmiGz6F8LH75mPJNJWDmMr7Q\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6. A local user may be able to view sensitive user information.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkzNCJ9.vNkKpnOPlYwsYqQ4F4Fj8mvK_Bu5u5KGwH-btFxJ9qw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9934<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.boMQwQ31BT9jcPYtVURmueNffPM2RlQUW2iSfnJTFE0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.xDSFeBu5RPPARf2ZKErVkXi72cGEV9TcN7N24qs6MWk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>Multiple issues were addressed with improved logic. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxMCJ9.PXh4C1fLhP5EjOlLDvojFVVjXK4HzOevMaRQcHFSCLg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9910<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.qsfXsCkA61yc_XMxT_7xqdeg49DaZRl3Em89zVydWmY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.HxkvUjbMyFM2UtsOU1hN6mGjH3lPSE3mpTRBFMs4XvM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.uzq_mMtLx2E5nVnqyTBixJ6BRkVf6DJ5vh5WCnp4wMc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.WB3iwzgqIpdhG5DSDi-U4gFm8yG-dpLj0tC9Vfv4I5M\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.OmnES-VISjLGo7RmkVRFwusNTMXViABmCazdabaRs4s\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.l4bbXQWO2R9owK98M24uaLcaieiri7jX5IMpWqrRSXk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.yzqFm-14GBDTMt2Mx9PmNsTLlI7PtYyxrdjwiVDALn8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkwOSJ9.v-Nr261qgoZX0d0kbSYbynKSJdmE-feoxtp4_IH3Ggw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9909<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.3PS8BSF0CrHZ3GvXACiM8pB1hAcOoN2eZEfjktOcjcc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.Se__c_JDyF031q7pksXF-8_NqZKNB1upLIcaPlE3d2s\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.KCK9B-2zYA0L7JvXvxKn1S_KOohNIHrrY_sINsv1T44\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg5NSJ9.2HTtv_Z7h3NozwYf2FrgCq63YXbMmBvxsLwVy04IQ4o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9895<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.r5HX7Ix5i-asr3sZGoc4HlfE0XHoq-cCHBy8JZzDQ0w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.M4DD64crQXMczcV9_ftxS-u3ZRMgMSIHanzonjx_8GY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.KHHn2NVbVnGBHq0ffsc9sHog5M0ZUwSDZJhFumH2sK0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.fD3CWE9TZusujpaaf26OYicbDlRMxmZtsoCOBeSo82U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.lEgMX77nwJNl0IuXQ4WeasFgjesS3ekHDN5xvWg09eI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.nSK8fFHcZPflhqrG6DXb6q6tbjemNQX4uVYSbIQqdPc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.vmP4_WFIlXjq_tQz2XBL7-HfTCMxGj-4f1RL70gLjyY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxNSJ9.5O0xQmv7v-QLEVo5lyC2U6ooPIi7Gmjs4y6VyXBaArY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9915<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.Ovl8Wpj6val5ubfGQVZaPcTpuMQbDSRVu6hFLkoxve4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.XVnyS9nNs_wHFexoLffG6eI0_hO16rq7k30NArNonZ4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.aF6Djy9qzVNquwNZe09KdleO0lSfEI5ZDdssQyT3POM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.nFrgpGt3QHBt72ryChj70mjfZYYeq04Ff4r2xZlGGqc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.fDCSazSoW_xAp4Pcyq6ZRYZ9S1KBC5JzsM0Byiw_zxw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.-5dCRjZg1KFOf5c9IFHjNiA6QI9VmEjRZWGq51wzfzc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.4cebn2sLPhUMzWYofRbXlFQVmr8AYE60YnNydDrqIqM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, watchOS 6.2.8. A malicious application may be able to execute arbitrary code with system privileges.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkyMyJ9.hVoGJFrt-0k7rFNLB7IlCSpxzqWwjvsrqnVmkNoIvhs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9923<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.DqXO1sxua0BYvhxqmlFyI_vUbANGc8-O-OIKZ0fDj_I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.gBF1hENXiS-b-ooi5F7Zq5DXhMzaxY8Qz3ur7y2pvKY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An authorization issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to read sensitive location information.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkzMyJ9.rstupWY_73kSfoUvQkcLF3i8oXzBNQPIMZ5sBkCM7m4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9933<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.wJGO6KE8tdQabaly0CaSpPLHdLTIeJn_PZKDJnjOKL4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.L_wmZPy6n4lwJamk0bpyiFWtl34ns1zsZyE-iTMoZro\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.oSWvHgrQyQ1uMogV84z1R28SUNPmN_efUvPwyaxfTPw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk1MiJ9.JsCxVxgJRvrRFCsBdxUiKddWjtpcLPSeYvn5t7TrLz4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9952<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo0OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQzIn0.O4g7bIlsjh1DYExLwngaxjF-iSx879NaM7M5noPGktc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ0In0.XzG85RB3bVewKW1Dr9k1nHVi64Y4sApCxo7xV5O5KU0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ1In0.raemGtctBv2uSzKcAGZLGRmkcNLGUJLkPXlYHLTbfNc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ2In0.5kUqqy8oU4c1ytP9ls4syDLVn6hGUku4UF8Kuo7i4ik\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ3In0.a_Z3VMj2XMt_iQNxVR2tK-W8ZLgQqiMjq9rBMvMd3v0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.M_toTK0y5mmm4BVekGs3Jfk_0nbWzEmFRQmutf1Ww3I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkyNSJ9.t3GuSO_HW2lpD1XaY9-OXbQOSWHB1NSg8RAfpuJhW0M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9925<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.IMpQXfX0MFdUJmqauo6XjDFoxO4FOax_P4EAd0i7bNY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.uiju5CO_hq17rtG4V33VeEH21nJZUwwKRbaJNAxtxPs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.nhwNP5wjWHclLJVH_5iOV8kdLhkBQPWNrGhGlR6cJfs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.pUz3R2dTgW5molRcn0-SIrRYOWF21PhiwCTkdZNK_-Y\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.bTk5XSufG-G6fFtoXEyYFDbHwM-Ly5MfxxvdSVqDGsQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.iwvkhHAmyiWPNm5O5agfJPIeI3emQRnsoHPS4bRRyj4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.v6GAI10f7AizeK3Zvlj2oqpU0U2Uul_ud5BTg0kBTe8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxOCJ9.Vze1dLwgPMzfT2iUCI45HoVSRieZ9rGIAvVkqDvYpds\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9918<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.1N6b3STxdeDAPO5e2vHaitrZxEv1iQP76lSnbMY51mA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.4Dc7GooXhu3FZRmTtxaxtz4FMQppvxd51gfzALHPKKU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.IbCEylOJDxW3ckfL8FnAprSn3ua6JJ4BLuIqjMdCzLU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.pQpLsPF2nzGch6M56yogRIJSjbje7nv99DK50m6hnjI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, Safari 13.1.2. A malicious attacker may cause Safari to suggest a password for the wrong domain.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkwMyJ9.-v40k6Y5WTeYbk7b8aOGOJTdymBmbLM1WmjIRUlqWfs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9903<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.0wSFsa8T7GV9EwlZym5Fn9bHThHHJyFHpDmhZbVTias\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.tP76qtdEMUwx71rt7NHgwPQAv25w_RnjdBgvblVtoHc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg2MiJ9.L3TX-die30z9LhwKe5lYmVVj0pVts35pVt7hqBgd_w4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9862<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.NJDqEIR9geP3l_1T7Bhp79HX5x2vY_tzA19_xZlCPhE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.41TgsXvCPJm5A4HporqIYUJ2qc5DNd5zzhvXRvTSXLI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.0lur6ZSyzLQawlwG3lwppv_AelBDRma4CQh7rOf0XHQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.UoVQEEQ5F1z2N8DL7rXVuz1l2SVd-CAADKj61GTFFa8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.RL0u4t0B2qvSw08UHxLAFvv-ad0A5ikgF6B88GGsxyM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.uyWmLKgyT-PTw5QGq-ui4cbWdQLXQKL_o3_n65lAFWc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.mSeRhbCHdNxDNXMSg3ENYaKZWkQP90-Qxq8qY62_QXQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8. An application may be able to execute arbitrary code with kernel privileges.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkwNyJ9.86eOz5mxxE5w0GXVbS-44aIlzav--sRur6UcLtx2pL4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9907<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.cMtYwdBe_VN_ZkpQX1XxqzrxaalfestCBPVnBSfdxpU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.-NuUQJzyen4xQYEulFcPHB5J8jeuKhbw6J8ywmsddE4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A URL Unicode encoding issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A malicious attacker may be able to conceal the destination of a URL.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxNiJ9.OcQgc-c8eFz5MILTZvqdFhKuEsx76HVvcQHm01YKKFE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9916<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.5cI1Y_2FYnyxwVK_sqIHTOf3RaNJSR03hmgB1lGX3cw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.74G11quF5IXnwt0u0CDCKS_bcExAFIDkED8NmJCqLvc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.uJv7_nRyj-y8DXBtnGAtRd7ekx7uPJw5xT6RKDCy5MY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.3ComLHHMuRs-RijOKtuwUhXXR9wizzxni_jUihhhC_M\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.4m-dXBwJH-3XMTYs7RAkE5yuFC3K13yti5Ci1qrcuIo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.4EkyGg6A9Y_BryWVzWKwdiUeh4u74RmS32CifJFwXao\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.Vjs83m433rhZDCwkx23uoENvdzjloFQaRNMF9cvbG98\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>This issue was addressed with improved checks. This issue is fixed in iOS 14.0 and iPadOS 14.0, watchOS 7.0. The screen lock may not engage after the specified time period.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk0NiJ9.vORBxSNn2u83IKX4XcUampzy_rF44Rli1k3sJ_TLps0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9946<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ0In0.ZOOD6m6ngdGplCNeT8Hbutta6zcdHL5vTr2RCiFgclQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.xTrAdFXWyM1a2n1ceInQlQEMXUv5JkUBXjYl6nEOZ48\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg4NCJ9.cQy4LrL_8UFAHuSFT-DdbonqEjfqb2qfknsmc-e5FdE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9884<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.z-rNP_ztda3mRFrURqjhSZmUlYEtgA5q1gXIpB3Aq20\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkzNiJ9.RIWUdGdBFMc1DZEfAnDNpdQutsxV5SZHlEQ4yGGRAek\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9936<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.mXGuBzpECCDoolYoKT5_PlA0AF_MSKrRjj6u0D2iCes\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.vjMZRaWP3WiA09K2j9Gh332TIGbfxLIvJ_hFG6wnL1U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.65yKziFzBgmnkJl2QpUalyinKUbNzZOlAObgFa7kDxc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.RCDyhZE72j5aOxZHIlOldCXapV4oJQzavaH5af-hdwk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.mrUgSGtPSjVaVdKns7lEvbIbZvJOwkU0HWX_nbKo2GM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.2vPtWUDBOzYfA8zNhZjEf1hik6tZ5QDzbESRiNEtpo4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.z75LHO6vAQw0uMba6WaQ29J_1dmBOSS8UFXzkKiKF-4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8. An attacker with memory write capability may be able to bypass pointer authentication codes and run arbitrary code.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg3MCJ9.0OyVIlj_R-8oXSQHnJvETQsgpESun42byjRXP_dnTNg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9870<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.Alh23JMXfFLoPaRgl7XxC5hGmMglNim8cVc4bRIkETw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.brfaba_naYHHj1REnYZjZE55rr4cAe2LRpSn96hgl_Y\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.noF9hrYRYeh-hyTawJUsea0vhqzQYuu7r8GrAm5RhOw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved state management. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0. A malicious application may be able to leak sensitive user information.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk3NiJ9.Bg51ryJRETCcxOkPGnYzvcUU1_jXq-e3xAC4QK8MMIE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9976<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQzIn0.5ODkiuAqOjsJIzhmjw-Y8fHfd9rbdneepInvmaUB27k\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ0In0.j2wy9etDMHGromDPIr9fx9jOzbSpTeMtH6veYfiC6YY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.8EtNxJ2ppkOsBjRfU5RDkVy-I0Gtz99J7xmuCCk0QUU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, Safari 13.1.2. An issue in Safari Reader mode may allow a remote attacker to bypass the Same Origin Policy.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxMSJ9.9N6VZz10_EpJIBWRpPF6hN_uITvdIBt1GGnx9ww-uzo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9911<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.aqdtJHrCUWHtsKxy13xPqJq_n6gFAX6rtj8wIM20pvE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.JLO1Lu2B1KvbuhOX8QvBB9BsZmGeU_Y5S1wgK5tBI20\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg5NCJ9.RMxiRx2v6VkwS2iIHprQ_Y1ufV6ITY5T53Lw3nruw78\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9894<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.U4aRfAGjw7p_og8o0pSmPiFogGZeZ_nOF-2-ynhqU4A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.Trr6v6cLbDraxu0SFxQmmvDs22lp-5wklx_EuOzarnE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.HAsYw3Mu9JwO3V2O5GdF1dtBvyz7b77wdM5PmS1lUFE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.Sdyjf-XKurrdmgv9AipwDDibzNkavC3jjETk_t0zzEA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkzIn0.nuTaDZYVFKggDfS-lwPOZiBqnVBXaEAZCEPv9RGBMtY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk0In0.cT2nCOVEYYP-ToujVfx7vnkkwg3V7kK_yCi7fswzLxY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjk1In0.7rSChUn3RQ9b7Q5_9cml0gniP3d3qp_1rHhqs5UevdU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>A logic issue was addressed with improved restrictions. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Catalina 10.15.7, tvOS 14.0, watchOS 7.0. A malicious application may be able to access restricted files.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk2OCJ9.NHyGmjgZClxZw-9aJ-4lQfYozF50pvafzdWgHgWhDck\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9968<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQzIn0.fVI7or36ZTPb4AWlBUbplfh4TzUBLF-Nrst7YWmCb6k\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ0In0.IIRH480FxBnm9QtcUOirePmuBfUE43cDQlTW_L4qlBQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ5In0.9Lt6ARD7SXsjI9dusZoXkUyiPl-eCBBcWXEU9Ft7rIo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODUwIn0.kCWIlw1IRorjgcz-GvQtpimSGxkGPHn_ZcUfyq70YLA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg4OSJ9.esTAsOx8nzk_aAVuTwbRn_6-6UJf8J3dKQun34VrRLs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9889<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.7TVJ-LKhInmpIyFeKHU_MhaM4VLd0LKr1rXkoXP9ZEg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.Z9kjCRFZU1-N9EfsIxOaA3U9xTrkJyFkjTVhro44J0A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.oS4FfGptzQi-W0EuBlbFQM5CXnKMHgYRr7ao5_U1Pio\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.1MVQxb1VMjqhvTy3bp9J2mxUjNA4N-3jKY6WFf8U2D0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg5MCJ9.7sAKQ74Pu_OciBaMwyaQDgJosEhfr1EcEqGZjhRwPlI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9890<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.imx5JaYpUdsOh8-_bJQQ2BaM_numXkn4bMc4q0lxQ7w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.ZQLzv7NXmgoA1S1tD0ZJcSRm6g_3zBYBkNJq4K7NFck\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.W-PkRE9p2Muloh1mxo_11pr8BVaG1yQ9I7uVtSA_2i0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.-a9Dm5IbD4dZNTrQVSf2T9Ho2bt9yPEf1msJDdUIJTk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- multiple_products<\/td>\n<td>An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTg5MSJ9.u-TAZswMfv5uqxle3hnXbCWq2rJTFxJmBItYhOdCbYU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9891<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg4In0.z0D-bxOb7j4_uy7mR_Pug6JtyK_0IqX9KUS09-_Bz_M\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjg5In0.ON2PgyliRpXUttRdV3BAsSmqAkMkA_JNNVQWApDlfjk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkwIn0.nawra5IFcB41BDawKvNSe08QH9rf4C3wVYHpxellWn0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkxIn0.fhR6nhRkrSwhQ3ufwQh3auSGgwBBgfw_WKiYqeKtmbc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- safari<\/td>\n<td>An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk4MyJ9.bmiBEsnSD4PgqqoNT0E7SopGwEev1bghQT12_kvKLJQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9983<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ1In0.IKhV0lx917qZhlX-9CZrJhSliuC2cXgc7VTNBP_Qd2U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- safari<\/td>\n<td>A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk0OCJ9.ipX-FRpdb2DempXk5b_vO4z3TFWSxO7yvdmicGzOOws\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9948<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ1In0.xXDs-UM4wK_am3ZZXZm-a5t2XnQdz1v2Sfau6jiG4H4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- safari<\/td>\n<td>A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTk1MSJ9.AUQgQBgE19c80XnPtWIRDeQhhqRBSE3AttnvSSANddI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9951<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExODQ1In0.c7WhPCBlkyP21e3GAnny7pb5WscxoipUU_84ya36r9c\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>apple -- safari<\/td>\n<td>A logic issue was addressed with improved restrictions. This issue is fixed in Safari 13.1.2. A malicious attacker may be able to change the origin of a frame for a download in Safari Reader mode.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTkxMiJ9.3Y-tmC-vrDdIywf-p7FtOMJCAQtbkwKc1gTKKwf5Wm0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9912<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo1OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYXBwbGUuY29tL0hUMjExMjkyIn0.o6ppPUZtid18LiSlu1nGGQCmvY1rvrwCycpVB-JIXzk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>aptean -- product_configurator<\/td>\n<td>An issue was discovered in Aptean Product Configurator 4.61.0000 on Windows. A Time based SQL injection affects the nameTxt parameter on the main login page (aka cse?cmd=LOGIN). This can be exploited directly, and remotely.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5NDQifQ.2HV69TrH7o3ZrLZHnejbgZw3NszIUIBqFrmE_O8JauI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26944<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5hcHRlYW4uY29tIn0.Vt9rx5fcIrk1WFO_-Yn6E6CvTrhhb9EJdFYRiEvG1L8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5sb2dpY2FsbHlzZWN1cmUuY29tL2Jsb2cvc3FsLWluamVjdGlvbi1pbi1hcHRlYW4vIn0.CcOq_ShZn1MHaQxH9WRjMTIDdp2xtuQubyQTwsIq368\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>arc_informatique --\u00a0 pcvue<\/td>\n<td>A Denial Of Service vulnerability exists in PcVue from version 8.10 onward, due to the ability for a non-authorized user to modify information used to validate messages sent by legitimate web clients.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY4NjgifQ.hFFctl8knewGfZt0SEZgAUMry47Hn6lihB9a_SQr36w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26868<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2ljcy1jZXJ0Lmthc3BlcnNreS5jb20vYWR2aXNvcmllcy9rbGNlcnQtYWR2aXNvcmllcy8yMDIwLzEwLzA5L2tsY2VydC0yMC0wMTYtZGVuaWFsLW9mLXNlcnZpY2UtaW4tYXJjLWluZm9ybWF0aXF1ZS1wY3Z1ZS8ifQ.61cB0jnVOP77nQkd_BxsKZP9EHDalU8W1cQRBfF4lSg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>arc_informatique --\u00a0 pcvue<\/td>\n<td>A Remote Code Execution vulnerability exists in PcVue from version 8.10 onward, due to the unsafe deserialization of messages received on the interface.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY4NjcifQ.YQHzsgqBQKBpRMW-AezR8Zd5uWsoR6t_ewDR7l3kfK4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26867<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2ljcy1jZXJ0Lmthc3BlcnNreS5jb20vYWR2aXNvcmllcy9rbGNlcnQtYWR2aXNvcmllcy8yMDIwLzEwLzA5L2tsY2VydC0yMC0wMTUtcmVtb3RlLWNvZGUtZXhlY3V0aW9uLWluLWFyYy1pbmZvcm1hdGlxdWUtcGN2dWUvIn0.YlZwPIIvnzbungaTJZuvKns6LFQz5UwNNNiKrkxQkTU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>arc_informatique --\u00a0 pcvue<\/td>\n<td>An information exposure vulnerability exists in PcVue 12, allowing a non-authorized user to access session data of legitimate users.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY4NjkifQ.cDC13O5eXx0qcJn0xWoKYVizN8HnsOsB-SJ2VtLWrd8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26869<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2ljcy1jZXJ0Lmthc3BlcnNreS5jb20vYWR2aXNvcmllcy9rbGNlcnQtYWR2aXNvcmllcy8yMDIwLzEwLzA5L2tsY2VydC0yMC0wMTctc2Vzc2lvbi1pbmZvcm1hdGlvbi1leHBvc3VyZS1pbi1hcmMtaW5mb3JtYXRpcXVlLXBjdnVlLyJ9._XH_F2Bkn7mC8u2cAy-d9jjo5hhKQep2bbTO9XaG7jk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>atlassian -- jira_server<\/td>\n<td>Affected versions of Atlassian Jira Server allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in Jira issue filter export files. The affected versions are before 8.5.9, from version 8.6.0 before 8.12.3, and from version 8.13.0 before 8.13.1.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTQxODQifQ.3IEsGaqRicKySz3K_PkCkhWyHlz9vc6sp5K-ubho8EA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-14184<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2ppcmEuYXRsYXNzaWFuLmNvbS9icm93c2UvSlJBU0VSVkVSLTcxNjUyIn0.uy4qxuximZmfYnoAdMZWFXE7nQC-bG0Ur8-vbUHgJSM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>atlassian -- jira_server<\/td>\n<td>Affected versions of Jira Server allow remote unauthenticated attackers to enumerate issue keys via a missing permissions check in the ActionsAndOperations resource. The affected versions are before 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before version 8.12.2.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTQxODUifQ.-aDFE4exFc1e3OkTpZQekrRorVBwaQu8yws4zTImhsY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-14185<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2ppcmEuYXRsYXNzaWFuLmNvbS9icm93c2UvSlJBU0VSVkVSLTcxNjk2In0.Wu_JEJt41EIXJBh1ZOH89H8XyaG3htHc-nSBMWL-B5g\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- automation_runtime<\/td>\n<td>A memory leak in the TFTP service in B&amp;R Automation Runtime versions &lt;N4.26, &lt;N4.34, &lt;F4.45, &lt;E4.53, &lt;D4.63, &lt;A4.73 and prior could allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2MzcifQ.7fDxh_j7xLNCwW4K7IDGYb2CPQCMEoTvIGRrl_-6ZmI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11637<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTU5NTE2MzgxNTM5Ni1kZS1vcmlnaW5hbC0xLjAucGRmIn0.JXtBM8a6-NGIkXV3MOzOQ-OjoQFBql01lumDWelvRKs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- gatemanager_4260_and_9250<\/td>\n<td>A log information disclosure vulnerability in B&amp;R GateManager 4260 and 9250 versions &lt;9.0.20262 and GateManager 8250 versions &lt;9.2.620236042 allows authenticated users to view log information reserved for other users.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDYifQ.MxeEY58v6nCROU9GDyc_icMplIGHTUY1fcK0qikgnu8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11646<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.5rFFbDB-en-_Csf4op_DlkbBbCZfj4Kr0bF3offfb7Y\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- gatemanager_4260_and_9250<\/td>\n<td>An information disclosure vulnerability in B&amp;R GateManager 4260 and 9250 versions &lt;9.0.20262 and GateManager 8250 versions &lt;9.2.620236042 allows authenticated users to view information of devices belonging to foreign domains.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDMifQ.jfR61Ir59gnFi-fq8zHxQLEbR0htLw0vllgUcxq8yEs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11643<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.wjZS1ShFq7l7L1TKpEjfMtGIauE-60LFLoxRILRAchQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- gatemanager_4260_and_9250_and_8250<\/td>\n<td>A denial of service vulnerability in B&amp;R GateManager 4260 and 9250 versions &lt;9.0.20262 and GateManager 8250 versions &lt;9.2.620236042 allows authenticated users to limit availability of GateManager instances.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDUifQ.tC9jlbOKev7uENlldZlNxjB4ov9XJJYAwt6Z6JRAs20\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11645<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.dIYK6XMNx_rKCxM9WRxF3zoOvR98wMw8WV729wI1k1w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- gatemanager_4260_and_9250_and_8250<\/td>\n<td>The information disclosure vulnerability present in B&amp;R GateManager 4260 and 9250 versions &lt;9.0.20262 and GateManager 8250 versions &lt;9.2.620236042 allows authenticated users to generate fake audit log messages.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDQifQ.bANSamaDEX9h2Qew5AvjVSCPMwS_METxFC3OTHNgUyM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11644<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.ogmcbG_ULpRth1wvbLU2YqohzB01zCMAD4FP-tJ4wQA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- sitemanager<\/td>\n<td>The local file inclusion vulnerability present in B&amp;R SiteManager versions &lt;9.2.620236042 allows authenticated users to impact availability of SiteManager instances.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDIifQ.Z91XRep7jC12lWLQPZ5E_mfd1DhUxWU7H63TEMYFIP4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11642<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.a3yCUISfDLE3kuECUYEc4qoQ9M7JM37tneNGTZSErW4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>b&amp;r -- sitemanager<\/td>\n<td>A local file inclusion vulnerability in B&amp;R SiteManager versions &lt;9.2.620236042 allows authenticated users to read sensitive files from SiteManager instances.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NDEifQ.8-uQa1Alpe_5-YbIl47jZwMJFCAd1KEye95zKyRD-jI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-11641<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5ici1hdXRvbWF0aW9uLmNvbS9kb3dubG9hZHNfYnJfcHJvZHVjdGNhdGFsb2d1ZS9hc3NldHMvMTYwMDAwMzE4Mzc1MS1kZS1vcmlnaW5hbC0xLjAucGRmIn0.lopVVbuU01NRt9D73hgutBj28jiqOHebb_53ujtWjE0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bass -- audio_library<\/td>\n<td>The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Denial of Service vulnerability (infinite loop) via a crafted .mp3 file. This weakness could allow attackers to consume excessive CPU and the application becomes unresponsive.