{"id":22216,"date":"2024-01-24T11:46:44","date_gmt":"2024-01-24T10:46:44","guid":{"rendered":"https:\/\/herolab.usd.de\/security-advisories-archiv\/"},"modified":"2024-01-24T12:27:25","modified_gmt":"2024-01-24T11:27:25","slug":"security-advisories-archive","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories-archive\/","title":{"rendered":"Security Advisories - Archiv"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#2E353D\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"37px||37px||true|\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.24.0\" _module_preset=\"default\" header_text_align=\"center\" header_text_color=\"#86CCCF\" global_colors_info=\"{}\"]<\/p>\n<h1>Security Advisories - Archive<\/h1>\n<p>&nbsp;<\/p>\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n<p>Our<span>\u00a0<\/span><a href=\"https:\/\/www.usd.de\/en\/cst-academy\/\" target=\"_blank\" rel=\"noopener\">CST Academy<\/a><span>\u00a0<\/span>and the usd HeroLab are essential parts of our security mission. We share the knowledge we gain in our practical work and our research through training courses and publications. In this context, the usd HeroLab publishes a series of papers on current vulnerabilities and security issues. \u2013 always in line with our<span>\u00a0<\/span><a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\">Responsible Disclosure Policy<\/a>.<\/p>\n<p>Always in the name of our mission: \u201cmore security\u201d.<\/p>\n<p>An overview of the current Security Advisories can be found <a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/\">here<\/a>. Below you will find the Security Advisories of the last years:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>12\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" admin_label=\"Akkordeon\" _builder_version=\"4.19.2\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0042 | GitLab Community Edition\" _builder_version=\"4.19.2\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: GitLab Community Edition<br \/>Vulnerability Type: <span>Uncontrolled Search Path Element (CWE-427)<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0042\/\">usd-2022-0042<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>11\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" admin_label=\"Akkordeon\" _builder_version=\"4.18.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0008 | Acronis Cyber Protect\" _builder_version=\"4.18.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Acronis Cyber Protect<br \/>Vulnerability Type: Authentication Bypass (CWE-305)<span>\u00a0<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0008\/\">usd-2022-0008<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" admin_label=\"Akkordeon\" _builder_version=\"4.18.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" saved_tabs=\"all\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0035 | Apache Tomcat\" _builder_version=\"4.18.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: <span>Apache Tomcat<\/span><br \/>Vulnerability Type: <span>\u00a0Improper Encoding or Escaping of Output (CWE-116)<\/span><span>\u00a0<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0035\/\">usd-2022-0035<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" admin_label=\"Akkordeon\" _builder_version=\"4.18.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0036 | Apache Tomcat\" _builder_version=\"4.18.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: <span>Apache Tomcat<\/span><br \/>Vulnerability Type: <span> Improper Restriction of XML External Entity Reference (CWE-611)<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0036\/\">usd-2022-0036<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>10\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.18.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0009 | Filerun\" _builder_version=\"4.18.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: <span>Filerun<\/span><br \/>Vulnerability Type: <span>CWE-79: Improper Neutralization of Input During Web Page Generation<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0009\/\">usd-2022-0009<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.18.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2022-0010 | Filerun\" _builder_version=\"4.18.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Filerun<br \/>Vulnerability Type: CWE-284: Improper Access Control<\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2022-0010\/\">usd-2022-0010<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>07\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.17.4\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0027 | CleverReach\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]Product: <span>CleverReach<\/span><br \/>\nVulnerability Type: <span>CWE-288: Authentication Bypass Using an Alternate Path or Channel<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0027\/\">usd-2021-0027<\/a>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.17.4\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0031 (CVE-2022-22689) | CA Harvest Software Change Manager\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]Product: CA Harvest Software Change Manager<br \/>\nVulnerability Type: CWE-1236: Improper Neutralization of Formula Elements in a CSV File<\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0031\/\">usd-2021-0031<\/a>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.17.4\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>06\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.17.4\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0010 | Vodafone Station\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]Product: Vodafone Station<br \/>\nVulnerability Type: CWE-284: Improper Access Control<span><br \/>\n<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0010\/\">usd-2021-0010<\/a>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_text _builder_version=\"4.17.4\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>05\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.17.4\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0025 (CVE-2021-41766) | Apache Karaf\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]Product: Apache Karaf<br \/>\nVulnerability Type: CWE-502: Deserialization of Untrusted Data<span><br \/>\n<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0025\/\">usd-2021-0025<\/a>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>04\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0028 (CVE-2022-25241) | Filecloud\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Filecloud<br \/>Vulnerability Type: <span>CWE-352: Cross-Site Request Forgery (CSRF)<br \/><\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0028\/\">usd-2021-0028<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0029 (CVE-2022-25242) | Filecloud \" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Filecloud<br \/>Vulnerability Type: <span>CWE-352: Cross-Site Request Forgery (CSRF)<br \/><\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0029\/\">usd-2021-0029<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>03\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16.1\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0050 (CVE-2019-17085) |  Micro Focus HPE Operations Agent \" _builder_version=\"4.16.1\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]Product: Micro Focus HPE Operations Agent<br \/>\nVulnerability Type: <span>CWE-611 Improper Restriction of XML External Entity Reference<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2019-0050\/\">usd-2019-0050<\/a>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>02\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0019 | Zulip\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Zulip Server<br \/>Vulnerability Type: <span>CWE-918: Server-Side Request Forgery (SSRF)<br \/><\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0019\/\">usd-2021-0019<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0034 (CVE-2022-23961) | Thruk Monitoring\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Thruk Monitoring<br \/>Vulnerability Type: <span>CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')<br \/><\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0034\/\">usd-2021-0034<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>01\/2022<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0023 | Grafana\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Grafana<br \/>Vulnerability Type: <span>CWE-20: Improper Input Validation<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0023\/\">usd-2021-0023<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0024 | Grafana\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Grafana<br \/>Vulnerability Type: <span>CWE-20: Improper Input Validation<\/span><\/p>\n<p>More details: <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2021-0024\/\">usd-2021-0024<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>12\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0009 | VMware Workspace ONE Intelligent Hub\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: VMware Workspace ONE Intelligent Hub<br \/>Vulnerability Type: Hidden Functionality (Backdoor)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0009\/\">usd-2021-0009<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>11\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0032 | SUSE CVE Database (suse.com)\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: SUSE CVE database<br \/>Vulnerability Type: Cross-site Scripting (XSS)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0032\/\">usd-2021-0032<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0006 (CVE-2021-28376) | ChronoEngine ChronoForms v7\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: ChronoEngine Forms v7<br \/>Vulnerability Type: Path Traversal<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0006\/\">usd-2021-0006<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0007 (CVE-2021-28377) | ChronoEngine ChronoForums\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: ChronoEngine Forums<br \/>Vulnerability Type: Path Traversal<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0007\/\">usd-2021-0007<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0106 (CVE-2021-25273) | Sophos UTM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Sophos UTM<br \/>Vulnerability Type: Cross-site Scripting (XSS)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0106\/\">usd-2020-0106<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>10\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0020 | Microsoft Exchange Server ECP\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Microsoft Exchange Server<br \/>Vulnerability Type: Server-side Request Forgery (SSRF)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0020\/\">usd-2021-0020<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>09\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0002 | EgoSecure Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: EgoSecure Agent<br \/>Vulnerability Type: Symlink Vulnerability<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0002\/\">usd-2021-0002<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0105 | Cornerstone Editor\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Themeco Cornerstone Editor<br \/>Vulnerability Type: Stored Cross-Site Scripting<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0105\/\">usd-2020-0105<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>08\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0012 | TIBCO ActiveMatrix BusinessWorks\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: TIBCO BusinessWorks<br \/>Vulnerability Type: Weak Password Requirements<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0012\/\">usd-2021-0012<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>07\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0015 (CVE-2021-33617) | Password Manager Pro\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Password