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTg3OTYifQ.IYGqFIxkSaPsyZwRqDK2GNp_1ar-BSSZZ9ziLcFYuF0\/s\/1193554985\/br\/87099655821-l\">CVE-2019-18796<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vd3d3LnVuNHNlZW4uY29tLyJ9.wEuiTCUslAyyC2pjV7stnS1UppbtDMVHl0g9dtBz1z4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vc3RhdWZuaWMvQ1ZFL3RyZWUvbWFzdGVyL0NWRS0yMDE5LTE4Nzk2In0.M4aOO-LNCZ98kCMow4hJ9HmUZvRwbpTm-CaT-3pPePk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bass -- audio_library<\/td>\n<td>The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile Use after Free vulnerability via a crafted .ogg file. An attacker can exploit this to gain access to sensitive information that may aid in further attacks. A failure in exploitation leads to denial of service.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTg3OTQifQ.CqjKuL4wdlicTufoxRVc8gVZWn36cGbC0Y8VKFOyS-k\/s\/1193554985\/br\/87099655821-l\">CVE-2019-18794<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vd3d3LnVuNHNlZW4uY29tLyJ9.4aZn9wK0lS2mF0bnQoZVvpfQ6jW5JiK6Y_FwRP7k4gI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vc3RhdWZuaWMvQ1ZFL3RyZWUvbWFzdGVyL0NWRS0yMDE5LTE4Nzk0In0.VKBDS0IqqrXZtlS4GRlgU5x5xowaTfeIfj-vnbBO-Ok\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bass -- audio_library<\/td>\n<td>The BASS Audio Library 2.4.14 under Windows is prone to a BASS_StreamCreateFile out of bounds read vulnerability via a crafted .wav file. An attacker can exploit this issues to gain access to sensitive information that may aid in further attacks. A failure in exploitation leads to denial of service.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTg3OTUifQ.ZiixHzsBxLkERr7eSa9m6x0QpvrzvkW5sVDki5s0zt8\/s\/1193554985\/br\/87099655821-l\">CVE-2019-18795<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vd3d3LnVuNHNlZW4uY29tLyJ9.v7IHK5GZNWeHhLFe8BDzh5TEbqdlEIdA8Qx2I8M7VNc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vc3RhdWZuaWMvQ1ZFL3RyZWUvbWFzdGVyL0NWRS0yMDE5LTE4Nzk1In0.WFH7gjgu9oeu9dkRWtTMNH-PkQveyqpJiGEGt4k-R24\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bass -- audio_library<\/td>\n<td>The BASSMIDI plugin 2.4.12.1 for Un4seen BASS Audio Library on Windows is prone to an out of bounds write vulnerability. An attacker may exploit this to execute code on the target machine. A failure in exploitation leads to a denial of service.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTk1MTMifQ._068-ZjO151saA4DTmCaAqQvSJCrhEzhw9K2RqBQw6Q\/s\/1193554985\/br\/87099655821-l\">CVE-2019-19513<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vd3d3LnVuNHNlZW4uY29tLyJ9.WYNfFYGtaSBdxUdFu4N9g5KOj-s7ESpf67HQ5JcOZRs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vc3RhdWZuaWMvQ1ZFL3RyZWUvbWFzdGVyL0NWRS0yMDE5LTE5NTEzIn0.VjUyjREam5biG8RWpQIiaSfkb6771Eoy7bzNHD9wu-w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bender -- comtraxx<\/td>\n<td>In Bender COMTRAXX, user authorization is validated for most, but not all, routes in the system. A user with knowledge about the routes can read and write configuration data without prior authorization. This affects COM465IP, COM465DP, COM465ID, CP700, CP907, and CP915 devices before 4.2.0.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTk4ODUifQ.U__eopYJi5H5I8EHB8pk7BJoPaTjc8Z7BAue3s3JPm4\/s\/1193554985\/br\/87099655821-l\">CVE-2019-19885<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2NlcnQudmRlLmNvbS9lbi11cy9hZHZpc29yaWVzL3ZkZS0yMDIwLTA0MyJ9.D4qL3_Mc5XORpujjeu2Al7a9FLnjtBbjpLNqGWFfTfo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>blackberry -- uem_core<\/td>\n<td>An improper input validation vulnerability in the UEM Core of BlackBerry UEM version(s) 12.13.0, 12.12.1a QF2 (and earlier), and 12.11.1 QF3 (and earlier) could allow an attacker to potentially cause a Denial of Service (DoS) of the UEM Core service.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjkzMyJ9.HWQohj_vtjHTuKhShWukitASqbvlrutRpamxYfdJHlw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6933<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQuYmxhY2tiZXJyeS5jb20va2IvYXJ0aWNsZURldGFpbD9hcnRpY2xlTnVtYmVyPTAwMDA2ODExMiJ9.26Aikf33kxfsOeHkJN7yXqDBXdQG2MMp8DSm9lwLrNY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>bluez -- bluez<\/td>\n<td>In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared\/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjcxNTMifQ.yT2RBJilWMpTrbSIhtpCwyNZ74Q7rI9iiTxt-IdCLQk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27153<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2J1Z3ppbGxhLnJlZGhhdC5jb20vc2hvd19idWcuY2dpP2lkPTE4ODQ4MTcifQ.br9sJwpZGUSSxzGJUK108qQpsjgKMVfyF6okrfYB-qQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYmx1ZXovYmx1ZXovY29tbWl0LzFjZDY0NGRiOGMyM2EyZjUzMGRkYjkzY2ViZWQ3ZGFjYzVmNTcyMWEifQ.hpLjxUyGQFcqL17_DLWGbTYRnnYEPpEqtQ78wI5b-OY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYmx1ZXovYmx1ZXovY29tbWl0LzVhMTgwZjJlYzllZGZhY2FmZDk1ZTVmZWQyMGQzNmZlOGUwNzdmMDcifQ.PhLm6uujks39e8DPwDiBdApTaeTyI4r_PKZyDNxEYbs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>canimaan_software -- clamxav<\/td>\n<td>An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY4OTMifQ.3NKKEwpi_ySiPheeKSjiAM84uQURCWngGf7Go6aD5P0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26893<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpc3QuZ2l0aHViLmNvbS9tYXR0LWNsYW14YXYvZDM0MWJkNDhmMTJhMTRkMjE0N2Y4Y2U4NjBiYjM2ZDAifQ.ZxRX7wIQagEfeVpvVohEXjoD4yMhDyLgO4t-UiL19mU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>cisco -- duo_authentication<\/td>\n<td>A privilege escalation vulnerability exists in the Duo Authentication for Windows Logon and RDP implementation. This vulnerability could allow an authenticated local attacker to overwrite files in privileged directories.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMzQyNyJ9.ZuYSGEmbgS2WMpiwgIxi9LkWuxdkvgJSs8zVPx0E5VA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-3427<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2R1by5jb20vZG9jcy9yZHAtbm90ZXMifQ.I5htMQ1-TVzAb1Lz1GUPcs1f_EkACO69ydKUWPIDJdM\/s\/1193554985\/br\/87099655821-l\">CISCO<\/a><\/td>\n<\/tr>\n<tr>\n<td>cisco -- duo_network_gateway<\/td>\n<td>Duo has identified and fixed an issue with the Duo Network Gateway (DNG) product in which some customer-provided SSL certificates and private keys were not excluded from logging. This issue resulted in certificate and private key information being written out in plain-text to local files on the DNG host. Any private keys logged in this way could be viewed by those with access to the DNG host operating system without any need for reversing encrypted values or similar techniques. An attacker that gained access to the DNG logs and with the ability to intercept and manipulate network traffic between a user and the DNG, could decrypt and manipulate SSL\/TLS connections to the DNG and to the protected applications behind it. Duo Network Gateway (DNG) versions 1.3.3 through 1.5.7 are affected.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMzQ4MyJ9.6tv6ntn3UFlmtQUebZfg0opSAgX4K1tsgUI4Faf42Tc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-3483<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2R1by5jb20vbGFicy9wc2EvZHVvLXBzYS0yMDIwLTAwNCJ9.42RTvP4bOKdda1dMm85BUWvFKlwXvDU6aWAYLuqqnaQ\/s\/1193554985\/br\/87099655821-l\">CISCO<\/a><\/td>\n<\/tr>\n<tr>\n<td>containerd -- containerd<\/td>\n<td>In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a \u201cforeign layer\u201d), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUxNTcifQ.Hx8zLfdvMikZreelPlOd5JAHLpdLhyHOujsFeKdlZvc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15157<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vY29udGFpbmVyZC9jb250YWluZXJkL3JlbGVhc2VzL3RhZy92MS4yLjE0In0.zb7WhjPiUGp9GpqS1VH_Hqg1_tWx-pk_r88PJytarsQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vY29udGFpbmVyZC9jb250YWluZXJkL3NlY3VyaXR5L2Fkdmlzb3JpZXMvR0hTQS03NDJ3LTg5Z2MtOG05YyJ9.SKMImI46I4X1EWhLq7wAIKwKqe0-ilQTcj3NQOYwcoA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>crossbeam -- crossbeam<\/td>\n<td>Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUyNTQifQ.Q7TdKWlQIIU1y1NyLFWQEmR_50jXztdDr58i6elE99w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15254<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vY3Jvc3NiZWFtLXJzL2Nyb3NzYmVhbS9pc3N1ZXMvNTM5In0.H_jHZDpcc3p7NBT4CIWtwJWlmOLM1YFRw5_HSvaJ9Co\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vY3Jvc3NiZWFtLXJzL2Nyb3NzYmVhbS9wdWxsLzUzMyJ9.eoQXRPA4cAgmUT5uDyEcP57TYBFPKrVI0Co-Uh9XrhM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vY3Jvc3NiZWFtLXJzL2Nyb3NzYmVhbS9zZWN1cml0eS9hZHZpc29yaWVzL0dIU0EtdjVtNy01M2N2LWYzaHgifQ.ZBRBxGtEIfz5wknJMEu2qvSHDyOLBGJ1RiGUYquBZMI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vUnVzdFNlYy9hZHZpc29yeS1kYi9wdWxsLzQyNSJ9.v-P4iuNP-nhenv-froSLD3JVY1WbPd0DJxdDZWTAzDw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>dca -- vantage_analyzer<\/td>\n<td>A vulnerability has been identified in DCA Vantage Analyzer (All versions &lt; V4.5 are affected by CVE-2020-7590. In addition, serial numbers &lt; 40000 running software V4.4.0 are also affected by CVE-2020-15797). Affected devices use a hard-coded password to protect the onboard database. This could allow an attacker to read and or modify the onboard database. Successful exploitation requires direct physical access to the device.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzU5MCJ9.zvKHxFqEOiv7KtSSCwB8XG8bjcwQsJtHLES6o3nhIRQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7590<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5zaWVtZW5zLWhlYWx0aGluZWVycy5jb20vc3VwcG9ydC1kb2N1bWVudGF0aW9uL3NlY3VyaXR5LWFkdmlzb3J5In0.Fo8WE1BnGfl9wS0e8ZGKPG2X41SGNglpT6XiYO6xhAA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>dca -- vantage_analyzer<\/td>\n<td>A vulnerability has been identified in DCA Vantage Analyzer (All versions &lt; V4.5 are affected by CVE-2020-7590. In addition, serial numbers &lt; 40000 running software V4.4.0 are also affected by CVE-2020-15797). Improper Access Control could allow an unauthenticated attacker to escape from the restricted environment (\u201ckiosk mode\u201d) and access the underlying operating system. Successful exploitation requires direct physical access to the system.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTU3OTcifQ.Wz7-GFWye5o0QUZNaNfHdSCH_m6BDQOxR8EAQ9dnH3c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15797<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5zaWVtZW5zLWhlYWx0aGluZWVycy5jb20vc3VwcG9ydC1kb2N1bWVudGF0aW9uL3NlY3VyaXR5LWFkdmlzb3J5In0.yU-V3K8rE-QputR96wZWV1KkiLNcka8x1RTsvsd0bD4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>debian -- sympa<\/td>\n<td>debian\/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group)<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5MzIifQ.fwk-zBz6dEnJhmCSWQfCVZB5P4Xkg5jxR9b-nrpQNIo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26932<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2J1Z3MuZGViaWFuLm9yZy85NzE5MDQifQ.V-s5gvELAtz66xkzwBlHJvCsXdqduU53EwL5-jsmtGQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NhbHNhLmRlYmlhbi5vcmcvc3ltcGEtdGVhbS9zeW1wYS8tL21lcmdlX3JlcXVlc3RzLzEifQ.ZDcvVq3MArsis48jOdGuUCOXrGKovZbtS2_ZnlrUhjE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>dell -- emc_networker<\/td>\n<td>Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjYxODIifQ.WJU9SJ0KrysNodN0Cviui9oW9sdY0gnW1zOtLDShlng\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26182<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5kZWxsLmNvbS9zdXBwb3J0L3NlY3VyaXR5L2VuLXVzL2RldGFpbHMvNTQ2NjE2L0RTQS0yMDIwLTIyOS1EZWxsLUVNQy1OZXRXb3JrZXItTXVsdGlwbGUtU2VjdXJpdHktVnVsbmVyYWJpbGl0aWVzIn0.sbWaol5nmZCnIkIdsONZK2l9n2KR3rxrvSDpDojrKKk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>dell -- emc_networker<\/td>\n<td>Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjYxODMifQ.sqnxKq38c22QrcRZ6w-JLxl0IIcD3hCGiiX3FtaJDRo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26183<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5kZWxsLmNvbS9zdXBwb3J0L3NlY3VyaXR5L2VuLXVzL2RldGFpbHMvNTQ2NjE2L0RTQS0yMDIwLTIyOS1EZWxsLUVNQy1OZXRXb3JrZXItTXVsdGlwbGUtU2VjdXJpdHktVnVsbmVyYWJpbGl0aWVzIn0.vYVmSFRtKchTmscwZ7vcVmByERxadxhM1WjlJmdXxFA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>desigo -- insight<\/td>\n<td>A vulnerability has been identified in Desigo Insight (All versions). Some error messages in the web application show the absolute path to the requested resource. This could allow an authenticated attacker to retrieve additional information about the host system.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTU3OTQifQ.N1bLIdqmAKFV_78XNy1eeAt0jJ_s8f5CclSHzcE577s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15794<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2NlcnQtcG9ydGFsLnNpZW1lbnMuY29tL3Byb2R1Y3RjZXJ0L3BkZi9zc2EtMjI2MzM5LnBkZiJ9.5s041BKqtXvZ2BSXxTTdKM1IzBB84H6RpToyj75uyok\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>desigo -- insight<\/td>\n<td>A vulnerability has been identified in Desigo Insight (All versions). The web service does not properly apply input validation for some query parameters in a reserved area. This could allow an authenticated attacker to retrieve data via a content-based blind SQL injection attack.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTU3OTIifQ.WDEYTjKMm08rXsy-5_o1ByfIcUa3STE3Cpxh7JyQojU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15792<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2NlcnQtcG9ydGFsLnNpZW1lbnMuY29tL3Byb2R1Y3RjZXJ0L3BkZi9zc2EtMjI2MzM5LnBkZiJ9.gtkFpTD-5uhM5YXkMtBuZtuy2t3Ut6Tx8ZeOb8vEjL8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>desigo -- insight<\/td>\n<td>A vulnerability has been identified in Desigo Insight (All versions). The device does not properly set the X-Frame-Options HTTP Header which makes it vulnerable to Clickjacking attacks. This could allow an unauthenticated attacker to retrieve or modify data in the context of a legitimate user by tricking that user to click on a website controlled by the attacker.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTU3OTMifQ.ZF-NWl1L7dWCWUmxl1TPBMO1o9WrkQ9wPtBTaRwXQqY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15793<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2NlcnQtcG9ydGFsLnNpZW1lbnMuY29tL3Byb2R1Y3RjZXJ0L3BkZi9zc2EtMjI2MzM5LnBkZiJ9.R1VbEGbJexmSXEO14kvKSrgmtdhrrHcPrQCGGbiYFFk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>eclipse -- vert<\/td>\n<td>In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0.milestone1, 4.0.0.milestone2, 4.0.0.milestone3, 4.0.0.milestone4, 4.0.0.milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working directory.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTc2NDAifQ.amjzQBuKOOjXQGxILR3E6rIuu4Y9vK0IgkBeIjeYw_Y\/s\/1193554985\/br\/87099655821-l\">CVE-2019-17640<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2J1Z3MuZWNsaXBzZS5vcmcvYnVncy9zaG93X2J1Zy5jZ2k_aWQ9NTY3NDE2In0.ofnBQAaLwBW3zCspiyIbiXJpbuK3bY-R9Z4AZk8pYu8\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>electron -- wire<\/td>\n<td>In Wire before 3.20.x, `shell.openExternal` was used without checking the URL. This vulnerability allows an attacker to execute code on the victims machine by sending messages containing links with arbitrary protocols. The victim has to interact with the link and sees the URL that is opened. The issue was patched by implementing a helper function which checks if the URL's protocol is common. If it is common, the URL will be opened externally. If not, the URL will not be opened and a warning appears for the user informing them that a probably insecure URL was blocked from being executed. The issue is patched in Wire 3.20.x. More technical details about exploitation are available in the linked advisory.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUyNTgifQ.eZ9-hR6WYpPkZBSaYVTLCDVtu5smX96a-Ep17yChIrg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15258<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2JlbmphbWluLWFsdHBldGVyLmRlL3NoZWxsLW9wZW5leHRlcm5hbC1kYW5nZXJzLyJ9.CwOrRmiV8JCRer_QYtLszUv5ImEHS2Gw0rTODPpfAUw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vd2lyZWFwcC93aXJlLWRlc2t0b3AvY29tbWl0L2IzNzA1ZmZmYTc1YTAzZjA1NTUzMGY1NWE3NTRmYWNlNWFjMDYyM2IifQ.VJi654TjkdwxMnbSZeFu1KhcXF0DdfjDZTVES1aWQ0g\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vd2lyZWFwcC93aXJlLWRlc2t0b3Avc2VjdXJpdHkvYWR2aXNvcmllcy9HSFNBLTVncHgtOTk3Ni1nZ3BtIn0.uPAnNrQtk_y4hIPH84shEhxzVZ17yXMKFAsGFIo5DJI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>emby -- emby_server<\/td>\n<td>Emby Server before 4.5.0 allows SSRF via the Items\/RemoteSearch\/Image ImageURL parameter.<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY5NDgifQ.uAmqsl0FpWIYEDxwHN8RKpgoUUID9kZEx-3rH3C_h5c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26948<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYnRuei1rL2VtYnlfc3NyZiJ9.OnoD4Q_oB9feS-H9dS6VkF0g1xtBhA27NfhKHsPPTMM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vYnRuei1rL2VtYnlfc3NyZi9ibG9iL21hc3Rlci9lbWJ5X3NjYW4ucmIifQ.uTsCRs0a5sZn2LB27QTFhYVc_ZeMAS5IfFxAFOWYIQU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>excast -- pro_ii<\/td>\n<td>In EZCast Pro II, the administrator password md5 hash is provided upon a web request. This hash can be cracked to access the administration panel of the device.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTIzMDUifQ.nkC0mNNS4jEtuV6XfRm9cFdIqU3E_HZENh76H01TWqA\/s\/1193554985\/br\/87099655821-l\">CVE-2019-12305<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2RpZ2l0YWwuc2VjdXJpdHkvYWR2aXNvcmllcy9jZXJ0LWRzX2Fkdmlzb3J5LWV6Y2FzdF9wcm9faWlfYWRtaW5fcGFzc3dvcmQtY3ZlLTIwMTktMTIzMDUudHh0In0.Sk2QvACBnBnvbDE3NMX38K8ZYsgFQFEKOAlIvF3vQZw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>excellium -- helpdeskz<\/td>\n<td>** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in HelpDeskZ 1.0.2. The feature to auto-login a user, via the RememberMe functionality, is prone to SQL injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY1NDYifQ.NSFVwa3lAq4e3FcgLj9qzOL_w5Ou23ZsVRIEb9EZDPs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26546<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2VsbGl1bS1zZXJ2aWNlcy5jb20vY2VydC14bG0tYWR2aXNvcnkvQ1ZFLTIwMjAtMjY1NDYvIn0.dRB8VKbIGSZN6KJIZM6_eFOKZiDG039NcUvj56FZ9Ss\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>f2fs-tools -- f2fs-tools<\/td>\n<td>An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjEwNSJ9.Ns6t8vnfIcZzl0eALzVqXWWIPTkb0obZX-9_bkeeCyE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6105<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3RhbG9zaW50ZWxsaWdlbmNlLmNvbS92dWxuZXJhYmlsaXR5X3JlcG9ydHMvVEFMT1MtMjAyMC0xMDQ3In0.5TACZXcFsfGhOwhngeSe9EwBJXOsxvqjWSF-2LDnsJ0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>f2fs-tools -- f2fs-tools<\/td>\n<td>An exploitable information disclosure vulnerability exists in the get_dnode_of_data functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause information disclosure resulting in a information disclosure. An attacker can provide a malicious file to trigger this vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjEwNCJ9.ug6L1s3wZokwldaKOXorVkrkdHEdFt3sg2xSVdSnndk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6104<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3RhbG9zaW50ZWxsaWdlbmNlLmNvbS92dWxuZXJhYmlsaXR5X3JlcG9ydHMvVEFMT1MtMjAyMC0xMDQ2In0.s-FzXHPRZ8gFJh_WkgQr5n0ysdrc2I8CFhKFdjJrLQc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>f2fs-tools -- f2fs-tools<\/td>\n<td>An exploitable information disclosure vulnerability exists in the init_node_manager functionality of F2fs-Tools F2fs.Fsck 1.12 and 1.13. A specially crafted filesystem can be used to disclose information. An attacker can provide a malicious file to trigger this vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjEwNiJ9.o8X9H7AyCoSEtl2YJsyk99A4RQUeQfeQuPM5Wg6nvh0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6106<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3RhbG9zaW50ZWxsaWdlbmNlLmNvbS92dWxuZXJhYmlsaXR5X3JlcG9ydHMvVEFMT1MtMjAyMC0xMDQ4In0._KSU1weWYF7nTHd4B-DcljvULr7k1m_D2uVo6DtIW5Q\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>f2fs-tools -- f2fs-tools<\/td>\n<td>An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjEwOCJ9.EgvjNftn-u3FV5j1x7548saAJqOZze-BLO0nV-Z_OQ8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6108<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3RhbG9zaW50ZWxsaWdlbmNlLmNvbS92dWxuZXJhYmlsaXR5X3JlcG9ydHMvVEFMT1MtMjAyMC0xMDUwIn0.xqdG8YAEZV6hOMFkmdwHAH7hRnnXucH7AgoH_Munzgo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>f2fs-tools -- f2fs-tools<\/td>\n<td>An exploitable information disclosure vulnerability exists in the dev_read functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause an uninitialized read resulting in an information disclosure. An attacker can provide a malicious file to trigger this vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo2OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNjEwNyJ9.jo54CqRIvMomiUVnOb9lQOUNq39uNgeQ9FKZlGLb03o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6107<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3RhbG9zaW50ZWxsaWdlbmNlLmNvbS92dWxuZXJhYmlsaXR5X3JlcG9ydHMvVEFMT1MtMjAyMC0xMDQ5In0.XhivcWFeaHDV-EezV853Txv4gPenuDlGnLUz03RgQrE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxit -- reader<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11657.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTcifQ.FUARQ_WgNtJy7_XPuyHGCWDSPPzNfpo-dJG03iw0osU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17417<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.udJLW6pIf17aFK-Wq2Ax0J7Oovy7VkrSFHcDDiMr8N4\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzNC8ifQ.jeg0Tl0o0fHGi5G9xbLMd0tAhIwbZSwPbY3nZoEMR-0\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>foxit -- reader<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG2000 images. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11497.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MTYifQ.yOnGpoHfUMU4qSg1pBI6S_bSzyomGtuWWE0yqGJbSys\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17416<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5mb3hpdHNvZnR3YXJlLmNvbS9zdXBwb3J0L3NlY3VyaXR5LWJ1bGxldGlucy5waHAifQ.ynd-9Cx5glq9cdK40NPHx6-Oao4EcSpDseuUwC5m8QQ\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIzMy8ifQ.5vX4ftYCVj2wLjx6Fh5E6QRkFU0ULL-Zqx52rAyUbbM\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>gitea -- gitea<\/td>\n<td>The git hook feature in Gitea 1.1.0 through 1.12.5 allows for authenticated remote code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTQxNDQifQ.Xw-6PH4-7w4py-yX8eSQnaxqdfXOzOXEotaID5soM54\/s\/1193554985\/br\/87099655821-l\">CVE-2020-14144<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ28tZ2l0ZWEvZ2l0ZWEvcHVsbC8xMzA1OCJ9.G7biLqBgvRBerCjZzEMPG9gIyxmm1635cMJd1T-6aEw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ28tZ2l0ZWEvZ2l0ZWEvcmVsZWFzZXMifQ.4hT4HOg9OmSPEXjmxU0KaVcAlTMvph7G0xDAVcZd8ew\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5memkuZGUvZW4vbmV3cy9uZXdzL2RldGFpbC1lbi9hcnRpa2VsL2ZzYS0yMDIwLTMtc2Nod2FjaHN0ZWxsZS1pbi1naXRlYS0xMTI1LXVuZC1nb2dzLTAxMjItZXJtb2VnbGljaHQtYXVzZnVlaHJ1bmctdm9uLWNvZGUtbmFjaC1hdXRoZW50LyJ9.o8iKTospGaazO_jiANAQAaV4wMtXB_fp1fJF4sPSs5A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>gitlab -- gitlab<\/td>\n<td>An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Insufficient permission check allows attacker with developer role to perform various deletions.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTMzNDEifQ.WKvxojIpClYUY3QGvq6sHN9WECmQXnzNSJbK0xApEas\/s\/1193554985\/br\/87099655821-l\">CVE-2020-13341<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGxhYi5jb20vZ2l0bGFiLW9yZy9jdmVzLy0vYmxvYi9tYXN0ZXIvMjAyMC9DVkUtMjAyMC0xMzM0MS5qc29uIn0.hbztTvf4sHAM8efRPTsc326PEWMdNOkMekE3C4FtwOE\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGxhYi5jb20vZ2l0bGFiLW9yZy9naXRsYWIvLS9pc3N1ZXMvMjM5MzQ4In0.xg1-8b1WJsxpO_Gn3FGdDKcfHuNU4wcZuHs-0wBVEF8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2hhY2tlcm9uZS5jb20vcmVwb3J0cy85NjAyNDQifQ.ss1c1Grnme_q9bndGJsO6ysGDXQUMsgmWsHdYynRnmQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>gogs -- gogs<\/td>\n<td>The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTU4NjcifQ.iyPbyvyhM5xoc0wyvITqOxOH2Rd7oRPXkcc_D3IttuA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15867<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5memkuZGUvZW4vbmV3cy9uZXdzL2RldGFpbC1lbi9hcnRpa2VsL2ZzYS0yMDIwLTMtc2Nod2FjaHN0ZWxsZS1pbi1naXRlYS0xMTI1LXVuZC1nb2dzLTAxMjItZXJtb2VnbGljaHQtYXVzZnVlaHJ1bmctdm9uLWNvZGUtbmFjaC1hdXRoZW50LyJ9.3LJGk9fRaDnhJ19CukHCTsLqSJ04q32j4-gavO1ob7U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161151868References: N\/A<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMDQyMyJ9.MI7JaMklQ7pU4ax4myCdrHn4_MbJJodS3lF97uMqlPg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0423<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NvdXJjZS5hbmRyb2lkLmNvbS9zZWN1cml0eS9idWxsZXRpbi8yMDIwLTEwLTAxIn0.w4IvScB-Yo5PS8d-cViI5zFUlqJTGmLSdYHOSP8zGRU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>google -- android<\/td>\n<td>This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. <a href=\"http:\/\/google.com\/\">google.com<\/a> or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background).<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzc0NCJ9.QJn-qL5ZCT7EgcGQks4n2O_K0KR0nk_llOf2CCbCHJE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7744<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NueWsuaW8vYmxvZy9yZW1vdGUtY29kZS1leGVjdXRpb24tcmNlLXNvdXJtaW50LyJ9.WiP01fLP_Ac44kWJ15kt76j_j9Z6Xx45j3qCy6tg8Y0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NueWsuaW8vcmVzZWFyY2gvc291ci1taW50LW1hbGljaW91cy1zZGsvIn0.ZHdOxMPu4sRLgne77oVjqmW5rFmuWauFJ2OpA4xkrVc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3NueWsuaW8vdnVsbi9TTllLLUpBVkEtQ09NTUlOVEVHUkFMTVNESy0xMDE4NzE0In0.By-DWnk1SUZ0dPEBaol-ZYtPDXG3EJ3_Xgw1ulUl1Us\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>grocy -- grocy<\/td>\n<td>Versions of Grocy &lt;= 2.7.1 are vulnerable to Cross-Site Scripting via the Create Shopping List module, that is rendered upon deleting that Shopping List. The issue was also found in users, batteries, chores, equipment, locations, quantity units, shopping locations, tasks, taskcategories, product groups, recipes and products. Authentication is required to exploit these issues and Grocy should not be publicly exposed. The linked reference details a proof-of-concept.