Manager Pro<br \/>Vulnerability Type: User Enumeration<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0015\/\">usd-2021-0015<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0016 | Keycloak\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Keycloak<br \/>Vulnerability Type: Multi-Factor-Authentication Brute-Force<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0016\/\">usd-2021-0016<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>06\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0021 | Microsoft Exchange Server OWA\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Microsoft Exchange Server OWA<br \/>Vulnerability Type: Server-Side Request Forgery (SSRF)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0021\/\">usd-2021-0021<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0011 (CVE-2021-32718) | RabbitMQ\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: RabbitMQ<br \/>Vulnerability Type: Cross-Site Scripting<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0011\/\">usd-2021-0011<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>05\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0008 (CVE-2021-21990) | VMWare Workspace ONE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: VMWare Workspace ONE<br \/>Vulnerability Type: Cross-site Scripting<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0008\/\">usd-2021-0008<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0014 (CVE-2021-3485) | Bitdefender Endpoint Security Tools for Linux\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitdefender Endpoint Security Tools for Linux<br \/>Vulnerability Type: Improper Input Validation<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0014\/\">usd-2021-0014<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>04\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0001 | Microsoft Windows\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Windows 10<br \/>Vulnerability Type: Symlink Vulnerability<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0001\/\">usd-2021-0001<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>03\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2021-0005 (CVE-2021-30356) | Check Point Identity Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Check Point Identity Agent, Affected Version: &lt; R81.018.0000<br \/>Vulnerability Type: Symlink Vulnerability<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2021-0005\/\">usd-2021-0005<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>02\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0069 | Zen Cart\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Zen Cart, Affected Version: 1.5.6d<br \/>Vulnerability Type: XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0069\/\">usd-2019-0069<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0072 (CVE-2020-6577) | IT-Recht Kanzlei Plugin for Zen Cart\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: IT-Recht Kanzlei Plugin for Zen Cart, Affected Version: v1.5.6c (Zen Cart deutsch version)<br \/>Vulnerability Type: SQL Injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0072\/\">usd-2019-0072<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>01\/2021<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0028 (CVE-2021-28042) | Mailoptimizer\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Mailoptimizer, Affected Version: 4.3<br \/>Vulnerability Type: Path Traversal<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0028\/\">usd-2020-0028<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>10\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0026 (CVE-2020-27976) | OScommerce Phoenix CE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: OScommerce Phoenix CE, Affected Version: 1.0.5.4<\/span><br \/><span>Vulnerability Type: Authenticated RCE<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0026\/\">usd-2020-0026<\/a><span> (CVE-2020-27976)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0027 (CVE-2020-27975) | OScommerce Phoenix CE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: OScommerce Phoenix CE, Affected Version: &lt; 1.0.5.4<\/span><br \/><span>Vulnerability Type: Cross Site Request Forgery (CSRF<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0027\/\">usd-2020-0027<\/a><span> (CVE-2020-27975)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0029 (CVE-2020-27974) | NeoPost Mail Accounting Software Pro\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: NeoPost Mail Accounting Software Pro, Affected Version: 5.0.6<\/span><br \/><span>Vulnerability Type: Reflected XSS<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0029\/\">usd-2020-0029<\/a><span> (CVE-2020-27974)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0030 (CVE-2020-1455 ) | SQL Server Management Studio\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: SQL Server Management Studio (SSMS), Affected Version: 18.4<\/span><br \/><span>Vulnerability Type: Symbolic Link Vulnerability<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0030\/\">usd-2020-0030<\/a><span> (CVE-2020-1455)<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>09\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0048 (CVE-2020-24708) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: Stored Cross-Site Scripting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0048\/\">usd-2020-0048<\/a><span> (CVE-2020-24708)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0049 (CVE-2020-24709) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: Stored Cross-Site Scripting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0049\/\">usd-2020-0049<\/a><span> (CVE-2020-24709)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0050 (CVE-2020-24712) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: non-persistent self Cross-Site Scripting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0050\/\">usd-2020-0050<\/a><span> (CVE-2020-24712)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0051 (CVE-2020-24711) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: Improper Restriction of Rendered UI Layers or Frames<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0051\/\">usd-2020-0051<\/a><span> (CVE-2020-24711)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0052 (CVE-2020-24707) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: CSV Injection<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0052\/\">usd-2020-0052<\/a><span> (CVE-2020-24707)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0053 (CVE-2020-24713) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: Insufficient Session Expiration<\/span><\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0053\/\">usd-2020-0053<\/a> (CVE-2020-24713)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0054 (CVE-2020-24710) | Gophish\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Gophish, Affected Version: v0.10.1<\/span><br \/><span>Vulnerability Type: Stored Cross-Site Scripting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0054\/\">usd-2020-0054<\/a><span> (CVE-2020-24710)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0059 (CVE-2020-15862) | Net-SNMP\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Net-SNMP, Affected Version: 5.7.3<\/span><br \/><span>Vulnerability Type: Elevation of Privileges<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0059\/\">usd-2020-0059<\/a><span> (CVE-2020-15862)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0060 (CVE-2020-15861) | Net-SNMP\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Net-SNMP, Affected Version: 5.7.3<\/span><br \/><span>Vulnerability Type: Elevation of Privileges<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0060\/\">usd-2020-0060<\/a><span> (CVE-2020-15861)<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>07\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0023 (CVE-2020-14170) | Bitbucket Server\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket Server, Affected Version: 5.4.0 &lt;= version &lt; 7.3.1<br \/>Vulnerability Type: Server Side Request Forgery<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0023\/\">usd-2020-0023<\/a> (CVE-2020-14170)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0024 (CVE-2020-14171) | Bitbucket Server\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket Server, Affected Version: 4.9.0 &lt;= version &lt; 7.2.4<br \/>Vulnerability Type: Unencrypted Service<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0024\/\">usd-2020-0024<\/a> (CVE-2020-14171)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0041 (CVE-2020-11476) | Concrete5 CMS\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Concrete5 CMS, Affected Version: 8.5.2<br \/>Vulnerability Type: Unrestricted Upload of File with Dangerous Type<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0041\/\">usd-2020-0041<\/a> (CVE-2020-11476)<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>06\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0038 (CVE-2020-11474) | NCP Secure Enterprise Windows Client\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: NCP Secure Enterprise Windows Client, Affected Version: 10.14<br \/>Vulnerability Type: Privileged File Write<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0038\/\">usd-2020-0038<\/a> (CVE-2020-11474)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0031 (CVE-2020-10984) | Gambio GX\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Gambio GX, Affected Version: 4.0.0.0<br \/>Vulnerability Type: Cross-Site-Request-Forgery (CSRF)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0031\/\">usd-2020-0031<\/a> (CVE-2020-10984)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0033 (CVE-2020-10982) | Gambio GX\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef422aec\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef422aec\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef422aec\">\n<div class=\"x-accordion-inner\">\n<p>Product: Gambio GX, Affected Version: 4.0.0.0<br \/>Vulnerability Type: Blind SQL Injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2020-0033\/\">usd-2020-0033<\/a> (CVE-2020-10982)<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"x-accordion-group\">\n<div class=\"x-accordion-heading\"><\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0034 (CVE-2020-10983) | Gambio GX\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef422aec\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef422aec\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef422aec\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: Gambio GX, Affected Version: 4.0.0.0<\/span><br \/><span>Vulnerability Type: Blind SQL Injection<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0034\/\">usd-2020-0034<\/a><span> (CVE-2020-10983)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0035 (CVE-2020-10985) | Gambio GX\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef422aec\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef422aec\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef422aec\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: Gambio GX, Affected Version: 4.0.0.0<\/span><br \/><span>Vulnerability Type: Stored Cross-Site Scripting (XSS)<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0035\/\">usd-2020-0035<\/a><span> (CVE-2020-10985)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0016 (CVE-2020-5836) | Symantec Endpoint Protection\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef422aec\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef422aec\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef422aec\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: Symantec Endpoint Protection, Affected Version: 14.2.2.1<\/span><br \/><span>Vulnerability Type: Hardlink Vulnerability<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0016\/\">usd-2020-0016<\/a><span> (CVE-2020-5836)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>04\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0057 (CVE-2019-19213) | Userlike Chat\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Userlike Chat, Vulnerability Type: Cross-Site Scripting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0057\/\">usd-2019-0057<\/a><span> (CVE-2019-19213)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0058 (CVE-2019-19214) | Userlike Chat\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Userlike Chat, Vulnerability Type: Insufficient Filtering<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0058\/\">usd-2019-0058<\/a><span> (CVE-2019-19214)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0059 (CVE-2019-19217) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Control-M\/Agent, Affected Version: 7.0.00.000<\/span><br \/><span>Vulnerability Type: OS Command Injection<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0059\/\">usd-2019-0059<\/a><span> (CVE-2019-19217)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0060 ( CVE-2019-19216) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Control-M\/Agent, Affected Version: 7.0.00.000<\/span><br \/><span>Vulnerability Type: Insecure File Copy<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0060\/\">usd-2019-0060<\/a><span> (CVE-2019-19216)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0061 (CVE-2019-19215) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Control-M\/Agent, Affected Version: 7.0.00.000<\/span><br \/><span>Vulnerability Type: Remote Buffer Overflow<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0061\/\">usd-2019-0061<\/a><span> (CVE-2019-19215)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0064 (CVE-2019-19220) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Control-M\/Agent, Affected Version: 7.0.00.000<\/span><br \/><span>Vulnerability Type: OS Command Injection<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0064\/\">usd-2019-0064<\/a><span> (CVE-2019-19220)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0065 (CVE-2019-19219) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef423205\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef423205\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef423205\">\n<div class=\"x-accordion-inner\">\n<p>Product: Control-M\/Agent, Affected Version: 7.0.00.000<br \/>Vulnerability Type: Arbitrary File Download<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0065\/\">usd-2019-0065<\/a> (CVE-2019-19219)<\/div>\n<\/div>\n<\/div>\n<div class=\"x-accordion-group\">\n<div class=\"x-accordion-heading\"><\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0066 (CVE-2019-19218) | Control-M\/Agent\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef423205\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef423205\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef423205\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: Control-M\/Agent, Affected Version: 7.0.00.000<\/span><br \/><span>Vulnerability Type: Insecure Password Storage<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0066\/\">usd-2019-0066<\/a><span> (CVE-2019-19218)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0068 | Chocolatey Python 3 package\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef423205\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef423205\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef423205\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: Python 3 package for chocolatey, Affected Version: 3.8.1<\/span><br \/><span>Vulnerability Type: Weak File Permissions<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0068\/\">usd-2019 -0068<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0070 (CVE-2020-6579) | MailBeez Plugin for ZenCart\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef423205\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef423205\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef423205\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: MailBeez Plugin for ZenCart, Affected Version: v3.9.21<\/span><br \/><span>Vulnerability Type: XSS<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0070\/\">usd-2019-0070<\/a><span> (CVE-2020-6579)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0006 (CVE-2020-10515) | STARFACE UCC Client\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<div class=\"x-accordion-group\">\n<div id=\"panel-60e2fef423205\" class=\"x-accordion-body\" role=\"tabpanel\" data-x-toggle-collapse=\"1\" data-x-toggleable=\"60e2fef423205\" aria-hidden=\"false\" aria-labelledby=\"tab-60e2fef423205\">\n<div class=\"x-accordion-inner\">\n<p><span>Product: STARFACE UCC Client, Affected Version: v6.7.0.180<\/span><br \/><span>Vulnerability Type: Binary Planting<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0006\/\">usd- 2020-0006<\/a><span> (CVE-2020-10515)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>02\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0001 (CVE-2020-6582) | Nagios NRPE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Nagios NRPE, Affected Version: v.3.2.1<\/span><br \/><span>Vulnerability Type: Memory Corruption (Heap Overflow)<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0001\/\">usd-2020-0001<\/a><span> (CVE-2020-6582)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0002 (CVE-2020-6581) | Nagios NRPE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Nagios NRPE, Affected Version: v.3.2.1<\/span><br \/><span>Vulnerability Type: Insufficient Filtering of Configuration file<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0002\/\">usd-2020-0002<\/a><span> (CVE-2020-6581)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0003 | Nagios NRPE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Nagios NRPE, Affected Version: v.3.2.1<\/span><br \/><span>Vulnerability Type: Wrong Packet Size Computation<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0003\/\">usd-2020-0003<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2020-0004 | Nagios NRPE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Nagios NRPE, Affected Version: v.3.2.1<\/span><br \/><span>Vulnerability Type: Logic Error<\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2020-0004\/\">usd-2020-0004<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>01\/2020<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0049 (CVE-2019-19208) | Codiad Web IDE\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Codiad Web IDE, Affected Version: v.2.8.4<\/span><br \/><span>Vulnerability Type: PHP Code injection <\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0049\/\">usd-2019-0049<\/a><span> (CVE-2019-19208)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0051 (CVE-2019-19209) | Dolibarr ERP\/CRM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Dolibarr ERP\/CRM, Affected Version: 3.0 \u2013 10.0.3<\/span><br \/><span>Vulnerability Type: Reflected XSS, SQL injection <\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0051\/\">usd-2019-0051<\/a><span> (CVE-2019-19209)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0052 (CVE-2019-19210)| Dolibarr ERP\/CRM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Dolibarr ERP\/CRM, Affected Version: 3.0 \u2013 10.0.3 <\/span><br \/><span>Vulnerability Type: Stored XSS <\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0052\/\">usd-2019-0052<\/a><span> (CVE-2019-19210)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0053 (CVE-2019-19211)| Dolibarr ERP\/CRM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Dolibarr ERP\/CRM, Affected Version: 3.0 \u2013 10.0.4 <\/span><br \/><span>Vulnerability Type: Reflected XSS <\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0053\/\">usd-2019-0053<\/a><span> (CVE-2019-19211)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0054 (CVE-2019-19212)| Dolibarr ERP\/CRM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Dolibarr ERP\/CRM, Affected Version: 3.0 \u2013 10.0.3<br \/>Vulnerability Type: SQL injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0054\/\">usd-2019-0054<\/a> (CVE-2019-19212)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0067 | Dolibarr ERP\/CRM\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p><span>Product: Dolibarr ERP\/CRM, Affected Version: 3.0 \u2013 10.0.4 <\/span><br \/><span>Vulnerability Type: SQL injection <\/span><\/p>\n<p><span>More details: <\/span><a href=\"\/security-advisories\/usd-2019-0067\/\">usd-2019-0067<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>10\/2019<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0016 (CVE-2019-15005) | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: &lt; v6.6 <br \/>Vulnerability Type: Broken Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0016\/\">usd-2019-0016<\/a> (<span>CVE-2019-15005)<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0045 (CVE-2019-6179) | XClarity\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: XClarity, Affected Version: 2.2.0 <br \/>Vulnerability Type: XML External Entity Processing<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0045\/\">usd-2019-0045<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0046 (CVE-2019-12331) | PhpSpreadsheet\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: PhpSpreadsheet, Affected Version: &lt;1.8.0 <br \/>Vulnerability Type: XML External Entity (XXE)<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0046\/\">usd-2019-0046<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>07\/2019<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0001 | Adobe Experience Manager (AEM)\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Adobe Experience Manager (AEM), Affected Version: 6.3.2.2<br \/>Vulnerability Type: Code Injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0001\/\">usd-2019-0001<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0002 | feeling4design Super Forms\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: feeling4design Super Forms, Affected Version: Drag &amp; Drop Form Builder\/1.0.0 \u2013 4.4.8<br \/>Vulnerability Type: Path Traversal<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0002\/\">usd-2019-0002<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0003 | feeling4design Super Forms\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: feeling4design Super Forms, Affected Version: Drag &amp; Drop Form Builder\/1.6.1 \u2013 4.4.8<br \/>Vulnerability Type: Missing Server Side File Type Validation<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0003\/\">usd-2019-0003<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0014 (CVE-2019-2709) | Oracle Transportation Management (OTM)\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Oracle Transportation Management (OTM), Affected Version: 6.4.3<br \/>Vulnerability Type: Reflected XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0014\/\">usd-2019-0014<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0015 | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: 5.10.1<br \/>Vulnerability Type: Broken Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0015\/\">usd-2019-0015<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0017 | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: 5.10.1<br \/>Vulnerability Type: Sensitive Data Exposure\/Credentials Disclosure<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0017\/\">usd-2019-0017<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0018 | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: 5.10.1<br \/>Vulnerability Type: User Enumeration<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0018\/\">usd-2019-0018<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0019 | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: 5.10.1<br \/>Vulnerability Type: File Enumeration<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0019\/\">usd-2019-0019<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2019-0020 | Bitbucket\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Bitbucket, Affected Version: 5.10.1<br \/>Vulnerability Type: Sensitive Data in