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUyNTMifQ.68JgJko-JNN6D3-TKFW4-HjTX95glksJ8JR2rfkxI9E\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15253<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ3JvY3kvZ3JvY3kvY29tbWl0LzA2MjRiMGRmNTk0YTQzNTNlZjI1ZTZiMTg3NDU2NWVhNTJjZTc3NzIifQ.-d6uLWQfHsdMn-W2IJ68C9o_NgUI5uREOQ102f0Pd7c\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ3JvY3kvZ3JvY3kvY29tbWl0LzBkZjI1OTBkZTI3YzYwYzE4YjdkYjZlMDU2MzQ3YmQyYWZmNWE4ODcifQ.xqR8n474TqJzJLPpZCQfLg_Vs7j-cC04r9MTZST-WnY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ3JvY3kvZ3JvY3kvaXNzdWVzLzk5NiJ9.qR6SIFPR1NTpY_j9v50ewUFMeqOQct7w6KOR9NwAm5U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vZ3JvY3kvZ3JvY3kvc2VjdXJpdHkvYWR2aXNvcmllcy9HSFNBLTdmMzctMmZqci12OXA3In0.zsbjdEYS5eeE4ERxbbZNfufWKW4xH26I3pV5NwwxncU\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- mate_20_devices<\/td>\n<td>There is an information disclosure vulnerability in several smartphones. The device does not sufficiently validate the identity of smart wearable device in certain specific scenario, the attacker need to gain certain information in the victim's smartphone to launch the attack, and successful exploit could cause information disclosure.Affected product versions include:HUAWEI Mate 20 versions earlier than 10.1.0.160(C00E160R3P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI Mate 20 X versions earlier than 10.1.0.160(C00E160R2P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8);Laya-AL00EP versions earlier than 10.1.0.160(C786E160R3P8);Tony-AL00B versions earlier than 10.1.0.160(C00E160R2P11);Tony-TL00B versions earlier than 10.1.0.160(C01E160R2P11).<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEwOSJ9.fy5UqsrL37RN3uAlFh74UyyRAhmGyXSr0pW4hL7jr_w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9109<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLWRvcy1lbiJ9.Jnji8Rur3LxKmL6jvSJxAhwN_0W_a5MEv4_9OpK2LII\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>huawei -- p30_pro_devices<\/td>\n<td>HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8) and versions earlier than 10.1.0.160(C01E160R2P8) have a buffer overflow vulnerability. An attacker induces users to install malicious applications and sends specially constructed packets to affected devices after obtaining the root permission. Successful exploit may cause code execution.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtOTEyMyJ9.0BhJ4SHGY_dk_g0g16RmCBOapKkFG-dfMQo0kJHGHqk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-9123<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5odWF3ZWkuY29tL2VuL3BzaXJ0L3NlY3VyaXR5LWFkdmlzb3JpZXMvaHVhd2VpLXNhLTIwMjAwOTMwLTAxLWJ1ZmZlci1lbiJ9.Zm7RXkTXrbBGtGwMtpjnCBeREen1MYTNu98IC7iBS4U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>An improper input validation before calling java readLine() method may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, which could result in a denial of service. IBM X-Force ID: 189159.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc4MSJ9.VadYdmdRQIEcbnpinBbwm-hXVAkFFIzHCEo0I5kmQkk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4781<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1OSJ9.8vl8g79FG1R7VUp1saaq0Acy82kGpTj20hHvIXVYdao\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTg1In0.5cXRDixFYFTUyfzzMSB61RZ8CAp1QYnsNMYCYbklJGM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>An XPath vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, caused by the improper handling of user-supplied input. By sending a specially-crafted input, a remote attacker could exploit this vulnerability to obtain unauthorized access or reveal sensitive information such as XML document structure and content. IBM X-Force ID: 189152.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3NCJ9.TqvzveH6kUQSn0RcZtdUlHz_S2BEjLtAlR80axIDRLU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4774<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1MiJ9.HZJitOzCMZk1h-NfM-7WVeC2W-khHfyC-7DxPs0G1YA\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTk1In0.50oM3LL9TR5-Qro2cIkfLV-KRAo7nG4bQfK_2Orbn4c\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>A HTTP Verb Tampering vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass security access controls. IBM X-Force ID: 189156.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3OSJ9.ZCkfQmWHhrnwWxO22scNRasZ-kRyGd92aIngAvuR3YE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4779<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1NyJ9.aU4Axe7lOMD61gHRYRcHgmd9N4yCCXZlFo5QCX-c5hM\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTc5In0.dQLBnKzPFJqN4U2Qrjscn00jXXopbncaOae5NV8IYHg\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>A cross-site request forgery (CSRF) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, which is an attack that forces a user to execute unwanted actions on the web application while they are currently authenticated. This applies to a single server class only, with no impact to remainder of web application. IBM X-Force ID: 189151.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3MyJ9.ga1dGIB2h9LgoFs6K417HBD9Tvf8fLr8CTjT5LxjGxI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4773<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1MSJ9.uSPkkdMhYieF3dWAguM7zOEu5J_jFyoEMLWYjVbjgxM\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ0MDk3In0.t0KsTlhs2OCY3xyxLlwyiYBl0DFIPgNQhamwCVIuANA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>OOTB build scripts does not set the secure attribute on session cookie which may impact IBM Curam Social Program Management 7.0.9 and 7.0,10. The purpose of the 'secure' attribute is to prevent cookies from being observed by unauthorized parties. IBM X-Force ID: 189158.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc4MCJ9.pSUAIGDW2dI7Pgx05NZnmZUauFzO9tzwnJiNh8xKYNg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4780<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1OCJ9.sBiVoS7S0hXb-pNaCjtobomnq2JqIK_40PLzBht9qio\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTgxIn0.rjxu7ambmyi1ME812Z6muLAGin6-1MNjBvGMOdQRJWw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>An XML External Entity Injection (XXE) vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10. A remote attacker could exploit this vulnerability to expose sensitive information, denial of service, server side request forgery or consume memory resources. IBM X-Force ID: 189150.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3MiJ9.SCv3qfFLrqhErHvFAG9T6GjclBH1iTnWvkRVW1IpTII\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4772<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1MCJ9.034td9TbVf_R1dvK5bC2pyyauy9Pj-us3d-jW22CpxU\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ0MDY5In0.rBknTG7jsHZeFq71xJ1q2W841dviULLnf4ccRjxwg4k\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>IBM Curam Social Program Management 7.0.9 and 7.0.10 uses MD5 algorithm for hashing token in a single instance which less safe than default SHA-256 cryptographic algorithm used throughout the C\u00c3\u00baram application. IBM X-Force ID: 189156.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3OCJ9.vuitcvQdjuWyH24YZMOY-3jnbh2VQeWwm7jWAWeGP3A\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4778<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1NiJ9.HtpUa0VhWotQiC32jNaEjG295D3XzSs6qxlrMhX9xR4\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTc1In0.krs3SV9kuKU5onniV6trJF7E8L0L3gdLnpW4DQmyXIM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- curam_social_program_management<\/td>\n<td>A path traversal vulnerability may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, which could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted file path in URL request to view arbitrary files on the system. IBM X-Force ID: 189154.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDc3NiJ9.cHcU1RDDcjAw3kyfLxlBEtJi6q7boQy4BUZyXdzFZMs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4776<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4OTE1NCJ9.TbyiaS4giOH5hoAL3-zyrlgFwXaFdF_issgi4cvQNGE\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NTczIn0.MLKlNCwfTpq0_uNuj_6HVN27gVyshNvbSxU9KwMeaOI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- resilient_onprem<\/td>\n<td>IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDYzNiJ9.iMUHx9u1j78hi6_pWpmb2chbMVY43YkVteLi86g2I7Y\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4636<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NTUwMyJ9.GezTiyv29UA-SEDzkXfy_Di4ZG6G7clPv7L1vXqIdD4\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ4Njk0In0.ViG4ZfSZqZUuaem87i7MKgOen2YBjO9aQwh0SMkHE8w\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager<\/td>\n<td>IBM Security Access Manager Appliance 9.0.7 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 179358.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDM5NSJ9.sqeC9GtOCjlBmU1Laka-4twpxCediCqfdTGa9jyh3pM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4395<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE3OTM1OCJ9.IXQ4nDjg_Rb_4pU7Qz8H3P7s27cZU3aHRlg47UxLlHw\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ3NTkyIn0.ZCQeqymjH50MPVG_Kswmt9V2ix6LlAXbu2cNwYhjLcI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager_and_security_verify_access<\/td>\n<td>IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an attacker to obtain sensitive using timing side channel attacks which could aid in further attacks against the system. IBM X-Force ID: 186947.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY5OSJ9.YGTxPNywexgo16ni6w5Rj4Se1u1FTJahmB07UspOqt8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4699<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4Njk0NyJ9.6c4Yt2wvZvzGqLp96xjYPnntRHkWOZ8oUvcCFsMUAiI\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NjE5In0.H4HrtIZBbDoLzomkcc_ntLmKBKQU8ci2K6sfyVRRU5g\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager_and_security_verify_access<\/td>\n<td>IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an unauthorized public Oauth client to bypass some or all of the authentication checks and gain access to applications. IBM X-Force ID: 182216.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDQ5OSJ9.z156Rhgh3Pl1h0ZtdChbFOwEyibt_Csvok3OKQ-DuUk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4499<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4MjIxNiJ9.0kz0_TfufI5-33ZzdK34M1SOU3lOxQTlOllP5lDJtRg\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ4MDQ2In0.TX9DZ2mHq18pNcu37E0OvQC5AGpDjPLCQaG0HRX7wgE\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager_and_security_verify_access<\/td>\n<td>IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an attacker to obtain sensitive using timing side channel attacks which could aid in further attacks against the system. IBM X-Force ID: 186142.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY2MSJ9.E-CkiTH0JOYy6V4xu1KNmAHKO19VRIw0KAmXBmd3I6Y\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4661<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjE0MiJ9.vUUTSWNcQyv2KrIz5V3CWRMhDCMEXZq-UhYbQHP2Tws\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NjE5In0.K7GLd_A1Nuxic0zi6yH8qHMcYSdnU5o8yp6lJvCELO0\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager_and_security_verify_access<\/td>\n<td>IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 could allow an attacker to obtain sensitive using timing side channel attacks which could aid in further attacks against the system. IBM X-Force ID: 186140.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDY2MCJ9.s-Z_xjr5Vg0fezQNX9v5z-bgEUS2Gie-6JI4gzzufj4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4660<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE4NjE0MCJ9.QNEfVPXRu2ActTj0HLwul4FW6SC-_qf-dEtSFMDb-_E\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ2NjE5In0.jJDuOmn3F8rpWYM7CAZoPNI6v93TQJwxNmI7v6uYOIo\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_access_manager_and_security_verify_access<\/td>\n<td>IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 165960.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktNDU1MiJ9.5-arpEe2jmV4crzKGkkT70CW_B3j7DZIMZkGXCBoqHg\/s\/1193554985\/br\/87099655821-l\">CVE-2019-4552<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE2NTk2MCJ9.cd_RGRyZ-dA3W-843GNztpOl9B--KdEclY2kYu_sEbs\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ4MDQ2In0.V7aY-M4VT35EB_yjMM1UW416wmb7WVDcIoYncUQ_iXM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>ibm -- security_guardium_big_data_intelligence<\/td>\n<td>IBM Security Guardium Big Data Intelligence 1.0 (SonarG) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 175560.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNDI1NCJ9.i11CQtHBxjYl34x6mARZVHIIpVaI9soumEA2Oawzufo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-4254<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2V4Y2hhbmdlLnhmb3JjZS5pYm1jbG91ZC5jb20vdnVsbmVyYWJpbGl0aWVzLzE3NTU2MCJ9.OOtv_tGLsU1WeJExYJ93i4W_ey0A1GACkxJH8ev12HM\/s\/1193554985\/br\/87099655821-l\">XF<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5pYm0uY29tL3N1cHBvcnQvcGFnZXMvbm9kZS82MzQ4NjY0In0.JqlcPVsXz-CmbJl7kAuJ8bdu-_NvoJ9ED4VM40nuMyk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>iproom -- mmc+_server<\/td>\n<td>IProom MMC+ Server login page does not validate specific parameters properly. Attackers can use the vulnerability to redirect to any malicious site and steal the victim's login credentials.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjQ1NTEifQ.q5LDAWztOyO1EeAmig6Jf7WhpL0Z8k-HDw5bVOFRWyI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-24551<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy50d2NlcnQub3JnLnR3L3R3L2NwLTEzMi00MDUzLTZlOWEyLTEuaHRtbCJ9.K1oprCQMaf7thx4SOLVuQP5mUDdqyuNhBEyqOHGtGLo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>jfrog -- artifactory<\/td>\n<td>Jfrog Artifactory uses default passwords (such as \"password\") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMTktMTc0NDQifQ.hdxCWNZRVLFX3iTzfH89I6soqckG7U9wIkpjX0oFcg4\/s\/1193554985\/br\/87099655821-l\">CVE-2019-17444<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qZnJvZy5jb20vY29uZmx1ZW5jZS9kaXNwbGF5L0pGUk9HL0FydGlmYWN0b3J5K1JlbGVhc2UrTm90ZXMifQ.lbseM3bvwmr40RzwAz_RBt2WGndoCvjqJckYRxCSX9s\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qZnJvZy5jb20vY29uZmx1ZW5jZS9kaXNwbGF5L0pGUk9HL0pGcm9nK0FydGlmYWN0b3J5In0.qpZpvvZdjm4QgJCqVNYqNwwRwvBuVzpcYQmvG0MhTB8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- ex2300_series_devices<\/td>\n<td>On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 interface. To check if the device has high CPU load due to this issue, the administrator can issue the following command: user@host&gt; show chassis routing-engine Routing Engine status: ... Idle 2 percent the \"Idle\" value shows as low (2 % in the example above), and also the following command: user@host&gt; show system processes summary ... PID USERNAME PRI NICE SIZE RES STATE TIME WCPU COMMAND 11639 root 52 0 283M 11296K select 12:15 44.97% eventd 11803 root 81 0 719M 239M RUN 251:12 31.98% fxpc{fxpc} the eventd and the fxpc processes might use higher WCPU percentage (respectively 44.97% and 31.98% in the above example). This issue affects Juniper Networks Junos OS on EX2300 Series: 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2OCJ9.OW5X0eyZlGb-J4gFy2hi-hjT_unOLrTBlj2ANYnrZd8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1668<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDY1In0.UpGG72ETVeOFTjgkKYclF-eABU0CS7qa_Qf-TBU3GF0\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- ex4300_series_devices<\/td>\n<td>On Juniper Networks EX4300 Series, receipt of a stream of specific IPv4 packets can cause Routing Engine (RE) high CPU load, which could lead to network protocol operation issue and traffic interruption. This specific packets can originate only from within the broadcast domain where the device is connected. This issue occurs when the packets enter to the IRB interface. Only IPv4 packets can trigger this issue. IPv6 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS on EX4300 series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R3-S4; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R2-S2, 19.1R3-S1; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S3, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3MCJ9.aYwQHqboHu8AjSN6bxTU3jR70SUcWdV-WBSjODhO7S4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1670<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0LyJ9.o9dndWg6FyIKoIi1Ol45AgnWlN7ktPY6WFXxy9r9LaA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- ex4600_and_qfx_5000_series_devices<\/td>\n<td>When configuring stateless firewall filters in Juniper Networks EX4600 and QFX 5000 Series devices using Virtual Extensible LAN protocol (VXLAN), the discard action will fail to discard traffic under certain conditions. Given a firewall filter configuration similar to: family ethernet-switching { filter L2-VLAN { term ALLOW { from { user-vlan-id 100; } then { accept; } } term NON-MATCH { then { discard; } } when there is only one term containing a 'user-vlan-id' match condition, and no other terms in the firewall filter except discard, the discard action for non-matching traffic will only discard traffic with the same VLAN ID specified under 'user-vlan-id'. Other traffic (e.g. VLAN ID 200) will not be discarded. This unexpected behavior can lead to unintended traffic passing through the interface where the firewall filter is applied. This issue only affects systems using VXLANs. This issue affects Juniper Networks Junos OS on QFX5K Series: 18.1 versions prior to 18.1R3-S7, except 18.1R3; 18.2 versions prior to 18.2R2-S7, 18.2R3-S1; 18.3 versions prior to 18.3R1-S5, 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S1, 18.4R3; 19.1 versions prior to 19.1R1-S5, 19.1R2; 19.2 versions prior to 19.2R1-S5, 19.2R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4NSJ9.W_dvStlC-hj38R3jbviBzSoX8Gkn9I6HRy-UHKU69ks\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1685<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDgyIn0.r58bGrT62cWP69S2A_hTL-3OTQKIb55uisi5uQj_fXs\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_mx_series_devices<\/td>\n<td>When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspmand process, responsible for managing \"URL Filtering service\", can crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2NyJ9.4Ij7-qYVA2vhYijQ6LcPn2PLqYzryR_DcUjyGeE5IRI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1667<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0LyJ9.gIUNaTmxYoqtcQueQ3wArxCjvgCv5Ds7I1vgU82tVHs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. Versions of Junos OS prior to 17.3 are unaffected by this vulnerability.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2NCJ9.RXx94QP_SOr8gnCHbTgFNySmCmXBPKwDC5nxLj8qtu8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1664<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDYxIn0.89Y33xyg-rzofyuPPV0IiFfkTOc5dGFa_9mktDDnDoM\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP\/HTTPS) services allows an unauthenticated attacker to hijack the target user's HTTP\/HTTPS session and perform administrative actions on the Junos device as the targeted user. This issue only affects Juniper Networks Junos OS devices with HTTP\/HTTPS services enabled such as J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Zero Touch Provisioning (ZTP). Junos OS devices with HTTP\/HTTPS services disabled are not affected. If HTTP\/HTTPS services are enabled, the following command will show the httpd processes: user@device&gt; show system processes | match http 5260 - S 0:00.13 \/usr\/sbin\/httpd-gk -N 5797 - I 0:00.10 \/usr\/sbin\/httpd --config \/jail\/var\/etc\/httpd.conf In order to successfully exploit this vulnerability, the attacker needs to convince the device administrator to take action such as clicking the crafted URL sent via phishing email or convince the administrator to input data in the browser console. This issue affects Juniper Networks Junos OS: 18.1 versions prior to 18.1R3-S1; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S5, 18.4R3-S2; 19.1 versions prior to 19.1R2-S2, 19.1R3-S1; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3MyJ9.2Bv-6wKct2W2-fNViJybqzuo9ORumHCOhN5tukv3GVg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1673<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDcwIn0.H45kISGQnRqs990UTLdJ3ZYr-2Gshjda0VzTW5svm0M\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>Juniper Networks Junos OS and Junos OS Evolved fail to drop\/discard delayed MACsec packets (e.g. delayed by more than 2 seconds). Per the specification, called the \"bounded receive delay\", there should be no replies to delayed MACsec packets. Any MACsec traffic delayed more than 2 seconds should be dropped and late drop counters should increment. Without MACsec delay protection, an attacker could exploit the delay to spoof or decrypt packets. This issue affects: Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8, 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S3; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: all versions prior to 19.4R3-EVO; 20.1 versions prior to 20.1R2-EVO. This issue does not affect Junos OS versions prior to 16.1R1.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3NCJ9.TkYqIYNCGt0yPq71b_jEwSTjV2EhtNS0T12lUF-LdRE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1674<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2llZWV4cGxvcmUuaWVlZS5vcmcvZG9jdW1lbnQvMTY3ODM0NSJ9.-ktBAc3JaUioBL62Ues4d8X4p7rFTH_RJo3lYrDUu-I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo3OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDcxIn0.CACrmpY9nUVavocUzxQ4NK8tgRy1aJFlMwGNq8SUXx4\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy9jb25jZXB0L21hY3NlYy5odG1sIn0.MIqFTXMUXmMg1rXmn8eRIHGUsKftCXmzuhG6XyW6xsw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>On Juniper Networks Junos OS devices configured as a DHCP forwarder, the Juniper Networks Dynamic Host Configuration Protocol Daemon (jdhcp) process might crash when receiving a malformed DHCP packet. This issue only affects devices configured as DHCP forwarder with forward-only option, that forward specified DHCP client packets, without creating a new subscriber session. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of the malformed DHCP packet will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue can be triggered only by DHCPv4, it cannot be triggered by DHCPv6. This issue affects Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S16; 12.3X48 versions prior to 12.3X48-D105 on SRX Series; 14.1X53 versions prior to 14.1X53-D60 on EX and QFX Series; 15.1 versions prior to 15.1R7-S7; 15.1X49 versions prior to 15.1X49-D221, 15.1X49-D230 on SRX Series; 15.1X53 versions prior to 15.1X53-D593 on EX2300\/EX3400; 16.1 versions prior to 16.1R7-S5.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2MSJ9.fCMIh3zLeVtxFVIwygREDSYVdPaaniAIaXDNc1dr44A\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1661<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDU2In0.unts2tCxpdkIS4SNkQXWQ5pgrquMK0i-Ke8-Z3kwB5o\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. Only DHCPv6 packet can trigger this issue. DHCPv4 packet cannot trigger this issue. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3MiJ9.bQtL4eCPx9rjnv0IJzpXtN4y1_vERhSjNUXh4-Eq6Ng\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1672<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDY5In0.ti383KonUV57jLfNMGw2xSd3M9b8B1jcDYApBo3YU-w\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an attacker to potentially perform a Remote Code Execution (RCE) attack on the target device. Continuous receipt of the specific DHCPv6 client message will result in an extended Denial of Service (DoS) condition. If adjacent devices are also configured to relay DHCP packets, and are not affected by this issue and simply transparently forward unprocessed client DHCPv6 messages, then the attack vector can be a Network-based attack, instead of an Adjacent-device attack. No other DHCP services are affected. Receipt of the packet without configuration of the DHCPv6 Relay-Agent service, will not result in exploitability of this issue. This issue affects Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S15; 12.3X48 versions prior to 12.3X48-D95; 14.1X53 versions prior to 14.1X53-D53; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S7; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S2; 17.2 versions prior to 17.2R3-S3; 17.2X75 versions prior to 17.2X75-D44; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R2-S6, 18.2R3-S2; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D435, 18.2X75-D60; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3-S1; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2; 19.2 versions prior to 19.2R1-S3, 19.2R2; 19.3 versions prior to 19.3R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY1NiJ9.Pf7XlkdTTjjdi2vOZoXLEVDM1Tt6RPN8-l-3GBPr_Z0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1656<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDQ5In0.yLMEz-ttDUDiTtfJxNuKL3CKK_hXWjjDzlPaIPN8i2o\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy9yZWZlcmVuY2UvY29tbWFuZC1zdW1tYXJ5L3Nob3ctZGhjcHY2LXJlbGF5LXN0YXRpc3RpY3MuaHRtbCJ9.d1VL6h0l1Ee5DoT7dCURYQFP_UYyh6XlezkQ2iWu9c8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy90b3BpYy1tYXAvZGhjcC1yZWxheS1hZ2VudC1zZWN1cml0eS1kZXZpY2VzLmh0bWwifQ.TXQ6fI2dOTjQfRErKopUM2BFUmWWW0i_UTfiN1sSinI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy90b3BpYy1tYXAvZGhjcHY2LXJlbGF5LWFnZW50LW92ZXJ2aWV3Lmh0bWwifQ.oTaUXdQUBGNPqyEKavz2dGWKP30LrDK4MNABHB2Mm-E\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os<\/td>\n<td>On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue only affects DHCPv6, it does not affect DHCPv4. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.2 version 19.2R2 and later versions; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; This issue does not affect Juniper Networks Junos OS prior to 17.4R1.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3MSJ9.rEeK_J4YEjyc-XUxLrpJUVLDyKxDsYW9SMIB3HMWIrQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1671<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDY4In0.E43KucetKnw6B4fTycgKHe2qtWjbVGjwFSVCkayie_A\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_and_junos_os_evolved<\/td>\n<td>On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the \"show task memory detail | match policy | match evpn\" command multiple times to check if memory (Alloc Blocks value) is increasing. root@device&gt; show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 3330678 79936272 3330678 79936272 root@device&gt; show task memory detail | match policy | match evpn ------------------------ Allocator Memory Report ------------------------ Name | Size | Alloc DTXP Size | Alloc Blocks | Alloc Bytes | MaxAlloc Blocks | MaxAlloc Bytes Policy EVPN Params 20 24 36620255 878886120 36620255 878886120 This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2; 20.1 versions prior to 20.1R1-S4, 20.1R2; Juniper Networks Junos OS Evolved: 19.4 versions; 20.1 versions prior to 20.1R1-S4-EVO, 20.1R2-EVO; 20.2 versions prior to 20.2R1-EVO; This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3OCJ9.N2rLw59wHmKm4B4AsOoZElDmrSGCIwxBqNE2kKz5W3k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1678<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDc1In0.xm9KF3JPtTPNzGi-EjHBLr1rJRpO3gxGwuY6812yTcw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_and_junos_os_evolved_devices<\/td>\n<td>On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration. When the issue occurs the following messages will appear in the \/var\/log\/messages: rpd[6046]: %DAEMON-4-BGP_PREFIX_THRESH_EXCEEDED: XXXX (External AS x): Configured maximum accepted prefix-limit threshold(1800) exceeded for inet6-unicast nlri: 1984 (instance master) rpd[6046]: %DAEMON-3-BGP_CEASE_PREFIX_LIMIT_EXCEEDED: 2001:x:x:x::2 (External AS x): Shutting down peer due to exceeding configured maximum accepted prefix-limit(2000) for inet6-unicast nlri: 2001 (instance master) rpd[6046]: %DAEMON-4: bgp_rt_maxprefixes_check_common:9284: NOTIFICATION sent to 2001:x:x:x::2 (External AS x): code 6 (Cease) subcode 1 (Maximum Number of Prefixes Reached) AFI: 2 SAFI: 1 prefix limit 2000 kernel: %KERN-5: mastership_relinquish_on_process_exit: RPD crashed on master RE. Sending SIGUSR2 to chassisd (5612:chassisd) to trigger RE switchover This issue affects: Juniper Networks Junos OS: 17.2R3-S3; 17.3 version 17.3R3-S3 and later versions, prior to 17.3R3-S8; 17.4 version 17.4R2-S4, 17.4R3 and later versions, prior to 17.4R2-S10, 17.4R3-S2; 18.1 version 18.1R3-S6 and later versions, prior to 18.1R3-S10; 18.2 version 18.2R3 and later versions, prior to 18.2R3-S4; 18.2X75 version 18.2X75-D50, 18.2X75-D60 and later versions, prior to 18.2X75-D53, 18.2X75-D65; 18.3 version 18.3R2 and later versions, prior to 18.3R2-S4, 18.3R3-S2; 18.4 version 18.4R2 and later versions, prior to 18.4R2-S5, 18.4R3-S2; 19.1 version 19.1R1 and later versions, prior to 19.1R2-S2, 19.1R3-S1; 19.2 version 19.2R1 and later versions, prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved prior to 20.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R3-S3.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2MiJ9.em3lP1kJQP8BLLlvfzRaWk-8Aagkr11g5pDBYELrxUk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1662<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDU5In0.ts4IoFzgdWsrwQ4N2r8q_Ri_A-xLGTaNFqCACrwZOfA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_devices<\/td>\n<td>On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine or a transit packet that is sampled using sFlow\/jFlow or processed by firewall filter with the syslog and\/or log action. An attacker can repeatedly send the offending packet resulting in an extended Denial of Service condition. Only IPv6 packets can trigger this issue. IPv4 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 18.4R1.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4NiJ9.lWn-k4cM92NCse6O3XpetMy_L5I-kZX1yW96cAKPwdU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1686<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDgzIn0.oQxw7PNDNLydVldcdhsZQBwfeCX3SY04bcmj-btAXVQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_devices<\/td>\n<td>On Juniper Networks Junos OS devices, a specific SNMP OID poll causes a memory leak which over time leads to a kernel crash (vmcore). Prior to the kernel crash other processes might be impacted, such as failure to establish SSH connection to the device. The administrator can monitor the output of the following command to check if there is memory leak caused by this issue: user@device&gt; show system virtual-memory | match \"pfe_ipc|kmem\" pfe_ipc 147 5K - 164352 16,32,64,8192 &lt;-- increasing vm.kmem_map_free: 127246336 &lt;-- decreasing pfe_ipc 0 0K - 18598 32,8192 vm.kmem_map_free: 134582272 This issue affects Juniper Networks Junos OS: 17.4R3; 18.1 version 18.1R3-S5 and later versions prior to 18.1R3-S10; 18.2 version 18.2R3 and later versions prior to 18.2R3-S3; 18.2X75 version 18.2X75-D420, 18.2X75-D50 and later versions prior to 18.2X75-D430, 18.2X75-D53, 18.2X75-D60; 18.3 version 18.3R3 and later versions prior to 18.3R3-S2; 18.4 version 18.4R1-S4, 18.4R2 and later versions prior to 18.4R2-S5, 18.4R3-S1; 19.1 version 19.1R2 and later versions prior to 19.1R2-S2, 19.1R3; 19.2 version 19.2R1 and later versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 17.4R3.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4MyJ9.p9VybN-lW-GQjzRTdMCB8W4ZqIO0oRnqYV5mVo5g9AU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1683<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDgwIn0.yzuvEhtHypxL_x6TyPY_zRrxfSl0M9YAbDTz9XRFePU\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_evolved<\/td>\n<td>The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. This issue affects all Juniper Networks Junos OS Evolved versions after 18.4R1-EVO, prior to 20.2R1-EVO.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2NiJ9.oXhR6gw6iHDYL7j6f-nBpD1Y6mJmtc-hjPu9yQZQoZI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1666<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDYzIn0.vu2Fb7L43UsP8KLKn2fKB0krEuQudz5ogUx6ZXed1Qo\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- junos_os_evolved<\/td>\n<td>Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extended Denial of Service condition. During this time, IPv6 neighbor learning will be affected. The issue occurs when parsing the incoming malformed NDP packet. Rather than simply discarding the packet, the process asserts, performing a controlled exit and restart, thereby avoiding any chance of an unhandled exception. Exploitation of this vulnerability is limited to a temporary denial of service, and cannot be leveraged to cause additional impact on the system. This issue is limited to the processing of IPv6 NDP packets. IPv4 packet processing cannot trigger, and is unaffected by this vulnerability. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO. Junos OS is unaffected by this vulnerability.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4MSJ9.v5684APzyN8KSh7zlHyskRsHbO9Uq48MdKIv_D8bCk4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1681<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDc4In0.dgV23WJBpZb-eWxrNLxi2m_ZB8d49tgZEh0DbVE8bJw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- mist_cloud_ui<\/td>\n<td>When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3NiJ9.pEezgu25D-oBCALzMjcycPkPR0CkwaaL7F-ajKkc6S0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1676<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDcyIn0.sKM-cckgstVJR_TVQ7L2etwetBD7oMna43RebCtJmts\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- multiple_junos_os_devices<\/td>\n<td>On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. This issue affects devices that are configured as a Layer 2 or Layer 3 gateway of an EVPN-VXLAN deployment. The offending layer 2 frames that cause the issue originate from a different access switch that get encapsulated within the same EVPN-VXLAN domain. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4NyJ9.3zp9ql0wqZZCR4kX4s2SV3DaoOD10OyTIySEZUw-VfU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1687<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDg0In0.rfjZlfx5XgOR-ZthSvBIfa2img7uQDi8x8pT3zJ9_ro\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- multiple_junos_os_devices<\/td>\n<td>On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in a Virtual Chassis configuration, receipt of a stream of specific layer 2 frames can cause high CPU load, which could lead to traffic interruption. This issue does not occur when the device is deployed in Stand Alone configuration. The offending layer 2 frame packets can originate only from within the broadcast domain where the device is connected. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OSJ9.GVkPf5U7RFibe4Ka9URHyAgb5LAucFVohe3SuxTtcGE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1689<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDg2In0.dWZLZi6iSQteBMaf3HtnLdvsKOtXGJwTFyeAZqftAkA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- multiple_junos_os_devices<\/td>\n<td>An input validation vulnerability exists in Juniper Networks Junos OS, allowing an attacker to crash the srxpfe process, causing a Denial of Service (DoS) through the use of specific maintenance commands. The srxpfe process restarts automatically, but continuous execution of the commands could lead to an extended Denial of Service condition. This issue only affects the SRX1500, SRX4100, SRX4200, NFX150, and vSRX-based platforms. No other products or platforms are affected by this vulnerability. This issue affects the following versions of Juniper Networks Junos OS on SRX1500, SRX4100, SRX4200, vSRX, NFX150: 15.1X49 versions prior to 15.1X49-D220; 17.4 versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3. This issue does not affect Junos OS 19.3 or any subsequent version.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4MiJ9.UC1JqoRWWaULZd0p7f0Z60QnnKzEaMJdvGQFA1QTK2E\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1682<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDc5In0.nD3wfgvWMou6JGeKliqR4rhNDVIQCGcdXN0rptf81Nk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- mx_series_and_ex9200_series_devices<\/td>\n<td>On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to function while it is under DDoS attack, protecting both the Routing Engine (RE) and the Flexible PIC Concentrator (FPC) during the DDoS attack. When this issue occurs, the RE and\/or the FPC can become overwhelmed, which could disrupt network protocol operations and\/or interrupt traffic. This issue does not affect IPv4 DDoS protection. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to <a href=\"https:\/\/kb.juniper.net\/KB25385\">https:\/\/kb.juniper.net\/KB25385<\/a> for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX series and EX9200 Series: 17.2 versions prior to 17.2R3-S4; 17.2X75 versions prior to 17.2X75-D102, 17.2X75-D110; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.2 versions prior to 18.2R2-S7, 18.2R3, 18.2R3-S3; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2NSJ9.dzEzlR9I0zL2TzWbi7LmyEQoxfRZjuMykQ0MH8gOmwE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1665<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDYyIn0.-Tw73cpsYzISQxmC8nxeHpewQikc4muwummQ9TGJgMk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0tCMjUzODUifQ.Ga5Tsa5raAgN6cU3kqJa9Fs1dXYasID_1Edj23EW_eU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- mx_series_devices<\/td>\n<td>On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated attacker can continuously send crafted IPv6 packets through the device causing repetitive MS-PIC process crashes, resulting in an extended Denial of Service condition. This issue affects Juniper Networks Junos OS on MX Series: 15.1 versions prior to 15.1R7-S7; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S6; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D41, 18.2X75-D430, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R2-S5, 18.4R3; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4MCJ9.qBVZ_QebZcvkUgLY8yAOFc0UtB6BUtd-QIrltHjvUbY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1680<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDc3In0.76KbIe2ZzNhRMKuUyyNS8kC7WbjBqaIbW4TTyHMS83U\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- mx_series_devices<\/td>\n<td>When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing \"URL Filtering service\", may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions prior to 18.4R3; 19.1 versions prior to 19.1R3; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3. This issue does not affect Juniper Networks Junos OS 17.4, 18.1, and 18.2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2MCJ9.qgCn1lluu9HGeUquY5pr5RjR_Y-hTWEgcuIENw3LeQg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1660<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDU0In0.se_sYPgy8Hjqbnr8GqT0oO07Uyj95mK3wTAcTFHhQS4\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- nfx350_devices<\/td>\n<td>The Juniper Device Manager (JDM) container, used by the disaggregated Junos OS architecture on Juniper Networks NFX350 Series devices, stores password hashes in the world-readable file \/etc\/passwd. This is not a security best current practice as it can allow an attacker with access to the local filesystem the ability to brute-force decrypt password hashes stored on the system. This issue affects Juniper Networks Junos OS on NFX350: 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY2OSJ9.q-Xy3N5sqn4WLikiyY_JYAFSRo1EWB62u5stihsYZqA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1669<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDY2In0.buO3o4_v5yb9SMn--0GE_sTfSkvUWbBh54enYFB4jFg\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- ptx\/qfx_series_devices<\/td>\n<td>On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the routing tables with the forwarding tables in the kernel. This table is then synchronized to the Packet Forwarding Engine (PFE) via the KRT queue. Thus, when KRT queue become stuck, it can lead to unexpected packet forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device &gt; show krt state ... Number of async queue entries: 65007 &lt;--- this value keep on increasing. When this issue occurs, the following message might appear in the \/var\/log\/messages: DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Too many delayed route\/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (7297134592) Current delayed unref = (60000), Current unique delayed unref = (18420), Max delayed unref on this platform = (40000) Current delayed weight unref = (60000) Max delayed weight unref on this platform= (400000) curproc = rpd This issue affects Juniper Networks Junos OS on PTX\/QFX Series: 17.2X75 versions prior to 17.2X75-D105; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY3OSJ9.AEZxYg6WA8hD1Kk9PMyi-DwEJlgMOOBG5XFl4cPynhM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1679<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDc2In0.SPen4IiQBL01TUk66G5G55-2il-HVn7gQbNhB8YEAmw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- srx_series_and_nfx_series_devices<\/td>\n<td>On Juniper Networks SRX Series and NFX Series, a local authenticated user with access to the shell may obtain the Web API service private key that is used to provide encrypted communication between the Juniper device and the authenticator services. Exploitation of this vulnerability may allow an attacker to decrypt the communications between the Juniper device and the authenticator service. This Web API service is used for authentication services such as the Juniper Identity Management Service, used to obtain user identity for Integrated User Firewall feature, or the integrated ClearPass authentication and enforcement feature. This issue affects Juniper Networks Junos OS on Networks SRX Series and NFX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D190; 16.1 versions prior to 16.1R7-S8; 17.2 versions prior to 17.2R3-S4; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3; 18.1 versions prior to 18.1R3-S7; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2-S4, 18.3R3; 18.4 versions prior to 18.4R1-S7, 18.4R2; 19.1 versions prior to 19.1R2; 19.2 versions prior to 19.2R1-S4, 19.2R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OCJ9.qx0tdV7i98sSuaUvew0XNHDf8-blPxdn4NI1GGDSTMQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1688<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0luZm9DZW50ZXIvaW5kZXg_cGFnZT1jb250ZW50JmlkPUtCMzA5MTEifQ.OvRZ8lTnNII0aykNxh_nGEC1VR6HlgqoG3HIv_nPhDQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDg1In0.tPchMBQcQqJp66bAN_fIiE6vT-kLUmbciYo6yswut38\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy9yZWZlcmVuY2UvY29uZmlndXJhdGlvbi1zdGF0ZW1lbnQvc2VydmljZXMtd2ViYXBpLXVzZXItY2xpLmh0bWwifQ.wrqe-CkXmOvt_XXMX4MUXw2icGPDNJy5VWXNHLYBnKk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy90b3BpYy1tYXAvc2VjdXJpdHktdXNlci1hdXRoLWNvbmZpZ3VyZS1qaW1zLmh0bWwifQ.S30aEy7jJtFZPERRVIFSSL2ZRML50lCd1psx9HUIyS0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy5qdW5pcGVyLm5ldC9kb2N1bWVudGF0aW9uL2VuX1VTL2p1bm9zL3RvcGljcy90b3BpYy1tYXAvc2VjdXJpdHktdXNlci1hdXRoLWludGVyZ3JhdGVkLXVzZXItZmlyZXdhbGwtb3ZlcnZpZXcuaHRtbCJ9.j3vPXfGW-rKZZvshWMUCRsX1xQhplApkiFmwNZUg95U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- srx_series_devices<\/td>\n<td>On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of these spoofed packets can cause a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6 implementations. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D190; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S6, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2. This issue does not affect 12.3 or 15.1 releases which are non-SRX Series releases.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY1NyJ9.C2q6OETgup-vKChqQ9C-j4iOn3ABD0eHKlFHc7ThIw8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1657<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDUwIn0.DndL9HVcYCEp_r0KtqUlWy1ONZoSfQxUl0mxXfSRIfs\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>juniper_networks -- srx_series_devices<\/td>\n<td>On Juniper Networks SRX Series configured with application identification inspection enabled, receipt of specific HTTP traffic can cause high CPU load utilization, which could lead to traffic interruption. Application identification is enabled by default and is automatically turned on when Intrusion Detection and Prevention (IDP), AppFW, AppQoS, or AppTrack is configured. Thus, this issue might occur when IDP, AppFW, AppQoS, or AppTrack is configured. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D105; 15.1X49 versions prior to 15.1X49-D221, 15.1X49-D230; 17.4 versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S3; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R2-S5, 18.4R3-S1; 19.1 versions prior to 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4NCJ9.ujYgM-8q6g3FW4RmWhXPy1moPYnhxE6DrqJG6seFOuE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1684<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tiLmp1bmlwZXIubmV0L0pTQTExMDgxIn0.A6fLxP8ZE4NYkD8bT4qYLeaZTXCNoTAYzsR84oYfCvQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>junit -- junit4<\/td>\n<td>In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTUyNTAifQ.nkDawBY2UDA9Uyd0Z4NwpKbDeLSorMGRjAmL6aC4PBY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15250<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vanVuaXQtdGVhbS9qdW5pdDQvYmxvYi83ODUyYjkwY2ZlMWNlYTFlMGNkYWExOWQ0OTBjODNmMGQ4Njg0YjUwL2RvYy9SZWxlYXNlTm90ZXM0LjEzLjEubWQifQ.fYJC9WTCE8bSaqWk-ThrNYz3BtHAJ2R-PWff-L1z_IA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vanVuaXQtdGVhbS9qdW5pdDQvY29tbWl0LzYxMDE1NWI4YzIyMTM4MzI5ZjA3MjNlZWMyMjUyMTYyN2RiYzUyYWUifQ.zzx2fkkdmci8Ot5_4r57349BQDIx-cKLFA7IIzSW0pc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vanVuaXQtdGVhbS9qdW5pdDQvaXNzdWVzLzE2NzYifQ.6arA7kS2O0geJ96f3TDT_yD5qeLEcs7MZQP-XHqA9Tg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vanVuaXQtdGVhbS9qdW5pdDQvc2VjdXJpdHkvYWR2aXNvcmllcy9HSFNBLTI2OWctcHdwNS04N3BwIn0.ExbV9k7DIm4a_p6Gr7_G1NthWSTtqMq1KC1blwuSQxk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2p1bml0Lm9yZy9qdW5pdDQvamF2YWRvYy80LjEzL29yZy9qdW5pdC9ydWxlcy9UZW1wb3JhcnlGb2xkZXIuaHRtbCJ9.ZSwcacVk_SgvyK9wmrUNf8K5MP4AFeFrirIa7LMnNRE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjUwMDUxN2MyMzIwMGZiMmZkYjBiODI3NzBhNjJkZDZjODhiMzUyMWNmYjAxY2ZkMGM3NmUzZjhiQCUzQ2Rldi5jcmVhZHVyLmFwYWNoZS5vcmclM0UifQ.uZtlPSb25GbKWWR11xb8shCBJPzvkSDKMGAqeUV58pg\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjVmODg0MTUwNzU3NmY1OTViYjc4M2NjZWM2YTdjYjI4NWVhOTBkNGU2ZjUwNDNlYWUwZTYxYTQxQCUzQ2Rldi5jcmVhZHVyLmFwYWNoZS5vcmclM0UifQ.4SCVZgW72CLHS5755QIUrjcclViZJUDC6Z0yfAbANgM\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjcxNzg3NzAyODQ4MmM1NWFjZjYwNGQ3YTAxMDZhZjRjYTA1ZGE0MjA4YzcwOGZiMTU3YjUzNjcyQCUzQ2NvbW1pdHMuY3JlYWR1ci5hcGFjaGUub3JnJTNFIn0.fmcNf0tntBSLmQSRp5n_nOLChgd6Ja3KJYbM_alZTv0\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcjk1ZjhlZjYwYzRiM2E1Mjg0YjY0N2JiMzEzMmNkYTA4ZTZmYWRhZDg4OGE2NmI4NGY0OWRhMGIwQCUzQ2NvbW1pdHMuY3JlYWR1ci5hcGFjaGUub3JnJTNFIn0.RzIr1CLfE8tgm2NUnlxJ6VFBhI3FWyGMeWZTUAR3WgA\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcmIyNzcxOTQ5YzY3NmNhOTg0ZTU4YTVjZDVjYTc5YzI2MzRkZWUxOTQ1ZTA0MDZlNDhlMGY4NDU3QCUzQ2Rldi5jcmVhZHVyLmFwYWNoZS5vcmclM0UifQ.V7TN5071PAMealOSf6o31rOfzgCko29nBXJsdktsm9Y\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcmJhZWM5MGU2OTliYzdjN2JkOWEwNTNmNzY3MDdhMzZmZGE0OGI2ZDU1OGYzMWRjNzkxNDdkYmY5QCUzQ2Rldi5jcmVhZHVyLmFwYWNoZS5vcmclM0UifQ.Xo4rplrz01zoS_YOoTbXWdhWTJq3P_1RoLx5XVvXKXM\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcmM0OWNmMTU0N2VmNmNhYzFiZTRiM2M5MjMzOWIyY2FlMGFjYWNmNWFjYWJhMTNjZmE0MjlhODcyQCUzQ2Rldi5jcmVhZHVyLmFwYWNoZS5vcmclM0UifQ.XbaJdqnihQSkEwDe5gR3fYUK0zYIfAFy25JreEdGFcY\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2xpc3RzLmFwYWNoZS5vcmcvdGhyZWFkLmh0bWwvcmRlMzg1YjhiNTNlZDA0NjYwMGVmNjhkZDZiNDUyOGRlYTc1NjZhYWRkYjAyYzNlNzAyY2MyOGJjQCUzQ2NvbW1pdHMuY3JlYWR1ci5hcGFjaGUub3JnJTNFIn0.xut-YD10Jp9gE9t_MKzHBYPd9mmfBjgC2lbZA1c2ZGw\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><\/td>\n<\/tr>\n<tr>\n<td>lcds -- laquis_scada<\/td>\n<td>An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability on the LAquis SCADA (Versions prior to 4.3.1.870).<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjUxODgifQ.jSA1I8CZN-ZD9YVfzwUepWFJoAcj2XdO2QE7Q-NAPsk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25188<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3VzLWNlcnQuY2lzYS5nb3YvaWNzL2Fkdmlzb3JpZXMvaWNzYS0yMC0yODctMDIifQ.rfUkSzx0dqX-gToKl9LphsnMNpwzqwvEXXmIKKg6rJU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTI0NC8ifQ.JMpTItcEsm_M4SWnxvVSGNB0u2SAnAn5ZAf2PcZjvNQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>lenovo -- cloud_networking_operating_system<\/td>\n<td>An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)\u2019 optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODM0OSJ9.ZGy6M8WBpf0I8dqkQ53tANvMInWA6bAvyylnwT2lHFk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8349<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQubGVub3ZvLmNvbS91cy9lbi9wcm9kdWN0X3NlY3VyaXR5L0xFTi00NDQyMyJ9.VP-X1I4OaEWJeYRtQxaNQl-16gHmHuPRUWW4VJAVp3o\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>lenovo -- hardwarescan_plugin<\/td>\n<td>A DLL search path vulnerability was reported in the Lenovo HardwareScan Plugin for the Lenovo Vantage hardware scan feature prior to version 1.0.46.11 that could allow escalation of privilege.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODM0NSJ9.Dn89LWnMEpwgdBySqkuZGpNGEG_kRbrIt8XgkMbzTjw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8345<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQubGVub3ZvLmNvbS91cy9lbi9wcm9kdWN0X3NlY3VyaXR5L0xFTi00NDQyMSJ9.J4gHnldESPsnFh36_t9-PiXyWSTtDWjDnHRi4jds6WY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>lenovo -- multiple_devices<\/td>\n<td>A potential vulnerability in the SMI callback function used in the legacy BIOS mode USB drivers in some legacy Lenovo and IBM System x servers may allow arbitrary code execution. Servers operating in UEFI mode are not affected.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODMzMiJ9.nHxVorXgpxDVTZlscJ6FnXsj__R7cMkMbqbYGS25mEw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8332<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQubGVub3ZvLmNvbS91cy9lbi9wcm9kdWN0X3NlY3VyaXR5L0xFTi0zODYyNSJ9.beMprazXhe1idOATZSnMo1X0NxcXr4_4gDD-FJ7KyfY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>lenovo -- thinkpad_stack_wireless_router<\/td>\n<td>An authentication bypass vulnerability was reported in Lenovo ThinkPad Stack Wireless Router firmware version 1.1.3.4 that could allow escalation of privilege.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtODM1MCJ9.HmTYeqKostYftT3hQfrmVZAzMeQ6x2iUe5q7dPuaJ2g\/s\/1193554985\/br\/87099655821-l\">CVE-2020-8350<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3N1cHBvcnQubGVub3ZvLmNvbS91cy9lbi9wcm9kdWN0X3NlY3VyaXR5L0xFTi00ODIyOCJ9.ajC2lsNdsYshWTcOIcFWkzHaE16TWXtEOPNek5mrTeY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>libarchive -- libarchive<\/td>\n<td>Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjE2NzQifQ.JFgTHnxlC1at0qIwHduCIr7MVyKsPsE3UIxV-veo4kM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-21674<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vbGliYXJjaGl2ZS9saWJhcmNoaXZlL2NvbW1pdC80ZjA4NWVlYTg3OWUyYmU3NDVmNGQ5YmY1N2U4NTEzYWU0ODE1N2Y0In0.0F6RpN_U7e2bpuzbMFCf2I00fEvKGZXIoP_63A9Hvao\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vbGliYXJjaGl2ZS9saWJhcmNoaXZlL2lzc3Vlcy8xMjk4In0.HBMBAVX1_D2fixGrYIA9IrhytfGDerG4ztu3Qa6PCtU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>libass -- libass<\/td>\n<td>In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjY2ODIifQ.Nd-Q8rj3LlbxINAReSrFhGdIJDt1UHQkD-FGwJdv1gU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26682<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vbGliYXNzL2xpYmFzcy9pc3N1ZXMvNDMxIn0.Vk7mbSoFSkdgPyZLufr47w6I3mJVr1H806bPiNrBRgE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vbGliYXNzL2xpYmFzcy9wdWxsLzQzMiJ9.1zomyjaB9VkkcMH7u-VSQpEGg6nqdbuy2cP9T3Y8bP4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>linux -- linux_kernel<\/td>\n<td>An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel\/bpf\/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjcxOTQifQ.RgDvU9TAVDoZXc8reCyuIvMd-MF5oKyvCyuQeBmc-X0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27194<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2Nkbi5rZXJuZWwub3JnL3B1Yi9saW51eC9rZXJuZWwvdjUueC9DaGFuZ2VMb2ctNS44LjE1In0.CLFNg0zQEK33S4SRJT7t1Lryfb1D3IlLeMDM5flYfqQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vdG9ydmFsZHMvbGludXgvY29tbWl0LzViOWZiZWI3NWI2YTk4OTU1ZjYyOGUyMDVhYzI2Njg5YmNiMTM4M2UifQ.fMzNmkhu2U11Wa_kqblpdLC_ye27GL1MrkvFFIfh2UU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>mark_text -- mark_text<\/td>\n<td>Mutation XSS exists in Mark Text through 0.16.2 that leads to Remote Code Execution. NOTE: this might be considered a duplicate of CVE-2020-26870; however, it can also be considered an issue in the design of the \"source code mode\" feature, which parses HTML even though HTML support is not one of the primary advertised roles of the product.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMjcxNzYifQ.AWYDKuTdP9sqUdK42PeGzMZ1x3KVDqDzaD5KblfDEmQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27176<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2dpdGh1Yi5jb20vbWFya3RleHQvbWFya3RleHQvaXNzdWVzLzIzNjAifQ.QfpQGa8MaMhBC_-SG_t-LptF3yhwkgmmVcKp_QLyZ6o\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- active_response<\/td>\n<td>Improperly implemented security check in McAfee Active Response (MAR) prior to 2.4.4 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MAR failing open rather than closed<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMyNiJ9.wOf9NAtIMO7FLYL-qfnEaJlkJbSa_wHYzFv3uW4j9-M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7326<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tjLm1jYWZlZS5jb20vY29ycG9yYXRlL2luZGV4P3BhZ2U9Y29udGVudCZpZD1TQjEwMzMxIn0.KdACf2MHDQUfFLlXKYgNtuJD8D0EzJeiI4vsPi2BsBY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- application_and_change_control<\/td>\n<td>Improper privilege assignment vulnerability in the installer McAfee Application and Change Control (MACC) prior to 8.3.2 allows local administrators to change or update the configuration settings via a carefully constructed MSI configured to mimic the genuine installer. This version adds further controls for installation\/uninstallation of software.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMzNCJ9.WDM__Z_1rAmljH9ootmiKiANaYRdrJKY-gSt3yhgB7w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7334<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tjLm1jYWZlZS5jb20vY29ycG9yYXRlL2luZGV4P3BhZ2U9Y29udGVudCZpZD1TQjEwMzMzIn0.IiY93mecTtULS-OUkvJD7dMOLl1ygC7oWjd5GGmlPsw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- epolicy_orchistrator<\/td>\n<td>Cross-Site Scripting vulnerability in McAfee ePolicy Orchistrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via parameter values for \"syncPointList\" not being correctly sanitsed.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMxOCJ9.pEwJxfXDoR_Jzwr_yRc2nfymkJbhILJONYpbhnUFvU4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7318<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tjLm1jYWZlZS5jb20vY29ycG9yYXRlL2luZGV4P3BhZ2U9Y29udGVudCZpZD1TQjEwMzMyIn0.nKMLsyTiNCAIQNB1jnu4rObiG4Iu5tQcEBh8TwYXePQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- epolicy_orchistrator<\/td>\n<td>Cross-Site Scripting vulnerability in McAfee ePolicy Orchistrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via parameter values for \"syncPointList\" not being correctly sanitsed.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMxNyJ9.SeY8jUyCtBmzZcraDrt8MARQgBVonDHSKrq3QIBWng0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7317<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tjLm1jYWZlZS5jb20vY29ycG9yYXRlL2luZGV4P3BhZ2U9Y29udGVudCZpZD1TQjEwMzMyIn0.vvhkjwUfhYaeBCwv86grNSYie00_PJhyxIHBUW1IReI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- mvision_endpoint_detection_and_response_client<\/td>\n<td>Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMyNyJ9.aesVoT1K9lETVOjE0LEkl8DT7d4LqnEMxnIESw8d55Y\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7327<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL2tjLm1jYWZlZS5jb20vY29ycG9yYXRlL2luZGV4P3BhZ2U9Y29udGVudCZpZD1TQjEwMzMxIn0.e01YEXprIIkvzJEafjuSSXp9MP_5VZtkafF9HXy_83w\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>mcafee -- total_protection<\/td>\n<td>Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial prior to 4.0.176.1 allows local users to schedule tasks which call malicious software to execute with elevated privileges via editing of environment variables<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo4OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtNzMzMCJ9.waYdDThDYXB4BkyPuhxZ-cnGXb2FmpnyMeor1usiCD0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7330<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwOi8vc2VydmljZS5tY2FmZWUuY29tL0ZBUURvY3VtZW50LmFzcHg_JmlkPVRTMTAzMDgyIn0.jUhoPKxFcYTl-cJJXJ2NnOI5zWYwulbA_t-AggAjMbE\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>microhard -- bullet-lte<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of authentication headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10596.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MDcifQ.5N1VDBJK040Kq8g1WZj6FXj-cWq2CI2Q5ytVY3BxTx0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17407<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIwNi8ifQ.BvLJ8HcUCvzpF_SoDFKQa2S9qs8bGqtzxTnkPYXUpV8\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>microhard -- bullet-lte<\/td>\n<td>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microhard Bullet-LTE prior to v1.2.0-r1112. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of the ping parameter provided to tools.sh. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-10595.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTc0MDYifQ.lkAMuH1U5j70WTO-OIfbBWijvbLAyaGSiJPy7s6QqKc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17406<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3d3dy56ZXJvZGF5aW5pdGlhdGl2ZS5jb20vYWR2aXNvcmllcy9aREktMjAtMTIwNS8ifQ.bt0_sWSgzLYqWqCVrOIY_C1QzBD9ZbETdlODnoIiYKg\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- .net_framework<\/td>\n<td>An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory, aka '.NET Framework Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzcifQ.kITqf3owr_fwi2Kko__307naee6xE_kVZhOO9yu-Vok\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16937<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzcifQ.VefKKTe6ApY5BkTm_rDbkuH9O5xsP8xEsLdEG4ZO_BU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- 3d_viewer<\/td>\n<td>A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Base3D rendering engine handles memory., aka 'Base3D Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16918.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTcwMDMifQ.TG3YR0vE2Mwnu8LBn9CzXkFyGytTH4WqRFP0yLHwyUg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17003<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTcwMDMifQ.kCx2udpQBB_EfXZT6QDdRVAACCvJn3jqzc_ML3bCMvU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- 3d_viewer_and_365_apps_for_enterprise<\/td>\n<td>A remote code execution vulnerability exists when the Base3D rendering engine improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Base3D rendering engine handles memory., aka 'Base3D Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-17003.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MTgifQ.JzeXwojZmiIsKtf1KLOickQZnBnsgS7Xw9Adff4jkZY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16918<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MTgifQ.8LrfEgB9eO6WUp669bZVB7aFe6jV5xwm59AMfMeEnUA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- azure_functions<\/td>\n<td>An elevation of privilege vulnerability exists in the way Azure Functions validate access keys.An unauthenticated attacker who successfully exploited this vulnerability could invoke an HTTP Function without proper authorization.This security update addresses the vulnerability by correctly validating access keys used to access HTTP Functions., aka 'Azure Functions Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MDQifQ.dwfAdMMyVp_dijOIUYxLGoQCHU9VkMDbNo7nW3QMgGQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16904<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MDQifQ.qLGqgSW6soeFqgqr_pnHZ04cdlwNifX_KiIhA3VB_HQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- dynamics_365<\/td>\n<td>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka 'Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability'. This CVE ID is unique from CVE-2020-16956.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NzgifQ.jfTkO6xRTe3anrML7hUFcvWInfy_-PQQ9yV-x12D-7Q\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16978<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NzgifQ.re35DqUta18RRstGmi4n80HyyLJYQtChU_5TvSFVRCk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- dynamics_365<\/td>\n<td>An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Commerce, aka 'Dynamics 365 Commerce Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDMifQ.eF7muhmhnjNeUVl5kv1Q9j0gSubJ_TsUy3y9DJUnKxM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16943<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDMifQ.tJkgezSxRRxO5BtAP5KSIQhUA1-GVTjcYWzyNlQOknQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- dynamics_365<\/td>\n<td>A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka 'Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability'. This CVE ID is unique from CVE-2020-16978.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTYifQ.zSFaSse6eALNejmLc1FH5m0V0Dr7GBY27TQOeZckcho\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16956<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTYifQ.WqCVhUyGZIc_F8iVBIB_g41cRpMRbbdI7r__s7Z8EC8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- excel<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16931, CVE-2020-16932.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzAifQ.nIRl-PoMnrNfLohTwxQV4ToySHB7l_9pi4s_WjsD9zU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16930<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzAifQ.XkrHmmgrYgseTMzwgEdczdWAdwVdLlEmSJGPjSXU-4Q\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- excel<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16932.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzEifQ.Wr8JKBZrWN_yLMQWzHlsipc5_ro6n39L7dDcd6RO8K4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16931<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzEifQ.0o5s0nKxszMZijAixTDRfmLQscsce1RLodCpJCE5SOI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- excel<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16929, CVE-2020-16930, CVE-2020-16931.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzIifQ.LbHD3DHPgqfo4w6qOgrIfps7yYEHi02CjYG59G6ZM0M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16932<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzIifQ.jMD_rDqOp2POoVVy52rf7eGuMtD1N7P5XR7PfRQjBqc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- excel<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16930, CVE-2020-16931, CVE-2020-16932.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MjkifQ.5V1ZGL9ye80bZ1XKpoonqRN0L1F3fYOGaCpxcx9_IWk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16929<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MjkifQ.UxtSneA2PhGXR7K2PhKdD9fuqBV8mWIDZj2ssHr3FZs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- exchange<\/td>\n<td>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages, aka 'Microsoft Exchange Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NjkifQ.SMXfzALb-i-6eBLSxrIHVMA9DbwVIo6QI42KcnkB4dM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16969<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NjkifQ.6dlH_8Q1BE8ga3veg5RlAjBi8uTK1LhOkqVdkikxy-E\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- network_watcher_agent<\/td>\n<td>An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux, aka 'Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5OTUifQ.kJHzlpMA5Ycel5KkKo0avj9IynF8AvcqSTZTKCVw0Lo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16995<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5OTUifQ.Fm2mkWU7gyJ77cEM8AEeh8vwnuZP4-6OW_af2TraCi4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- office<\/td>\n<td>An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka 'Microsoft Office Click-to-Run Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16934, CVE-2020-16955.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MjgifQ.ljvOPPZXUsoKGJShBZiivCL5EoZT-PDR-Hl3q1Wkjo8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16928<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MjgifQ.oftdIISL34h0EgiUvIQA0BxXh26tuA-nyjLNmL01b7s\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- office<\/td>\n<td>An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka 'Microsoft Office Click-to-Run Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16928, CVE-2020-16955.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzQifQ.4o4cx5g_-isgPuOVtj3j_86Ry7y297sYsX79Ex7KHEI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16934<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzQifQ.Xze8O1r2Xsw5H84NB9CJAwIgOGmMr15HItJ7c-8pKSg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- office<\/td>\n<td>An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) AppVLP handles certain files, aka 'Microsoft Office Click-to-Run Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16928, CVE-2020-16934.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTUifQ.wSHM3m5xhvpzs65_gzhgoI5DzaTFNcBgO1Q-KK1zpxI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16955<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTUifQ.wfI740ZjR7zlIyHl_2vkHIinpO2UyoC4zKjrpyuZa3w\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- office<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTQifQ.vA0naX82rnFfU2TSqd_Fzc1QnCjaCQa38dKTe4bdoQE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16954<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTQifQ.gkSNwXz9EoSFjcFU_xLRKMAfTzXekhSyVDdNEmkfLcM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- office_access_connectivity_engine<\/td>\n<td>A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5MzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTcifQ.ShLd3Xw_bA_ya7WkZNPiu4QWcwwr5Vam13uVINH3ecc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16957<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTcifQ.RdzGHtDYCQ-YSf9sq-aytDJULzxPjElfHCg99BlVq2E\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- outlook<\/td>\n<td>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka 'Microsoft Outlook Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDcifQ.cHYJELx3boZudPXNSsPZ1SQhrfVNa47N35Mq7pF1frE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16947<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDcifQ.PY8we4V6O_ksX8bWO8Xn7Pl6_LqmsUa_esy-vmsyvAA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- outlook<\/td>\n<td>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka 'Microsoft Outlook Denial of Service Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDkifQ.Wvs3_yzy6jTk0QubRnzOwtb_Wcq8XsCV0SGfrBYRaKM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16949<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDkifQ.uqoZe7zCKEhE6auCuS3_cQW8de91YZ9dPhQyhSEieQw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- powershellget<\/td>\n<td>A security feature bypass vulnerability exists in the PowerShellGet V2 module, aka 'PowerShellGet Module WDAC Security Feature Bypass Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4ODYifQ.fJQC6deRQ2s9cAelvxdeGthDU7ULjKcUrF4sqXcxou4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16886<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4ODYifQ.VYjGBiu1p9HiCu1toD-L13wcPxvzPr7MYxxtnwyb__c\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka 'Microsoft SharePoint Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16948, CVE-2020-16953.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTAifQ.uca2FwN8Krri6oPlJOmR9RO-M9i2HL6i04HeeVajBWo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16950<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTAifQ.eFRdLtwbHPaa1oQ5zDMHLJyFa-hRe1h5Nd4bWv5Cgw0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-16946.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NDksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDUifQ.DtBLq0pTzHsPaHoGrNyq2eCxOVZWtVaIm6_L7ELRD8s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16945<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDUifQ.qkZOVGz_NRnULNyvv-DqgOh4Eo1nUnsIg-CpjhIueQc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16952.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTEifQ.kC2E374dKNVpdWNBOaAOCsFjJ0hUluZT4vmv8sxO7fA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16951<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTEifQ.uSk2R8zAOhwv0LFVlZRYWso7ud8nES_CegUp3DAn3YA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka 'Microsoft SharePoint Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16950, CVE-2020-16953.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDgifQ.7kg-cAaspOtgLTGxC5J45AcQhiIkZo76Ua8maGgkVLo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16948<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDgifQ.ywtvW3RL2a0z1XWzfjgZhjnSAbGnbOJoZHf5wwQTDJY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-16945.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDYifQ.zFeSQF8j_dy-I8UF0xPsvobiL6POqbQ6iido2_ZyKro\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16946<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDYifQ.4RF_GjazMyxedlkisA7e-84LygJXG3r8i97A_QlEaAw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory, aka 'Microsoft SharePoint Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16941, CVE-2020-16942, CVE-2020-16948, CVE-2020-16950.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTMifQ.R0Z6r4CdGKqRQn_5esKlJPxEh7AyX7xRB_FkyDF4DjQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16953<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTMifQ.pZPu4rZnax7b5GFYu66M6qfiF6EeNG5t-huYuoxzrCc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Reflective XSS Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDQifQ.GBgNl66qCJNxajHJLLmvdPmRtTWEwhmKj4tKpkgqq5c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16944<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDQifQ.NOw-CUcqkHvm39rjRYCuTUk4-AyfY72X4deCDOHYpfM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages, aka 'Microsoft SharePoint Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16941, CVE-2020-16948, CVE-2020-16950, CVE-2020-16953.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDIifQ.ut0sp1QrSQ6kFFOnx8ZpZVcuEnipqggqMlMMuIN10Ag\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16942<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDIifQ.2_dYFiYpO-C37bc0SJEs1OgTwAKPxiTk2uYTHKX-ZVc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages, aka 'Microsoft SharePoint Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16942, CVE-2020-16948, CVE-2020-16950, CVE-2020-16953.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDEifQ.v4TGGO-W0My7EsDDmg7quLYQuE73_6w8Mas-EnxEADM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16941<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDEifQ.qIbpIcBFItV_6bQDMFuXdFQlMiNObU7Rkz-zC6e9fDM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- sharepoint_server<\/td>\n<td>A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16951.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NTIifQ.QmmGnLVUBPuDx5OOI0ExCsg2LMr4dBSDZO3jK7a2sEc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16952<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NTIifQ.CG4-SGYHu_QJJr74oFS4YhxjNXvBK-ioTXw3udbwh8k\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- visual_studio_code<\/td>\n<td>A remote code execution vulnerability exists in Visual Studio Code when a user is tricked into opening a malicious 'package.json' file, aka 'Visual Studio JSON Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTcwMjMifQ.07jrblvIpkAXZ4cGxA0UY0BhRp3Z51HaFkbaoYnm-_4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17023<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTcwMjMifQ.EtDFtWmcS6-1mQUFYDiY82JnEhcTQRmc5md5ajnKe7E\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows<\/td>\n<td>An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points, aka 'Windows Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NjksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4NzcifQ.bG_m65yLWgddYzb0VrnuT6SdlRylMhXJVSh2iU41u4U\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16877<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4NzcifQ.B6cUPsw4TKDRFbF6KZA6qIciz3vMSYg9bQD3_JAMKaI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MTUifQ._ywqBfrJDufsBndIA928bAqpI8dN-yOEMWm59rQY-xE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16915<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MTUifQ.1Ux7FrDDJ8pQAUwfVTrkhpq4afqDOIy7hElZihoQjCQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTYifQ.MOsHLiP6FcPag2VHnioQb-oxDnRpUkEm0RIT0SkCkWs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16896<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4OTYifQ.dx-ylsRSlgU2gt8ZWHgEfU7QI8-9p7wLoq7RCgS3_ho\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MjQifQ.0JALAVhT1s2kthplw6xWdc63MSPpccSABbfPAq9QHx8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16924<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MjQifQ.vubztJYAqGn2Ij7uBmtHbZJO81gAShSfMgT36Vzc5eA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16916.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MzUifQ.DuxQZP2-1F6TrAyqsCdJCpJwsy4zvYoaixjkfNLgLsA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16935<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MzUifQ.Ajp82-CPbgJrgWrzYO2SCnR-4K0Sf_iICo4nfcCGHJQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16923.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5NzksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTE2NyJ9.VltHWU4aq7KA5O4rUudqA2mH6EEKVfz2F9xoGgl7PTo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1167<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTE2NyJ9.vmSmxfaCsR9hdEi4-Rzhykbn4523NVU_7OvqWGN9gbY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations, aka 'Windows Application Compatibility Client Library Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16876.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MjAifQ.KVjpfewZUess22uSDplgG5lWt9vcfZud6SrGrXuwz4I\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16920<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MjAifQ.hVhyy-nfWCcL2YJciecPRvb822lr-93u5SpXv_NEbiw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16975, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NzQifQ.MEF6QoCTuyHUhgPwuctpGXgiqVL2hqSo5fBSd4cwmMc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16974<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NzQifQ.pxzqhhDkzwRtp650tZhF68LiDRrLsjzn3UY_F6ZxYpI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTAifQ.Q5x8CH0PWwID-V745_uLCVI3n5V46trKIrMTcvDpByM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16890<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4OTAifQ.DMe8ragoCAJJ1umLtPXoGjNMkVR4scDpuKNvNeL0QO8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16913.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5MDcifQ.hvh7dQevyVasdr_eby2_Umb1pzCBXusI6mBI-br8Zz8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16907<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5MDcifQ.9AOJ5i8tA7m7S4OcSBlKAnJdAJyoWf-Rw3oeEYU4tQ0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5ODksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTUifQ.3w56kOK0XhDcmT2pwr_8A2YZVrjS-o37P4QOt_TcBEw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16895<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTAsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4OTUifQ.Sl3m6nWFttsu3K8Bt4hms2fHrIN_3tHNq8yWSsrNCLQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points, aka 'Windows - User Profile Service Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTEsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY5NDAifQ.HwDkx6vIfHx7q0aFqqdmXA_6BFCij5pcoCZb79AsthM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16940<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTIsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY5NDAifQ.JkwOly3UOPKqBU-f4hFbaMutl5-I203EUM3Z9qWflWE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A denial of service vulnerability exists when the Windows TCP\/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP\/IP Denial of Service Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTMsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTkifQ.cPNvFtQ6GJFAfLpStj1xXnJ1oecaX2c1upDg3nnyVkI\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16899<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTQsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4OTkifQ._BWgnG-UaNhcyhOTkskKx3mhumZ9177kdt6fy1ljq70\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests., aka 'Windows Hyper-V Denial of Service Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTUsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTI0MyJ9.nXHj1Wj0YT_mm7L5XjKARdXmKhAfJ1Yi03di7cDI1T4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1243<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTYsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTI0MyJ9.AyWHb4SiafHuL-m-g-BrkW9G26YXb2PvKMfS7SSosfs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when Windows Network Address Translation (NAT) fails to properly handle UDP traffic, aka 'Windows NAT Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTcsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTQifQ.noa2gbQhFfGWxSA34SFxj5NqJ7d-1Alyg9Fh3m0EtS4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16894<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTgsInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL3BvcnRhbC5tc3JjLm1pY3Jvc29mdC5jb20vZW4tVVMvc2VjdXJpdHktZ3VpZGFuY2UvYWR2aXNvcnkvQ1ZFLTIwMjAtMTY4OTQifQ.twWSg96YBrtRizXEbQYnS-Pki_ZTXLbluf_Kr9NmUKA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory.An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory., aka 'Windows Image Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjo5OTksInVyaSI6ImJwMjpjbGljayIsImJ1bGxldGluX2lkIjoiMjAyMDEwMTkuMjg5OTEwNDEiLCJ1cmwiOiJodHRwczovL252ZC5uaXN0Lmdvdi9udmQuY2ZtP2N2ZW5hbWU9Q1ZFLTIwMjAtMTY4OTIifQ.Ij_w3HybiKK0k50Gfc2AqpmrGa7U1Qh6ssZIXxf4Hlg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16892<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODkyIn0.6ARTLLKUOYuLfxRCSFMScvM0t91EXs1IKeyMpBfO8NU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODkxIn0.wQmKx8P8eroAfquaKwU-xl9P64KO20O9ktHVo0mGZmQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16891<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODkxIn0.LEeYfuKL5Ql4GdcgUP_A1p6XGODJfHOR5m8URxxEy-g\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.To exploit this vulnerability, an authenticated attacker could run a specially crafted application, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16938.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDAzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTAxIn0.1lbk26qH5M9FiH1SBaJJ09RmtQHLsI4b5Ch42OhopwA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16901<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTAxIn0.koAK0_DyXVnPx2oHun4DMDDwX49elmNssSEFAj1LnBg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1167.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTIzIn0.IAuWtcDhmTK-vFthqMB7dCB6XP6oH7_LROJ58GmHJg0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16923<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTIzIn0.nEED3TuGZ9pEtfHmyF3lEYB2qE1P2nx7T9DQTLw7jZ0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory, aka 'Windows KernelStream Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODg5In0.Dkkd2wY2bwtTo0IDZkjy09q0vF7OUYaQsd50KHTGXnM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16889<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODg5In0.7Ah5kvJ6_7XCH2oEoxa7tVZ9ln3pNm2-jmfz2PRLWQk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDA5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTAyIn0.yShlr_Qsz_lhIGdHxrKaJ0sWOjv8SLUzkdHYmTOP-K4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16902<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDEwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTAyIn0.nhmi9-MsyLzu3m32qhjH6so2MRxZGqJJzpF4H5DpyY0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations, aka 'Windows Storage Services Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDExLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTA3NjQifQ.t_Qz8jnODiX7tiWH1FjZvUdqsVQGJdyA4lkaADCjjTU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-0764<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDEyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTA3NjQifQ.9NAXMmlwhLvOAXJpP7cTxCh4oKRWMIQzN-7wbgHxNo4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory, aka 'Windows Hyper-V Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1080.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDEzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEwNDcifQ.IbYaSTZU83P3V291gx6FNYTeIjJ4GfqKiW2gLRiWiYU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1047<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTEwNDcifQ.r1S2C12iakG9JyHkBFFKf4IjOQlA0vYOES-_kGgdEXg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODg3In0.z9xsgd2yjMuugWCCza_jmGO_IpztRX7NSOJHOPrDX2w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16887<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODg3In0.BzDD2IEtPVfdtt7so9NM8ylUJ34NHkz-AfGfYXzVbTk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations, aka 'Windows Storage VSP Driver Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODg1In0.bbTbNNTAGuMA-sNXa636v1kDxAnatWuYEDPuFu-gb_k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16885<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODg1In0.NVM2WdxOFx8X3AZjgHcfhW-ci5kdY08NGawMHqVhjTs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Windows Hyper-V on a host server fails to properly handle objects in memory, aka 'Windows Hyper-V Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1047.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDE5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEwODAifQ.6FzblwuQYjWqjE7cB3PIh2jHZZV82-zkqsk8ZwlPa8w\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1080<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTEwODAifQ.suLlW1TfiGoPjTyAonwIvOcHf_3TsLd6Z3CPbXXJtMU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Event System Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTAwIn0.RHguG8QOwObAPqh88bjUh4xm2x0XDgdMgHzHg_t0g6U\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16900<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTAwIn0.K6otIg7AxS2pKtPqV0Qmkx1OCSI0v4c5w4pfGijOraU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when the Windows TCP\/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP\/IP Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDIzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODk4In0.mzFil1PfwUZRqoWNrjx9WZrvKnkUXj3MR0__CtmAWJs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16898<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODk4In0.Ep4r_Q8r2Ojs5YSUvU_zlLVgyTOmeJefIIh43ZNodtk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTczIn0.M4fcaDR6upEEWWdrWr0BLV0sfKKNk-4uPLIMMIQIrs0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16973<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTczIn0.6zAG31QQu1fTMPFbK7qu-ZFJDCw0p7vqYj7GFWhZ4MQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16909.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTA1In0.Wy5dQHMylk0rTT0bSRmEB0TpqFn3JnBnXfcAYvKtuf4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16905<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTA1In0.vB9FAXtISL5pXWF2rcAB10xdA-bDj106ljJQlDAQfB4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A spoofing vulnerability exists when Windows incorrectly validates file signatures, aka 'Windows Spoofing Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDI5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTIyIn0.Gbg4bfV7NGsjA4gIJdaRLaTgtUg9cWTQVKRI3ClnPnc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16922<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTIyIn0.ci1oLO2WyeabdYwG_wgCAQJ1udlzHrGP5J52SQ69M2U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16907.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTEzIn0.ZkB1Ik_twO498bra1yq_2OUIA6HYRoAddtZSPfX-LGs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16913<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTEzIn0.6QG8-UBXq8JgEyNGn3OFeAgTcivtmv-6IPQ3sz6U1n4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDMzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTM2In0.uTAvuBY-sNrMZUuRKgRrbGDFa4QexpgjYAk_FT1rqJo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16936<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTM2In0.xGaKMOdcgMKppE8x5kKGPUXGq00-_rFODhV6SS9-wMY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTcyIn0.k3Ra-CopywW90uPLDfLRaydSoYKTbPFQ_g3wsz1KDhc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16972<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTcyIn0.rROyNphHE4qwWOCUMrQdx_WmSlD05uSCf_RHfREcWNY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Group Policy improperly checks access, aka 'Group Policy Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTM5In0.irUDUCpvU8lxnfVRhzmqKwZNqxEfp5HXd6cflqNQwEw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16939<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTM5In0._ljw3DeilwJrMEgXiLs8EEw1uaC_SgRkg-_PZ7ZfHFg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in Windows Setup in the way it handles directories.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Setup Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDM5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTA4In0.RKEuP4jvIUWYKRNx8bdchUfb_zdrltJnxUWO9DTjcXE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16908<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTA4In0.V85LrUsrCDiDNP4nAa4tTE9MNWkzENU5k37-iLzUlr0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16905.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTA5In0.wzVZtVjD2WGU2Lpj9RHQeSrEFMXVSiM_ocz9BoeW-gY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16909<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTA5In0.ikwW2ahH6NXCp0neIw3xpcyeFOB7lerhBifL08TFxd4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A security feature bypass vulnerability exists when Microsoft Windows fails to handle file creation permissions, which could allow an attacker to create files in a protected Unified Extensible Firmware Interface (UEFI) location.To exploit this vulnerability, an attacker could run a specially crafted application to bypass Unified Extensible Firmware Interface (UEFI) variable security in Windows.The security update addresses the vulnerability by correcting security feature behavior to enforce permissions., aka 'Windows Security Feature Bypass Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTEwIn0.3MJ_u8wEB6r4BuEFa07uohc9LZqljRuNdCzJ_C-RS-E\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16910<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTEwIn0.IvJy6aTV_jfy9ex5Gf7JtSUoGiBS2XgfFmaaYffHZe4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTExIn0.P4iILF4N5aicTtBfX1Q4ub_Saa5zhTS6NDMPij9j9Lo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16911<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTExIn0.LHj4cFT6aYglrFhdTlmdi-zx746o3-yJCFqTBMNEHJk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTEyIn0.iymZi6T8pe-hFyEHx2VRWhDHO8TnsDZuOerURaxOpzQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16912<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTEyIn0.KlCO3v3FYSMDLatlRbkcXWTbMTBQmPaTrSMrwKAXc_Q\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-16901.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDQ5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTM4In0.j6y_K6ihH1CvBVfK4RKd2UHh9x5T09SQ7xbGhDGDTho\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16938<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTM4In0.Uudz_ME_7aFAb0gXsz6niYD7LR-vVqvYzoItBSzsl6Y\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka 'Windows GDI+ Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTE0In0.y_RFHjmsGVbj6szsZ9tLc-WM7Va-y92hasI4CqT2smY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16914<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTE0In0.tBDehdvaVUrPz21n0g3JYyC51MW8bsTZkiet68Tz68A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16976.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDUzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTc1In0.Opv2lh4KwyPwfHdi3iLC795RrwJEWzYLKJrsBHmslQ8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16975<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTc1In0.lULq1ps3qY1YH8egZk3TYi6-qwNY4RuOIGFXzi6PQL4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory, aka 'Windows Camera Codec Pack Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16968.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTY3In0.KxZ0H8ztuJT18dueXyFCVpOeBlYdojTcmDTdBck-MNM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16967<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTY3In0.DzIXBXEkIVZ6_h4ezJPSYyoK2mglNNrgZBn1C0C-j98\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTI3In0.ua_KNCkkOhY-vou12UwrsnIYsgwrppGYxIs6k-97IgQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16927<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTI3In0.HHKd3ROtmTo-T3WYzwNULJvGhcUgtnUzNtDqWN-QTyw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16935.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDU5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTE2In0.s2-wQmcy_aGWgsfCqV0SHGocRptLPSvfbobmBFC3iZ8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16916<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTE2In0.t-qb-mIETlKN0xUjfatw0POFf1aC2XhrRConOp1eORE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists when the Windows Enterprise App Management Service improperly handles certain file operations, aka 'Windows Enterprise App Management Service Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTE5In0.xITNmXCNZ2AQ1Q66XNoW31UQr9_fmR1tvVczsHu5BVQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16919<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTE5In0.RRfy3z16L5XOXxAIoErV04o1i-Huoon7P0b7DAhkOOI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory, aka 'Windows Camera Codec Pack Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-16967.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDYzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTY4In0.0mLFNRhYkFbMf5vkZQgvS5USD2KvCSSICifBFKsoFh8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16968<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTY4In0.whfvDnMkjpOjSzr98M1Ahw3D7esAHA3zDnRW11r8tBs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory, aka 'Windows Text Services Framework Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTIxIn0.lITFf8FH2evhskD0NCB1wV3HOektsEuveHw2hd77bvo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16921<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTIxIn0.tw0wxnebXl_JokH_EDbJSCJ3-xBqN3SAc_rcS_hAtbU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_10<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTc2In0.HlkJf_EbnmFgDSGJDGzsBJs1mwGdfZNUgVyQYAMp8_I\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16976<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTc2In0.cPGnrAYSy4H70zhBfEgvZtt8ds2o8BXwRdtyw628hD0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_codecs_library<\/td>\n<td>A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory, aka 'Microsoft Windows Codecs Library Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDY5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE3MDIyIn0.cFGafO8dtm80NU0GAbCTnCdoFQLXyED94v-PGpoPCv8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17022<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDcwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE3MDIyIn0.q5-iR3OOdGR2_eFWYcyEZ9H5OkgXhoKxvahBsmhwBb0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- windows_server<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations, aka 'Windows iSCSI Target Service Elevation of Privilege Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDcxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTgwIn0.GmraAzJYFkz-kw2w99yXt2f6eN3CAnzOruiUioIwOdU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16980<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDcyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTgwIn0.7c0RdxpiDlNVh_pusUtrO7CN6CgUQVqsD4CFDAVpAR8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>microsoft -- word<\/td>\n<td>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files, aka 'Microsoft Word Security Feature Bypass Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDczLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTMzIn0.ysbbRAq8lDuxHLEmZmfLUohhc9hhHfnX6ylu0HjZsRE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16933<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTMzIn0.diyife00wxS7K2tetJgjcl7RQbu47mXD_4zjSKul9UU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>monero -- monero_wallet_gui<\/td>\n<td>monero-wallet-gui in Monero GUI 0.17.0.1 includes the . directory in an embedded RPATH (with a preference ahead of \/usr\/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory.<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2OTQ3In0.GbPiUdhLW9JKvTSaQyXP3GCN_qX4BaiXER3ebbdTSpQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26947<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL21vbmVyby1wcm9qZWN0L21vbmVyby1ndWkvaXNzdWVzLzMxNDIjaXNzdWVjb21tZW50LTcwNTk0MDQ0NiJ9.iFkx850HdUuTzm-GAjboReoqU53vqt9o3Y_MWbLCVOQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>mybatis -- mybatis<\/td>\n<td>MyBatis before 3.5.6 mishandles deserialization of object streams.<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL215YmF0aXMvbXliYXRpcy0zL2NvbXBhcmUvbXliYXRpcy0zLjUuNS4uLm15YmF0aXMtMy41LjYifQ.fYAa8X-Qfz-7dXyvC5V5BzmHNOQeW4BuvbOj-iiBcv4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL215YmF0aXMvbXliYXRpcy0zL3B1bGwvMjA3OSJ9.viq0Ie9Od2VoKthgFPfXGBp9Ib__pzMoFWO-xf16TF8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netbios -- netbios<\/td>\n<td>An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory, aka 'NetBT Information Disclosure Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDc5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODk3In0.IwJeJPqBC2L8rtSRPvyPTs_Kgf2bGkj1PAWHglAKsik\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16897<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODk3In0.8-r30FFfO842MtnhRl7B_EwCtu13xUZli4mcaFgyGlU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>netgear -- multiple_routers<\/td>\n<td>This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers with firmware 1.0.66. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10754.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE3NDA5In0.tnJ1RdvTFJViBR0yrtwbUPNcjTpdPi3XZ5a6pxxFU4k\/s\/1193554985\/br\/87099655821-l\">CVE-2020-17409<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9rYi5uZXRnZWFyLmNvbS8wMDAwNjIzMDQvU2VjdXJpdHktQWR2aXNvcnktZm9yLUF1dGhlbnRpY2F0aW9uLUJ5cGFzcy1vbi1Tb21lLVJvdXRlcnMtUFNWLTIwMjAtMDI1OCJ9.NnF7p-PxIrFPcQ3qb-lBMBIhfzMuOJdlHD2-9Yz1AAw\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDgzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuemVyb2RheWluaXRpYXRpdmUuY29tL2Fkdmlzb3JpZXMvWkRJLTIwLTExNzYvIn0.W9ofPrRwqXOPCsng_4J4ZRoqcaaFGW3lQwbmbB5HD9w\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>octopus -- octopus_deploy<\/td>\n<td>In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1ODI1In0.s_L4Gpi-_LdjW9JqXJNgwYG34naRs0piM-j9egj4oDA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25825<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL09jdG9wdXNEZXBsb3kvSXNzdWVzL2lzc3Vlcy82NjA0In0.P3BhlO-s0Kx5efldvVa3kzpQTh78ARevguvpL6xgKdo\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL09jdG9wdXNEZXBsb3kvSXNzdWVzL2lzc3Vlcy82NjA1In0.hbK2jgQ9VxNcXvNcMKKgz-aPc5SorWL_Qr9JqoooVhI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL09jdG9wdXNEZXBsb3kvSXNzdWVzL2lzc3Vlcy82NjA2In0.dHiHpoMJC1wGqg1c2a_dBcV4HWn0Geoj-ki4VSOlBIo\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL09jdG9wdXNEZXBsb3kvSXNzdWVzL2lzc3Vlcy82NjA3In0.e8zpz0ylfn2_Te1Dph7x5fEdf2lSipmoVJuwBpXUgsY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>olimpoks -- olimpoks<\/td>\n<td>OLIMPOKS before 5.1.0 allows Auth\/Admin ErrorMessage XSS.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDg5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2MjcwIn0.Bn-Dff_jpuPw0zax38ibuQSeY2wCluIi2Q-TkvpZDcY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16270<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDkwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9iZHUuZnN0ZWMucnUvdnVsLzIwMjAtMDQ2MjMifQ.sHS5rh-JF7rFQ2n-KB4zewqA1Fqsu7QfKKadBfghDj8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDkxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9vbGltcG9rcy5ydS9va3MvZm9ydW0vb2xpbXBva3M1LnBocCJ9.X_M_ToOWeiwOaJ6Iq1KQIVQHFORU7vLnukEExBh9IXk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>open_enclave -- open_enclave<\/td>\n<td>In Open Enclave before version 0.12.0, an information disclosure vulnerability exists when an enclave application using the syscalls provided by the sockets.edl is loaded by a malicious host application. An attacker who successfully exploited the vulnerability could read privileged data from the enclave heap across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information otherwise considered confidential in an enclave, which could be used in further compromises. The issue has been addressed in version 0.12.0 and the current master branch. Users will need to to recompile their applications against the patched libraries to be protected from this vulnerability.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDkyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE1MjI0In0.B8N1a0nmVKKmCqBv0Nl1vTw9Yj3CduOZXT0W8HOyLto\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15224<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDkzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL29wZW5lbmNsYXZlL29wZW5lbmNsYXZlL2Jsb2IvbWFzdGVyL0NIQU5HRUxPRy5tZCN2MDEyMCJ9.tOdTRiBbdAhxlxDZDHIxyeNCnVkjy2BMuUEj6YYBIvQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL29wZW5lbmNsYXZlL29wZW5lbmNsYXZlL2NvbW1pdC9iY2FjOGU3YWNiNTE0NDI5ZmVlOWUwYjVkMGM3YTAzMDhmZDRkNzZiIn0.dOdimto388IxrVGlJ-z_TcNJIrjv18rToMofijytdlY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL29wZW5lbmNsYXZlL29wZW5lbmNsYXZlL3NlY3VyaXR5L2Fkdmlzb3JpZXMvR0hTQS01MjVoLXd4Y2MtZjY2bSJ9.Tm9rpECQJjfqebRYdCZf8MP7l_pAbEIytq10cUPyxgI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>openstack -- blazer_dashboard<\/td>\n<td>An issue was discovered in OpenStack blazar-dashboard before 1.3.1, 2.0.0, and 3.0.0. A user allowed to access the Blazar dashboard in Horizon may trigger code execution on the Horizon host as the user the Horizon service runs under (because the Python eval function is used). This may result in Horizon host unauthorized access and further compromise of the Horizon service. All setups using the Horizon dashboard with the blazar-dashboard plugin are affected.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2OTQzIn0.ZG_U9TaWo_p58ZB8BgkNg1MAzP9hlIPviRjENmpyFRk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26943<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL3d3dy5vcGVud2FsbC5jb20vbGlzdHMvb3NzLXNlY3VyaXR5LzIwMjAvMTAvMTYvNSJ9.r4xss8A_AlwJvSJqlUMLMrFkZzMceGvwsF_C7tLDbXQ\/s\/1193554985\/br\/87099655821-l\">MLIST<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQubmV0L2J1Z3MvMTg5NTY4OCJ9.ky3jNQNbnSDO5RKAmBGGpg7RO3DT27XphfY-xyueSjc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMDk5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9yZXZpZXcub3BlbmRldi5vcmcvNzU1ODEwIn0.hI5vHJURm11d2o7TdCkIUlbNRd8lxWMxuj190LXAsTw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9yZXZpZXcub3BlbmRldi5vcmcvNzU1ODEyIn0.mQ2oIiVC3bdiYpIS2mEQPbb2mTeamiExfK6KrrxIDOk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9yZXZpZXcub3BlbmRldi5vcmcvNzU1ODEzIn0.RsrnRXJqlTe4YJRS7amg12NOQUTbgyyilT4qwSm6Akc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9yZXZpZXcub3BlbmRldi5vcmcvNzU1ODE0In0.ioQJrkEf10tn_bDGjIutzA1cjR7lX3uTTzjfOFT1J5s\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTAzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9yZXZpZXcub3BlbmRldi5vcmcvNzU2MDY0In0.B1fGk0v5Au8uioY5ISxliD_t3-FUOJiyGKM0ot_qZyA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zZWN1cml0eS5vcGVuc3RhY2sub3JnL29zc2EvT1NTQS0yMDIwLTAwNy5odG1sIn0.RDUJj5320xh7KOuB_O81Nyb2ygvEuxj5iW02xm2CZPU\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>opensuse -- powerdns_recursor<\/td>\n<td>An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1ODI5In0.gf8GyUS3zW5y02fOjwDdoAl9TnCVk2TARY_yqwAOgx0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25829<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL2xpc3RzLm9wZW5zdXNlLm9yZy9vcGVuc3VzZS1zZWN1cml0eS1hbm5vdW5jZS8yMDIwLTEwL21zZzAwMDM2Lmh0bWwifQ.vTgRpWrdz7ePFo7uFgA_-sFWKml6e_VMddKrDmtlPGA\/s\/1193554985\/br\/87099655821-l\">SUSE<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9kb2NzLnBvd2VyZG5zLmNvbS9yZWN1cnNvci9zZWN1cml0eS1hZHZpc29yaWVzL3Bvd2VyZG5zLWFkdmlzb3J5LTIwMjAtMDcuaHRtbCJ9.182VV3nm_BCCL-TTUpHbB_88P-9JgVAUP2WojcDKnI4\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>otrs -- open_ticket_request_system<\/td>\n<td>Agent names that participates in a chat conversation are revealed in certain parts of the external interface as well as in chat transcriptions inside the tickets, when system is configured to mask real agent names. This issue affects OTRS; 7.0.21 and prior versions, 8.0.6 and prior versions.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE3NzcifQ.Pe1BmnEejD62h0WJh_UZ8F28CqgD2khTNXIP1uLESqA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1777<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTA5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9vdHJzLmNvbS9yZWxlYXNlLW5vdGVzL290cnMtc2VjdXJpdHktYWR2aXNvcnktMjAyMC0xNS8ifQ.-5q3DdRE7ocEZqewVFzfHzQy0JZiZ1zRMPK08Quj2YY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>overwolf -- overwolf_client<\/td>\n<td>In the client in Overwolf 0.149.2.30, a channel can be accessed or influenced by an actor that is not an endpoint.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTEwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1MjE0In0.lieFR7pEfKj1ah3tPrAKMDPxpXEHRT_DoRgrSui9hBU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25214<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTExLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2ltbXVuaXR5aW5jL0Fkdmlzb3JpZXMvYmxvYi9tYXN0ZXIvMjAyMC9DVkUtMjAyMC0yNTIxNC5wZGYifQ.j4VSRvpMgtcJJ3gxRrTRku3-sojp5CswlqpqqWDm9Bk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>pepperl_+_fuchs -- comtrol_rocketlinx<\/td>\n<td>Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528\/ES9528-XT (all versions) and ICRL-M-8RJ45\/4SFP-G-DIN, ICRL-M-16RJ45\/4CP-G-DIN FW 1.2.3 and below is prone to unauthenticated device administration.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTEyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEyNTAyIn0.QHlooqwWWmzrwNdrYC6olZU-C3exGFnAWUn8sno6wyQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12502<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTEzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LnZkZS5jb20vZGUtZGUvYWR2aXNvcmllcy92ZGUtMjAyMC0wNDAifQ.2w4EpsC_CxlQ4AAmHp8cU5VXAiydYh_SzbSFTr7S9lQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>pepperl_+_fuchs -- comtrol_rocketlinx<\/td>\n<td>Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528\/ES9528-XT (all versions) use undocumented accounts.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEyNTAxIn0.9g2VxV-rk0bsK-X7YHYHF0jHRZL7y6RScA3pb2wUJGw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12501<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LnZkZS5jb20vZGUtZGUvYWR2aXNvcmllcy92ZGUtMjAyMC0wNDAifQ.2vQk3Up7_DHI2PGgPzwR05XdX-xoBEvE_eh0ycTKMjg\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>pepperl_+_fuchs -- comtrol_rocketlinx<\/td>\n<td>Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528\/ES9528-XT (all versions) and ICRL-M-8RJ45\/4SFP-G-DIN, ICRL-M-16RJ45\/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEyNTAzIn0.1z-X_lgB5-c8E6cqI4Idd_aiyBwM8RJtmv6D42saMaU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12503<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LnZkZS5jb20vZGUtZGUvYWR2aXNvcmllcy92ZGUtMjAyMC0wNDAifQ.qopkfUtXHl8OGERkM_ABnt3vLb33nFxuEmaND2ry6uA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>pepperl_+_fuchs -- comtrol_rocketlinx<\/td>\n<td>Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528\/ES9528-XT (all versions) allows unauthenticated device administration.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEyNTAwIn0.aPwxWPhMOXAQI4sx0l5Ue_q-XUZU4MeyuElQSZny46s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12500<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTE5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LnZkZS5jb20vZGUtZGUvYWR2aXNvcmllcy92ZGUtMjAyMC0wNDAifQ.JayDZbbDJkmFVaFO07e6WKLBS3tyQPdcDv1pHw1lCaQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>pepperl_+_fuchs -- comtrol_rocketlinx<\/td>\n<td>Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528\/ES9528-XT (all versions) and ICRL-M-8RJ45\/4SFP-G-DIN, ICRL-M-16RJ45\/4CP-G-DIN FW 1.2.3 and below has an active TFTP-Service.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTEyNTA0In0.Nt5EuORqFvduFYbgNCns_uNBL7IGuSxtIM6HSkTC4R0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-12504<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LnZkZS5jb20vZGUtZGUvYWR2aXNvcmllcy92ZGUtMjAyMC0wNDAifQ.Xm_PiAqwzjIpTLavhHIhUaFvBRykZVtxDuJGLTLr6dw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>phpmyadmin -- phpmyadmin<\/td>\n<td>An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2OTM1In0.nL3mIw0nBRVvEscoY6qnukVcG4y0IhzqFx1iwY_lPsk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26935<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTIzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL2xpc3RzLm9wZW5zdXNlLm9yZy9vcGVuc3VzZS1zZWN1cml0eS1hbm5vdW5jZS8yMDIwLTEwL21zZzAwMDI3Lmh0bWwifQ.1JgHR_MHN1GxxSI_5rnhsZarSFc2m9M5Ma6iaiw81oQ\/s\/1193554985\/br\/87099655821-l\">SUSE<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cucGhwbXlhZG1pbi5uZXQvc2VjdXJpdHkvUE1BU0EtMjAyMC02LyJ9.BjjDd3OYT-AGgdShvowjZ-5_GdFAZXaRm99KUlfg9-M\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>phpmyadmin -- phpmyadmin<\/td>\n<td>phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.<\/td>\n<td>2020-10-10<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2OTM0In0.Eqyw6eBn0iXShkxAzafT3hi-y3kfRgIGNIi9G19g_T8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26934<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL2xpc3RzLm9wZW5zdXNlLm9yZy9vcGVuc3VzZS1zZWN1cml0eS1hbm5vdW5jZS8yMDIwLTEwL21zZzAwMDI3Lmh0bWwifQ.h6JIGLNwACMZe9mHc_QKwStGVpKt7GX-UuWbdrvpJEg\/s\/1193554985\/br\/87099655821-l\">SUSE<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cucGhwbXlhZG1pbi5uZXQvc2VjdXJpdHkvUE1BU0EtMjAyMC01LyJ9.oRNEk_-LWgWIgvJoeXqbEn_z_WG28bvZNqLoaG52rwI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>phpredisadmin -- phpredisadmin<\/td>\n<td>phpRedisAdmin before 1.13.2 allows XSS via the login.php username parameter.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI3MTYzIn0.mqAPD0eCoZWWVHdksna3chYmP6JFS-NvOYuMqQrugDU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27163<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTI5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2VyaWtkdWJiZWxib2VyL3BocFJlZGlzQWRtaW4vY29tbWl0L2VkZGFhNjc0NTM2ZDJlNzZlNmQwYjRlZmViMDA2MDRlOTkyZWFiOGYifQ.Ino7qUxkrrdh0oLYu5NCoULYFC5vXPNXuJg6WP75G7I\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>qemu -- qemu<\/td>\n<td>An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw\/display\/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI0MzUyIn0.pHfWgdeG6yyPiDYBdhvK6IRH2E3_Z2bdcsN0Mf73W_o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-24352<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9idWd6aWxsYS5yZWRoYXQuY29tL3Nob3dfYnVnLmNnaT9pZD0xODQ3NTg0In0.mOU2vhLDzDErlFOP7ZGGQAMdAuQQnBDH1lI3Sir1sCc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXQucWVtdS5vcmcvP3A9cWVtdS5naXQifQ.5LUn8WHgULTso8S4FnD7z9oTP2aiA87puP5ePoDtggg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>qualcomm -- qcmap<\/td>\n<td>The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input, while handling a SetGatewayUrl() request. A local attacker with shell access can pass shell metacharacters and run arbitrary commands. If QCMAP_CLI can be run via sudo or setuid, this also allows elevating privileges to root. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTMzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1ODU5In0.I1jemsEfvgNJlJZECeRPRnO2s3uMeqOZ7zTCHOrfKvQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25859<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL3Zkb28uY29tL2Jsb2cvcXVhbGNvbW0tcWNtYXAtdnVsbmVyYWJpbGl0aWVzIn0.lbcLHZzioUDUYKcyhB4qwAzb-yQ0tddcwuEdYbGvYOo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>qualcomm -- qcmap<\/td>\n<td>The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1ODU4In0.i6T93ZqL0xjJ8Y4QIY_bZ8LMpwx-42YBnsUsOddant8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25858<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cDovL3Zkb28uY29tL2Jsb2cvcXVhbGNvbW0tcWNtYXAtdnVsbmVyYWJpbGl0aWVzIn0.5XXcHzztisvlR--TsGVm4eLd8cBZV4L_KKEEWjP4YMY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>rapid7 -- nexpose<\/td>\n<td>A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49 that may have allowed an authenticated user with a low permission level to access resources &amp; make changes they should not have been able to access.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTczODMifQ.K0VFW0IN_v_AxKq0Zq63uIOmDWRClibw0tX-i-JYgg8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7383<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9oZWxwLnJhcGlkNy5jb20vaW5zaWdodHZtL2VuLXVzL3JlbGVhc2Utbm90ZXMvaW5kZXguaHRtbD9waWQ9Ni42LjQ5In0.7Aq1sb5EXkGGTueQpI9xN29xK6bkZ4BwDYIXJ7iGlkE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>red_hat -- jboss_eap<\/td>\n<td>A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTM5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE0Mjk5In0.LXT4X7rbvc-sNVq7GoLpILAbDAZgOEJuZUpvL_P9nFs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-14299<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9idWd6aWxsYS5yZWRoYXQuY29tL3Nob3dfYnVnLmNnaT9pZD0xODQ4NTMzIn0.NV5pZtajHK3iqE6PlVsmTm2fHr_OHJBdHzmjFYUoza8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>rockwell_automation -- allen-bradley_flex_io_1794-aent\/b<\/td>\n<td>An exploitable denial of service vulnerability exists in the ENIP Request Path Port Segment functionality of Allen-Bradley Flex IO 1794-AENT\/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYwODMifQ.phLErq2qt2bPGbDlIknKQBBQIyyIa2gpIW9zyF7zU0M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6083<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly90YWxvc2ludGVsbGlnZW5jZS5jb20vdnVsbmVyYWJpbGl0eV9yZXBvcnRzL1RBTE9TLTIwMjAtMTAwNSJ9.J4k62wgZEK5gR0H7fQ2Ngt8hanFIx0FalvSDD2u5PPk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>rockwell_automation -- allen-bradley_flex_io_1794-aent\/b<\/td>\n<td>An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT\/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYwODYifQ.Mhc-9rS0XicX0lRjSyZKr3jirxrdzDnvhOG0u3e-PUc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6086<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly90YWxvc2ludGVsbGlnZW5jZS5jb20vdnVsbmVyYWJpbGl0eV9yZXBvcnRzL1RBTE9TLTIwMjAtMTAwNyJ9.gyh9ly7s_xz4kO35Y9aEO93nX6qpAYSbCODsyVHHhw8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>rockwell_automation -- allen-bradley_flex_io_1794-aent\/b<\/td>\n<td>An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT\/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYwODcifQ.mqUlFclojr_J1JJDyX3eoNNgN5jlOLHqZw_EHUMyHK0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6087<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly90YWxvc2ludGVsbGlnZW5jZS5jb20vdnVsbmVyYWJpbGl0eV9yZXBvcnRzL1RBTE9TLTIwMjAtMTAwNyJ9.g5w6RRpGZe6u7exXdSjBUwKdviAVrtNekybD_F1tIw8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>ros_comm -- openrobotics<\/td>\n<td>Integer Overflow or Wraparound vulnerability in the XML RPC library of OpenRobotics ros_comm communications packages allows unauthenticated network traffic to cause unexpected behavior. This issue affects: OpenRobotics ros_comm communications packages Noetic and prior versions. Fixed in <a href=\"https:\/\/github.com\/ros\/ros_comm\/pull\/2065\">https:\/\/github.com\/ros\/ros_comm\/pull\/2065<\/a>.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2MTI0In0.cht15scmM57qz7CeDmtfHdmyDeflF8DW6IAlb6tu3RY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16124<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3Jvcy9yb3NfY29tbS9wdWxsLzIwNjUifQ.zUfa9pOGLGc3Wy3WKh1JBol-H9Dh3NoW6o3sZStRI9A\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sage -- dpw<\/td>\n<td>An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. The search field \"Kurs suchen\" on the page Kurskatalog is vulnerable to Reflected XSS. If the attacker can lure a user into clicking a crafted link, he can execute arbitrary JavaScript code in the user's browser. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTQ5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2NTg0In0.OVJsKkfGB0LGJQOGBqwNsTJ-c9QH88QVMCKJzRQejKw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26584<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTUwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zZWMtY29uc3VsdC5jb20vZW4vdnVsbmVyYWJpbGl0eS1sYWIvYWR2aXNvcmllcy8ifQ.F2gJulwQykl9_p3mX2iz40RV9aSlF5ls-ZYfe0KvJNc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTUxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zZWNsaXN0cy5vcmcvZnVsbGRpc2Nsb3N1cmUvMjAyMC9PY3QvMTcifQ.xE5LiMt1O43NYWb-eIochYkvQ6FwY76YMStxm9WPcIo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTUyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuc2FnZWRwdy5hdCJ9.mzVRbS4QcFNgOYZE3WkP5qfOoXBPWg9_Zm26hUz-QT0\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sage -- dpw<\/td>\n<td>An issue was discovered in Sage DPW 2020_06_x before 2020_06_002. It allows unauthenticated users to upload JavaScript (in a file) via the expenses claiming functionality. However, to view the file, authentication is required. By exploiting this vulnerability, an attacker can persistently include arbitrary HTML or JavaScript code into the affected web page. The vulnerability can be used to change the contents of the displayed site, redirect to other sites, or steal user credentials. Additionally, users are potential victims of browser exploits and JavaScript malware.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTUzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2NTgzIn0.yVW9wPcuZweCS5go6n0zXCberwKAVH_KhDVhRZX1P-g\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26583<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zZWMtY29uc3VsdC5jb20vZW4vdnVsbmVyYWJpbGl0eS1sYWIvYWR2aXNvcmllcy8ifQ.0B7-7u5mEsvFcTdXBl1h-iGvYAc5uV9qX7EZAdbvBbg\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zZWNsaXN0cy5vcmcvZnVsbGRpc2Nsb3N1cmUvMjAyMC9PY3QvMTcifQ.rIDgKlsQ2sSQFYxNKJFfV8p4tPxPzi2UGDXlQwoy0Ws\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuc2FnZWRwdy5hdCJ9.I08m_itR7z1K43xeMctjKvOPL4QZQHbhRJhwD3epHww\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>samsung -- samsung<\/td>\n<td>Samsung Update 3.0.2.0 ~ 3.0.32.0 has a vulnerability that allows privilege escalation as commands crafted by attacker are executed while the engine deserializes the data received during inter-process communication<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTc4MTEifQ.ylgDVCezr9tuvlA6VM-BZ7cft3rI7Nm_VZzGLfslwks\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7811<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuYm9oby5vci5rci9rcmNlcnQvc2VjTm90aWNlVmlldy5kbz9idWxsZXRpbl93cml0aW5nX3NlcXVlbmNlPTM1NzA4In0.BAfqwD0gesUhiHgTPmA7c86d7jgfKtwSprkYQLmW3K8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- 3d_visual_enterprise_viewer<\/td>\n<td>SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTU5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzIifQ.J9tbWyKqtgphhZeu2mq6IeOK-EETJ7s-uEq3lO-JoMs\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6372<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTYwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk3MzQ5NyJ9.pq1EJ8BRbppStKl7AjdeRk-fpM4zaqqDz_R82yvYCMM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTYxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.9Hc3vvV8UqdfxLjs_NjmgHmNH_8D3GRhs4T8pKqh-LM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- 3d_visual_enterprise_viewer<\/td>\n<td>SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated Right Hemisphere Binary (.rh) file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTYyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzYifQ.i9_NoILiKocCeHnys2CB7u27Q5von23BYQ3cAEKoMIc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6376<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTYzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk3MzQ5NyJ9.E-FeyMsxGvNMYYHsU7RQa93ZghjDC-yrt7uWdR5WEMw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.dgd40ZuRTKxc3aPZ51s9b6NJXWELxEixb_eAnViIxkM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- 3d_visual_enterprise_viewer<\/td>\n<td>SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated Right Computer Graphics Metafile (.cgm) file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzUifQ.X2DwTtMNaDnE7mV1rn0gfkyn3CUu7vFtTAJiLFUIbNU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6375<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk3MzQ5NyJ9.i5OZud1xjqlGfx0tkMDQA-GCgOtr6N8i3dyfy0_tZOM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ._2oCa7gz75uiZW_dp9fub8nzO1DdIP1kJ0nm2hrFiV4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- 3d_visual_enterprise_viewer<\/td>\n<td>SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated Jupiter Tessallation(.jt) file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzQifQ.ZuLSuz9LTYD1lEGahdYbpa23z1QX7jcH05BAM8cNqoQ\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6374<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTY5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk3MzQ5NyJ9.P5XZI82dAMb3tze2Vg6VyO2xdqyDdnluk2RVkzj1314\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTcwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.pnnjOFtHv9zcEK6arSkDX41BwRfzjW0aNUJhW_tnXFE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- 3d_visual_enterprise_viewer<\/td>\n<td>SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTcxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzMifQ.pWMxT3ewt7BzQ4Q2VA-T6tGH7VF3vyAoxDazPg_aW9s\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6373<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTcyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk3MzQ5NyJ9.uw68qBBDX9nlJ8E6OUHzDazBXEULacowp7ZTIUDDOps\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTczLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.ri0Sn1YOYjOxuktaKekUZNW-hgZzEN5b0aB7AphJDmE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- business_planning_and_consolidation<\/td>\n<td>SAP Business Planning and Consolidation, versions - 750, 751, 752, 753, 754, 755, 810, 100, 200, can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users, leading to Cross Site Scripting.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNjgifQ._GhxEnEySo5TaqWDzBFQ6pQb3yX2N5yrK6bMV2vb9tw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6368<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2MDgyNSJ9.c3zbI6VXE5N_THb-RbkzpFmXWQcdTF1RHKXwYISY6uI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.Z5-R1DkTu4qTABDKaZdHmVNvjEA3juIPWOD9XUwxnjU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- commerce_cloud<\/td>\n<td>SAP Commerce Cloud versions - 1808, 1811, 1905, 2005, does not sufficiently encode user inputs, which allows an authenticated and authorized content manager to inject malicious script into several web CMS components. These can be saved and later triggered, if an affected web page is visited, resulting in Cross-Site Scripting (XSS) vulnerability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYyNzIifQ.8ydlQi6lfnraWPR1BFSPQZzbiEwtjIHu5faW0b8VHV4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6272<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjkxNzM4MSJ9.CPwbSBCYkQv1T99Pl-TSNJPTEViiYqrkh-1aLycXVEk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTc5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.lja6vrnU1cqw-Qkiw4-WV5nn-bqXaesHuOTQd2rx5Go\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- commerce_cloud<\/td>\n<td>SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, exposes several web applications that maintain sessions with a user. These sessions are established after the user has authenticated with username\/passphrase credentials. The user can change their own passphrase, but this does not invalidate active sessions that the user may have with SAP Commerce Cloud web applications, which gives an attacker the opportunity to reuse old session credentials, resulting in Insufficient Session Expiration.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTgwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNjMifQ.h-F6UQ4Sj-bS-i-jKLo7GXN91-9oltofSlnsljJ5_wE\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6363<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTgxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2NTI4NyJ9.LpAo5PAyxiFol5qsAe5VpWzjyiGCMOkSLslJ136ft9o\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTgyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.x090_MmTbyPUW84Ww7o6oKbxkUQ5HYfyBR0fr8ZHR-k\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- netweaver_application_server<\/td>\n<td>SAP NetWeaver Application Server Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 allows an unauthenticated attacker to include JavaScript blocks in any web page or URL with different symbols which are otherwise not allowed. On successful exploitation an attacker can steal authentication information of the user, such as data relating to his or her current session and limitedly impact confidentiality and integrity of the application, leading to Reflected Cross Site Scripting.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTgzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzMTkifQ.mx0uUePxd1ZCup118vyAs0G7ZZk2Qu1gTUxB5tQzPxA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6319<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk1NjM5OCJ9.ppOk8aX_R2uUvkZu8plSfcoM_o6wD2Rs9Kldh_2i8JY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.LZ3rtzdgPEB_trgVbPsDZCPyNbhcSJ5IB0pW8NOTFIU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- netweaver_application_server<\/td>\n<td>User enumeration vulnerability can be exploited to get a list of user accounts and personal user information can be exposed in SAP NetWeaver Application Server ABAP (POWL test application) versions - 710, 711, 730, 731, 740, 750, leading to Information Disclosure.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNzEifQ.qkdlStjuhxhZWekwzw1wCksE_e7XUj2Xd0jPlCd-ljg\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6371<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2MzEzNyJ9.4Lxudcg2DeOYZ__5j_XYHdrLl_ZVl39cO8wHFYT6qyU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.O_a2Rl-x6PublcGOTerFd_sQL0kOPimXzduDgFdjxRQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- netweaver_as_java<\/td>\n<td>SAP NetWeaver AS Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, Start Page allows an unauthenticated remote attacker to redirect users to a malicious site due to insufficient reverse tabnabbing URL validation. The attacker could execute phishing attacks to steal credentials of the victim or to redirect users to untrusted web pages containing malware or similar malicious exploits.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTg5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNjUifQ.DjRtuLNuIT5JzNQ5DfIXTONx9aVcnMYeGjNMtXERyDc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6365<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTkwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2OTgyOCJ9.b0KsLipgz97_EYzF5EJITOJFwAAsUam7Ju0grFhBWw4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTkxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.PoQYtCNqTQBb9wLyINoH7GVDDW5tMAI-lxH5tI_FSrA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- netweaver_enterprise_portal<\/td>\n<td>SAP NetWeaver Enterprise Portal (Fiori Framework Page) versions - 7.50, 7.31, 7.40, does not sufficiently encode user-controlled inputs and allows an attacker on a valid session to create an XSS that will be both reflected immediately and also be persisted and returned in further access to the system, resulting in Cross Site Scripting.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTkyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzMjMifQ.zCi1I3cGchQWJ_6XgcKkcecMIJCb0dx7RTQSU5e4z4o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6323<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTkzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2MDMyOSJ9.7qrMrMsS3Lw-7ndCJ8vzgCyvzdU4nh0C22emNsGrR4k\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.N8qEimkBEITSSh_TRl3dJ4ZN93oRx3K7j0WBSWTJYbE\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sap -- soulution_manager_and_sap_focused_run<\/td>\n<td>SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTYzNjQifQ.8iM7lPj6hlamJdIt2O3wxtbGpGoB94mjIHGgLB_5Fms\/s\/1193554985\/br\/87099655821-l\">CVE-2020-6364<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9sYXVuY2hwYWQuc3VwcG9ydC5zYXAuY29tLyMvbm90ZXMvMjk2OTgyOCJ9.NIBf8Mpuwcp_RbroleaftKTKuv76-QwldA9f2Z8zBJo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93aWtpLnNjbi5zYXAuY29tL3dpa2kvcGFnZXMvdmlld3BhZ2UuYWN0aW9uP3BhZ2VJZD01NTg2MzIxOTYifQ.8___2almC3A5oMzFcQ7dN-zK7CfCQJJGJyaUCsv6dQc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>siport -- mp<\/td>\n<td>A vulnerability has been identified in SIPORT MP (All versions &lt; 3.2.1). Vulnerable versions of the device could allow an authenticated attacker to impersonate other users of the system and perform (potentially administrative) actions on behalf of those users if the single sign-on feature (\"Allow logon without password\") is enabled.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTc1OTEifQ.fJEdRllV0j0Ucsf5TyCEYXaB5G03-KqCbydhejqEV0M\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7591<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMTk5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9jZXJ0LXBvcnRhbC5zaWVtZW5zLmNvbS9wcm9kdWN0Y2VydC9wZGYvc3NhLTM4NDg3OS5wZGYifQ.j0V7OXcnzNnCzhFZyQ1AlfYjtorm-QOOAkfNHQqb7h4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>snyk -- prototype_pollution<\/td>\n<td>The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjAwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTc3NDMifQ.YEFEPfAa8yFEMVQmQKOpWmir-ZiLcsBoEb6itb7J8sc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-7743<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjAxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2pvc2Rlam9uZy9tYXRoanMvYmxvYi9kZXZlbG9wL3NyYy91dGlscy9vYmplY3QuanMlMjNMODIifQ.7kfyxyMEyzfIYr3SaCu1c1rCCtFdLK2KTqYkDK0Nbz8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjAyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2pvc2Rlam9uZy9tYXRoanMvY29tbWl0L2VjYjgwNTE0ZTgwYmNlNGU2ZWM3ZTcxZGI4ZmY3OTk1NGYwN2M1N2UifQ.aQs8rpeihGmg6SJcgEynRiSyeNWi960MxGw8yC4kYCs\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjAzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zbnlrLmlvL3Z1bG4vU05ZSy1KQVZBLU9SR1dFQkpBUlMtMTAxNzExMyJ9.-VRDd8GN-TItHf8SWTBPfB1NIKwBEFhNCBUwWZrvGBQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zbnlrLmlvL3Z1bG4vU05ZSy1KQVZBLU9SR1dFQkpBUlNCT1dFUi0xMDE3MTEyIn0.HoARFuCqWYBPAVniBIsyvw1u--pl5GwJS8w-JDwuHxc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zbnlrLmlvL3Z1bG4vU05ZSy1KQVZBLU9SR1dFQkpBUlNOUE0tMTAxNzExMSJ9.nlcKe0M3oDEI9sFLJoNLxg9z6BLuC894W4S2gQMWM6U\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zbnlrLmlvL3Z1bG4vU05ZSy1KUy1NQVRISlMtMTAxNjQwMSJ9.NzcEpEgThNb0McyHfx-SgQ-k2tCi9ORzQ8JLZw2nuHo\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonatype -- nexus_repository_manager<\/td>\n<td>A Directory Traversal issue was discovered in Sonatype Nexus Repository Manager 2.x before 2.14.19. A user that requests a crafted path can traverse up the file system to get access to content on disk (that the user running nxrm also has access to).<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE1MDEyIn0.3YHiDgn-gJ1SxMlWYOZVCqyVIcK4InfqbtztLM_8LX8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15012<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9zdXBwb3J0LnNvbmF0eXBlLmNvbS9oYy9lbi11cy9hcnRpY2xlcy8zNjAwNTEwNjgyNTMifQ.u-njg8qsSqXwagvBQV-ngRpTj6jJy7DT7HxB6-22T4I\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A buffer overflow vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjA5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzcifQ.5QCXfXbnLlslm_el6EacICIGwLV6jk0mmfru8rpFT9Q\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5137<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjEwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDEyIn0.eAK0-07mJTYJn5sj07chQZuv6uABbvK_STlY_v6IiCs\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A vulnerability in SonicOS allows a remote unauthenticated attacker to brute force Virtual Assist ticket ID in the firewall SSLVPN service. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjExLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxNDEifQ.qaWCf9or--31nRVxeVsUQwHuTptDuMy-YplDgfRJtJ4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5141<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjEyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDE2In0.-vr6EsWephNugPrTAK2lKos--c2Grr-z6pk6DYZyIZw\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A Heap Overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service and leads to SonicOS crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjEzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzgifQ.fNeoSrTED50NjptoSC3s5E7mWob1FlwRIrk5TiRRhvY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5138<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDEzIn0.5yqTo6oDL-df1bKAFHKcWmrYSI1y4qjkbgzH0tdDvdE\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A vulnerability in SonicOS allows an authenticated attacker to cause out-of-bound invalid file reference leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzQifQ.phlrdb__KyLQRz0A2oWwSj_8f4tiC8vggFwtFJWXzag\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5134<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDA5In0.UHr0bhjDr7jdsFfzMMh2nw-L1TZ6UNhskyRT7Zi-oWY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service due to buffer overflow, which leads to a firewall crash. This vulnerability affected SonicOS Gen 6 version 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzMifQ.ePhuiTsJer2ilaQHDWT2TupAWns4n3UAeL0wFAnbwWA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5133<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDA4In0.U4WR6kljN_HPIAcLB3UQrcPgTSxB4arUFRJUPDJAUbQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall. This vulnerability affected SonicOS Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjE5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzUifQ.PBVrROoO7PPtP4fuNpSQQww5IHRvMBkkqrQQkCYuXJc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5135<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjIwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDEwIn0.ER-e2zcP-woZjWoX3kV5Kb_BFOVlapRgJoOBsuKCnlI\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A buffer overflow vulnerability in SonicOS allows an authenticated attacker to cause Denial of Service (DoS) in the SSL-VPN and virtual assist portal, which leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjIxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzYifQ.JwGXnjZW8NqaIT2uKLLE2p0faGdukkKksznrKld63NY\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5136<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjIyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDExIn0.Fh-pBuenhXNx5gadhaZjj6fW3YQ6L3z8-BFSAtrroA8\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A vulnerability in SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS) on the firewall SSLVPN service by sending a malicious HTTP request that leads to memory addresses leak. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjIzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxNDAifQ.1cs_zTNLUO6FemxS0-dtm-SunpB5K79sD7Z4ni3SsGk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5140<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDE1In0.Dyh5eaNA3lYwp1MQ8b46Rvip_Xp6KvHcqZZ3eUQqoDQ\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A vulnerability in SonicOS SSLVPN service allows a remote unauthenticated attacker to cause Denial of Service (DoS) due to the release of Invalid pointer and leads to a firewall crash. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxMzkifQ.CNcVmIP6H_tuRxEfLaiQjlPfyr7Xe-HCp-BqWRykYUM\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5139<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDE0In0.QjlXnIyG7LAMEagQWxXqPQDemyBoU5kZpDii_OFBc6o\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>SonicOS SSLVPN login page allows a remote unauthenticated attacker to perform firewall management administrator username enumeration based on the server responses. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxNDMifQ.xeICqWBBEtjYL_yXIbaeQ_2WryqlSSgUqDMaCWdJuc0\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5143<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDE4In0.GifOtoGW_Q-C6EE4hQ_FKhkfvaqIs6Ql9kaEv6BHqEk\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sonicos -- sonicos<\/td>\n<td>A stored cross-site scripting (XSS) vulnerability exists in the SonicOS SSLVPN web interface. A remote unauthenticated attacker is able to store and potentially execute arbitrary JavaScript code in the firewall SSLVPN portal. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.<\/td>\n<td>2020-10-12<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjI5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTUxNDIifQ.6CxoFbr-gvi8ZhzLo9WH-ZQNF1lsBdKg13Xbmjwcnls\/s\/1193554985\/br\/87099655821-l\">CVE-2020-5142<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjMwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wc2lydC5nbG9iYWwuc29uaWN3YWxsLmNvbS92dWxuLWRldGFpbC9TTldMSUQtMjAyMC0wMDE3In0.KHChtbDzQw7koRprZ4zrKqkxi3vihbwP4fqbFfZZ2yU\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>sopel -- channelmgnt<\/td>\n<td>In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op\/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjMxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE1MjUxIn0.JIeP2j7ZWNCOipM3x3MlHzrZvc0JRUFsK7TyCJ8mUYk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15251<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjMyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL01pcmFoZXplQm90cy9NaXJhaGV6ZUJvdHMvc2VjdXJpdHkvYWR2aXNvcmllcy9HSFNBLTIzcGMtNDMzOS05NXZnIn0.Td2Slmx8wMgngKKMNvSmc7e7RKWcXDNU1ulwwjgZCzA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjMzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL01pcmFoZXplQm90cy9zb3BlbC1jaGFubmVsbWdudC9wdWxsLzMifQ.DHy2l7bXayd17dSddvK77zd95eOa0y-TrFq478bt9LA\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL01pcmFoZXplQm90cy9zb3BlbC1jaGFubmVsbWdudC9zZWN1cml0eS9hZHZpc29yaWVzL0dIU0EtajI1Ny1qZnZ2LWgzeDUifQ.pRri7k_46LsMGtmLhS3iQC8ppUEMFlyoOWCf7jwYz2E\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9waGFiLmJvdHMubWlyYWhlemUud2lraS9waGFtZS9saXZlLzEvcG9zdC8xL3N1bW1hcnkvIn0.9lN5fKBbBo3EMBPIV4ehPcylX2-is2MeKDJO-GvvLFI\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9waGFiLmJvdHMubWlyYWhlemUud2lraS9UMTE3In0.vnxoN9GVFEkDK0iHGb3-Wh0UkSbFqHY-JIomGq0PZmk\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9weXBpLm9yZy9wcm9qZWN0L3NvcGVsLXBsdWdpbnMuY2hhbm5lbG1nbnQvIn0.6saKux1vhfyPIkvpBC_O2zrvW1TYhJpQVEcxh4XV_mQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>sylabs -- singularity<\/td>\n<td>Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite\/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `<a href=\"library:\/\/&#96;\">library:\/\/`<\/a> or `<a href=\"shub:\/\/&#96;\">shub:\/\/`<\/a>. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite\/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE1MjI5In0.Vt7wnnRzUuHGLyykteh1pxiC8TjcCnVwJKDtk2CZ17o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15229<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjM5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2hwY25nL3Npbmd1bGFyaXR5L2Jsb2IvdjMuNi40L0NIQU5HRUxPRy5tZCNzZWN1cml0eS1yZWxhdGVkLWZpeGVzIn0.tnw5h2qUmK2ofF0RtWbqtvKZ_rPyzXw0SMGIgcv5PiU\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2hwY25nL3Npbmd1bGFyaXR5L2NvbW1pdC9lYmEzZGVhMjYwYjExNzE5OGZkYjZmYWY0MWYyNDgyYWIyZjhkNTNlIn0.AIA37wydAt2y6TVHrr-fFKj5Dt0uwYgP8gUk8o-8oYw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2hwY25nL3Npbmd1bGFyaXR5L3B1bGwvNTYxMSJ9.-sZC4JjvqZxobmCQGGpjFCglHRXQM-0-UKXzoRbRMaM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL2hwY25nL3Npbmd1bGFyaXR5L3NlY3VyaXR5L2Fkdmlzb3JpZXMvR0hTQS03Z2NwLXc2d3ctMnh2OSJ9.w1kwjcZUMp4dMr_MMbyHwlgpkASKvoHyl3aelPloul8\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>telegram -- telegram_desktop<\/td>\n<td>Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1ODI0In0.c4lUlOnIKdSGmf9gmZDqWdojZEdtAll_nkcGS8-zyrc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25824<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3NvaGVpbHNhbWFuYWJhZGkvdnVsbmVyYWJpbGl0eS9ibG9iL21haW4vVGVsZWdyYW0tRGVza3RvcC1DVkUtMjAyMC0yNTgyNCJ9.cEMZ5lMMxvcSOTarZq69SKyS5riUjolLB-7Ann8xyKY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3RlbGVncmFtZGVza3RvcC90ZGVza3RvcC9yZWxlYXNlcy90YWcvdjIuNC4zIn0.NDdWoszX4KsJKnE_zA99aTuVdWj7vR7zAGWGKh0Q7a4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuVGVsZWdyYW0ub3JnIn0.OLMQumdJ68E8KEPmPveIf3BMuPd-aCor7KlzFpvII98\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>trend_micro -- antivirus_for_mac<\/td>\n<td>Trend Micro Antivirus for Mac 2020 (Consumer) contains a vulnerability in the product that occurs when a webserver is started that implements an API with several properties that can be read and written to allowing the attacker to gather and modify sensitive product and user data. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI3MDEzIn0.x0RaCmdAVb0hhb7QVn-iurSAzoXDDQ0HHFtnCIKAN6o\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27013<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9oZWxwY2VudGVyLnRyZW5kbWljcm8uY29tL2VuLXVzL2FydGljbGUvVE1LQS0wOTk1MCJ9.PEl99tuzOEdjH_hxTX3FTICDug3hYHyU6mWQjpHopWg\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjQ5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuemVyb2RheWluaXRpYXRpdmUuY29tL2Fkdmlzb3JpZXMvWkRJLTIwLTEyNDMvIn0.ITRihVmxVJxCMkSO_6JBwnx9r4JTNbnqKlyXhGZl3pM\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>trend_micro -- antivirus_for_mac_2020<\/td>\n<td>Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in a specific kernel extension where an attacker could supply a kernel pointer and leak several bytes of memory. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjUwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1Nzc4In0.Ocq4HUDuzC9K-PO4aACq3ZnFVPOJtVGFdT4Q_pJep_E\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25778<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjUxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9oZWxwY2VudGVyLnRyZW5kbWljcm8uY29tL2VuLXVzL2FydGljbGUvVE1LQS0wOTk0OCJ9.Cjjk0VtpEF6qTWZluOfMUy_VUQyd3LGZB-OdlsXvx80\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjUyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuemVyb2RheWluaXRpYXRpdmUuY29tL2Fkdmlzb3JpZXMvWkRJLTIwLTEyNDEvIn0.5wfdqTY17jcbAhUKs3Ba35S8JgzsonY19R6fk-w4Jgg\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>trend_micro -- antivirus_for_mac_2020<\/td>\n<td>Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a specific kernel extension request attack where an attacker could bypass the Web Threat Protection feature of the product. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjUzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1Nzc3In0.Vm3pFVgmdyaGI_rHPr6AQzDu6HRojtHMyxOVnSzZ228\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25777<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9oZWxwY2VudGVyLnRyZW5kbWljcm8uY29tL2VuLXVzL2FydGljbGUvVE1LQS0wOTk0NyJ9.MdLoHkXoMTBYjtKDOR-1bw7ShxWWFXb4lLKlYPG7yhs\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cuemVyb2RheWluaXRpYXRpdmUuY29tL2Fkdmlzb3JpZXMvWkRJLTIwLTEyNDIvIn0.qU517CDVDT_W7G8CTXDnbUIyms_ItrZzhtMMK3daHVA\/s\/1193554985\/br\/87099655821-l\">N\/A<\/a><\/td>\n<\/tr>\n<tr>\n<td>trend_micro -- antivirus_for_mac_2020<\/td>\n<td>Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feature.<\/td>\n<td>2020-10-13<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI1Nzc5In0.XtRHGHV0xOdsgpoPCWTeUFFp1_MBZKIJ9wO-LskWwU8\/s\/1193554985\/br\/87099655821-l\">CVE-2020-25779<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9oZWxwY2VudGVyLnRyZW5kbWljcm8uY29tL2VuLXVzL2FydGljbGUvVE1LQS0wOTk0OSJ9.SJch3DCqeUgSSQ_bmM1wUm3xzCuAC_6W_5uwTiY0KTQ\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>uniper_networks -- mist_cloud_ui<\/td>\n<td>When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2NzUifQ.4_3_8hFBvtnzbmlLRXTI9IT9HwiNjdtks4tGKtTJnQA\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1675<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjU5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9rYi5qdW5pcGVyLm5ldC9KU0ExMTA3MiJ9.sMuQ7Gtl2rj_2nhZmM5-40Y7L0I1zCMgZX8odtpH7QU\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>uniper_networks -- mist_cloud_ui<\/td>\n<td>When SAML authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly handle child elements in SAML responses, allowing a remote attacker to modify a valid SAML response without invalidating its cryptographic signature to bypass SAML authentication security controls. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjYwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2NzcifQ.021EF8idHDndpuaCH7ymdhg6VE3Q8n_znASUeGHO5wo\/s\/1193554985\/br\/87099655821-l\">CVE-2020-1677<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjYxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9rYi5qdW5pcGVyLm5ldC9KU0ExMTA3MiJ9.u7sbPpJ9l4QLmriH9EF-RXDOb2odOv4pYuicJdoyrXA\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><\/td>\n<\/tr>\n<tr>\n<td>united_planet -- united_planet<\/td>\n<td>Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 20.03 allows remote attackers to inject arbitrary web script or HTML via the request parameter.<\/td>\n<td>2020-10-14<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjYyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI0MTg4In0.i19gVcyZLw2wL0Ml2rbD0d91PomyK0uCy7C0lHxV104\/s\/1193554985\/br\/87099655821-l\">CVE-2020-24188<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjYzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9vbmxpbmVoZWxwLnVuaXRlZHBsYW5ldC5jb20vaW50cmV4eC85NDAwL2VuL2luZGV4Lmh0bWw_cD1oZWxwZmlsZXMvaGVscC4zLm9ubGluZXVwZGF0ZS0wMi5odG1sIn0.zgLEku4V2MILsUpMcTFJkODdOU8CaydIgeclXZYDeE4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>veritas -- aptare<\/td>\n<td>Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. An unauthenticated user could login to the application and gain access to the data and functionality accessible to the targeted user account.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI3MTU3In0.ubX-yN77BHB2Z6aGzYfBhcaIGQXOkLhBplMLRPN3NEU\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27157<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cudmVyaXRhcy5jb20vY29udGVudC9zdXBwb3J0L2VuX1VTL3NlY3VyaXR5L1ZUUzIwLTAwNiNpc3N1ZTIifQ.mwQmYnJ9U-dNdd7bns9G-v15N9DDmKvd5060WZT8Qog\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>veritas -- aptare<\/td>\n<td>Veritas APTARE versions prior to 10.5 did not perform adequate authorization checks. This vulnerability could allow for remote code execution by an unauthenticated user.<\/td>\n<td>2020-10-15<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI3MTU2In0.WzPPo9bxj9pZo7-D6eLWgcjQOMq_BeVx5BnUZiCgG4c\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27156<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cudmVyaXRhcy5jb20vY29udGVudC9zdXBwb3J0L2VuX1VTL3NlY3VyaXR5L1ZUUzIwLTAwNiNpc3N1ZTEifQ.gVtGu5mydQkoksCbipRvX7HSMp9GX4AgTQprnb-qR-A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>vm-superio -- vm-superio<\/td>\n<td>In vm-superio before 0.1.1, the serial console FIFO can grow to unlimited memory usage when data is sent to the input source (i.e., standard input). This behavior cannot be reproduced from the guest side. When no rate limiting is in place, the host can be subject to memory pressure, impacting all other VMs running on the same host.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI3MTczIn0.U7Nh2qnCAo1H9WjOzfzF5Fn0hGfOBLcEmyl-BTn6w30\/s\/1193554985\/br\/87099655821-l\">CVE-2020-27173<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjY5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3J1c3Qtdm1tL3ZtLXN1cGVyaW8vaXNzdWVzLzE3In0.3uKYPjp5otYJNTq4rjbn6pb9GorB_yzSqN-_0BzeXkM\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjcwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3J1c3Qtdm1tL3ZtLXN1cGVyaW8vcHVsbC8xOSJ9.MgFrAFWz0oY8O9LmYar9xJAzpRBNVwDMJkhCW-WVO0A\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>vmware -- horizon_client<\/td>\n<td>VMware Horizon Client for Windows (5.x before 5.5.0) contains a denial-of-service vulnerability due to a file system access control issue during install time. Successful exploitation of this issue may allow an attacker to overwrite certain admin privileged files through a symbolic link attack at install time. This will result into a denial-of-service condition on the machine where Horizon Client for Windows is installed.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjcxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTM5OTEifQ.PwQitj1INYZRgUPh0YLav0AVZnM_Euby2OJBgIft2vw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-3991<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjcyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93d3cudm13YXJlLmNvbS9zZWN1cml0eS9hZHZpc29yaWVzL1ZNU0EtMjAyMC0wMDIyLmh0bWwifQ.N4zTI2NTwXVsocWeV03Phoe86QgHnevyU_5asCk14Dw\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>windows -- application_compatibility_client_library<\/td>\n<td>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations, aka 'Windows Application Compatibility Client Library Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16920.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjczLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODc2In0.d3lfmQ-M5GqWum-Qx0OW8vy-T69Z6egYDbQ8MmzYFbc\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16876<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODc2In0.Tc6tlcyeHuEKbmZXcintum4TCzl9_7ESDiKaxGo9A_4\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>windows -- remote_desktop_service<\/td>\n<td>A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Service Denial of Service Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc1LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2ODYzIn0.WOORZKlA9_OCedSVWlOC-xAHqckwtmbw9Upg5TaGwh4\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16863<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc2LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2ODYzIn0.HYcA9YZEj9Y5ZEPAGucUD020wyyw7rYo1OkS6Y15mrc\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>windows --visual_studio_code<\/td>\n<td>A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads a Jupyter notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc3LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE2OTc3In0.Xnzt1u6qzA6UkLv7WzNfNzKFKDY6019mKRDcUUrJf-Q\/s\/1193554985\/br\/87099655821-l\">CVE-2020-16977<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc4LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9wb3J0YWwubXNyYy5taWNyb3NvZnQuY29tL2VuLVVTL3NlY3VyaXR5LWd1aWRhbmNlL2Fkdmlzb3J5L0NWRS0yMDIwLTE2OTc3In0.wN4PXv_anrQ0SId4v32YT3TcikVG88-RgURCqDICAK8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>wordpress -- wordpress<\/td>\n<td>Testimonial Rotator WordPress Plugin 3.0.2 is affected by Cross Site Scripting (XSS) in \/wp-admin\/post.php. If a user intercepts a request and inserts a payload in \"cite\" parameter, the payload will be stored in the database.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjc5LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTI2NjcyIn0.Gp7lH1hzONrS8dfPxIelEmoZY2VmC2JbRr1YAVOWCuw\/s\/1193554985\/br\/87099655821-l\">CVE-2020-26672<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjgwLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly93cHZ1bG5kYi5jb20vdnVsbmVyYWJpbGl0aWVzLzEwMjcyIn0.HspDd0dNnlfQl8PG_PskdM8hIGlFCZcXfi_evfRq6ns\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<tr>\n<td>xwiki -- xwiki<\/td>\n<td>In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6.<\/td>\n<td>2020-10-16<\/td>\n<td width=\"5%\">not yet calculated<\/td>\n<td><a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjgxLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9udmQubmlzdC5nb3YvbnZkLmNmbT9jdmVuYW1lPUNWRS0yMDIwLTE1MjUyIn0.tw_Fj23iJnUrjbdK-nG1Z1oiinvCkAZfqY7j2m3tZlk\/s\/1193554985\/br\/87099655821-l\">CVE-2020-15252<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjgyLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9naXRodWIuY29tL3h3aWtpL3h3aWtpLXBsYXRmb3JtL3NlY3VyaXR5L2Fkdmlzb3JpZXMvR0hTQS01aHY2LW1oOHEtcTl2OCJ9.WFuYxt5sd7ysfEvOT9kEfbs9VwC5RsxLqmGdb4feSIY\/s\/1193554985\/br\/87099655821-l\">CONFIRM<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjgzLCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9qaXJhLnh3aWtpLm9yZy9icm93c2UvWFdJS0ktMTcxNDEifQ.KW5Y49ywyiHshXfpp1dzzLDNXoPAg7dK6U1SDf2WKTY\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><br \/>\n<a href=\"https:\/\/lnks.gd\/l\/eyJhbGciOiJIUzI1NiJ9.eyJidWxsZXRpbl9saW5rX2lkIjoxMjg0LCJ1cmkiOiJicDI6Y2xpY2siLCJidWxsZXRpbl9pZCI6IjIwMjAxMDE5LjI4OTkxMDQxIiwidXJsIjoiaHR0cHM6Ly9qaXJhLnh3aWtpLm9yZy9icm93c2UvWFdJS0ktMTc0MjMifQ.r5SlpBDdWP22oPXdW67MUs_nK-6CpezzEjM-XIP_Bo8\/s\/1193554985\/br\/87099655821-l\">MISC<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6539 alignleft\" src=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/frederico_foto.png\" alt=\"\" width=\"220\" height=\"220\" srcset=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/frederico_foto.png 220w, https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/frederico_foto-150x150.png 150w, https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/frederico_foto-160x160.png 160w\" sizes=\"auto, (max-width: 220px) 100vw, 220px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #333399;\"><strong><br \/>\nFrederico Freitas<\/strong>, CISSP \u00e9 Solutions Sales Engineer na Add Value e especialista em ciberseguran\u00e7a.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Em alguns casos, as vulnerabilidades do Boletim podem n\u00e3o ter pontua\u00e7\u00f5es CVSS atribu\u00eddas ainda. Visite o NVD (https:\/\/nvd.nist.gov\/vuln\/search) para obter informa\u00e7\u00f5es de vulnerabilidade atualizadas, que incluem as pontua\u00e7\u00f5es CVSS assim que estiverem dispon\u00edveis.<\/p>\n<p>Destaque Semanal<\/p>\n<p>O destaque de alerta de vulnerabilidades desta semana vai para os dispositivos de conectividade da Netgear devido a sua popularidade, exposi\u00e7\u00e3o e grau de risco.<\/p>\n<p>Vale destacar que estes dispositivos est\u00e3o geralmente conectados \u00e0 Internet e permitem o acesso remoto, juntando com vulnerabilidades<\/p>\n","protected":false},"author":1,"featured_media":6552,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3],"tags":[132,133,134,130],"class_list":["post-6547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca","tag-cisa","tag-nist","tag-nvd","tag-vulnerabilidade"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Resumo de Vulnerabilidade de Outubro de 2020 - Add Value<\/title>\n<meta name=\"description\" content=\"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Resumo de Vulnerabilidade de Outubro de 2020 - Add Value\" \/>\n<meta property=\"og:description\" content=\"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\" \/>\n<meta property=\"og:site_name\" content=\"Add Value\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T11:02:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T17:21:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"addvalue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"addvalue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"135 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\"},\"author\":{\"name\":\"addvalue\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"headline\":\"Resumo de Vulnerabilidades da Semana de 12 de outubro de 2020\",\"datePublished\":\"2020-10-30T11:02:29+00:00\",\"dateModified\":\"2020-10-30T17:21:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\"},\"wordCount\":27043,\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg\",\"keywords\":[\"CISA\",\"NIST\",\"NVD\",\"vulnerabilidade\"],\"articleSection\":[\"Seguran\u00e7a\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\",\"url\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\",\"name\":\"Resumo de Vulnerabilidade de Outubro de 2020 - Add Value\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg\",\"datePublished\":\"2020-10-30T11:02:29+00:00\",\"dateModified\":\"2020-10-30T17:21:28+00:00\",\"author\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"description\":\"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage\",\"url\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg\",\"contentUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg\",\"width\":650,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/addvalue.com.br\/novo\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resumo de Vulnerabilidades da Semana de 12 de outubro de 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\",\"url\":\"https:\/\/addvalue.com.br\/novo\/\",\"name\":\"Add Value\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\",\"name\":\"addvalue\",\"url\":\"https:\/\/addvalue.com.br\/novo\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Resumo de Vulnerabilidade de Outubro de 2020 - Add Value","description":"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/","og_locale":"pt_BR","og_type":"article","og_title":"Resumo de Vulnerabilidade de Outubro de 2020 - Add Value","og_description":"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.","og_url":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/","og_site_name":"Add Value","article_published_time":"2020-10-30T11:02:29+00:00","article_modified_time":"2020-10-30T17:21:28+00:00","og_image":[{"width":650,"height":350,"url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg","type":"image\/jpeg"}],"author":"addvalue","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"addvalue","Est. tempo de leitura":"135 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#article","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/"},"author":{"name":"addvalue","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"headline":"Resumo de Vulnerabilidades da Semana de 12 de outubro de 2020","datePublished":"2020-10-30T11:02:29+00:00","dateModified":"2020-10-30T17:21:28+00:00","mainEntityOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/"},"wordCount":27043,"image":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg","keywords":["CISA","NIST","NVD","vulnerabilidade"],"articleSection":["Seguran\u00e7a"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/","url":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/","name":"Resumo de Vulnerabilidade de Outubro de 2020 - Add Value","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/#website"},"primaryImageOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage"},"image":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg","datePublished":"2020-10-30T11:02:29+00:00","dateModified":"2020-10-30T17:21:28+00:00","author":{"@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"description":"O Boletim Semanal de Resumo de Vulnerabilidade CISA \u00e9 criado usando informa\u00e7\u00f5es do NIST NVD. Clique no link e saiba mais.","breadcrumb":{"@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#primaryimage","url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg","contentUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2020\/10\/vulnerabilidades.jpg","width":650,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/addvalue.com.br\/novo\/seguranca\/resumo_vulnerabilidade\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/addvalue.com.br\/novo\/"},{"@type":"ListItem","position":2,"name":"Resumo de Vulnerabilidades da Semana de 12 de outubro de 2020"}]},{"@type":"WebSite","@id":"https:\/\/addvalue.com.br\/novo\/#website","url":"https:\/\/addvalue.com.br\/novo\/","name":"Add Value","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e","name":"addvalue","url":"https:\/\/addvalue.com.br\/novo\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/comments?post=6547"}],"version-history":[{"count":4,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6547\/revisions"}],"predecessor-version":[{"id":6556,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6547\/revisions\/6556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media\/6552"}],"wp:attachment":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media?parent=6547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/categories?post=6547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/tags?post=6547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}