URL<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2019-0020\/\">usd-2019-0020<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>01\/2019<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0032 | Riverbed SteelCentral AppResponse\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Riverbed SteelCentral AppResponse, Affected Version: 9.6<br \/>Vulnerability Type: Reflected Cross-Site-Scripting Vulnerability<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0032\/\">usd-2018-0032<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0034 | Dropbear\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Dropbear, Affected Version: current master branch (commit cb945f9f670e95305c7c5cc5ff344d1f2707b602)<br \/>Vulnerability Type: Username Enumeration<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0034\/\">usd-2018-0034<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0035 | Cisco Unified Communications Manager\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Cisco Unified Communications Manager, Affected Version: 11.5.1.15900-18 (likely in all versions)<br \/>Vulnerability Type: Exposure of Sensitive Configuration Data<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0035\/\">usd-2018-0035<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0036 | Cisco Unified Communications Manager\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Cisco Unified Communications Manager, Affected Version: 11.5.1.15900-18 (likely in all versions)<br \/>Vulnerability Type: Exposure of Sensitive Configuration Data<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0036\/\">usd-2018-0036<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0037 | Cisco Unified Communications Manager\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Cisco Unified Communications Manager, Affected Version: 11.5.1.15900-18 (likely in all versions)<br \/>Vulnerability Type: Exposure of Sensitive Configuration Data<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0037\/\">usd-2018-0037<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0038 | Cisco Unified Communications Manager\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Cisco Unified Communications Manager, Affected Version: 11.5.1.15900-18 (likely in all versions)<br \/>Vulnerability Type: Exposure of Sensitive Configuration Data<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0038\/\">usd-2018-0038<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>12\/2018<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0024 | Shpock App\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Shpock App, Affected Version: Shpock App for Andriod &amp; Iphone<br \/>Vulnerability Type: Username Enumeration<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0024\/\">usd-2018-0024<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0025 (CVE-2018-7750) | SEP sesam\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: SEP sesam, Affected Version: 4.4.3.61<br \/>Vulnerability Type: Authentication Bypass<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0025\/\">usd-2018-0025<\/a> (CVE-2018-7750)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0026 (CVE-2018-18245) | Nagios Core\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Nagios Core, Affected Version: 4.4.2<br \/>Vulnerability Type: Stored XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0026\/\">usd-2018-0026<\/a> (CVE-2018-18245)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0027 (CVE-2018-18246) | Icinga Web 2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Icinga Web 2, Affected Version: 2.6.1<br \/>Vulnerability Type: CSRF<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0027\/\">usd-2018-0027<\/a> (CVE-2018-18246)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0028 (CVE-2018-18248) | Icinga Web 2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Icinga Web 2, Affected Version: 2.6.1<br \/>Vulnerability Type: Reflected XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0028\/\">usd-2018-0028<\/a> (CVE-2018-18248)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0029 (CVE-2018-18247) | Icinga Web 2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Icinga Web 2, Affected Version: 2.6.1<br \/>Vulnerability Type: Stored XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0029\/\">usd-2018-0029<\/a> (CVE-2018-18247)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0030 (CVE-2018-18249, CVE-2018-18250) | Icinga Web 2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Icinga Web 2, Affected Version: 2.6.1<br \/>Vulnerability Type: Denial of Service, Sensitive Data disclosure<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0030\/\">usd-2018-0030<\/a> (CVE-2018-18249, CVE-2018-18250)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0031 (CVE-2018-13376) | Fortigate 900D\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Fortigate 900D, Affected Version: FW: V. 5.6.2 Build 1486 (GA)<br \/>Vulnerability Type: Sensitive Data disclosure<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0031\/\">usd-2018-0031<\/a> (CVE-2018-13376)<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>11\/2018<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0023 (CVE-2018-1000805) | Paramiko\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Paramiko , Affected Version: 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6<br \/>Vulnerability Type: Authentication Bypass<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0023\/\">usd-2018-0023<\/a> (CVE-2018-1000805)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0021 (CVE-2018-15498) | SafeQ Pro SmartCard v2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: SafeQ Pro SmartCard v2, Affected Version: V2<br \/>Vulnerability Type: Replay Attack<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0021\/\">usd-2018-0021<\/a> (CVE-2018-15498)<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0020 (CVE-2018-18473) | Patlite\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Patlite, Affected Version: NBM-D88N, Patlite NHL-3FB1, Patlite NHL-3FV1N<br \/>Vulnerability Type: Backdoor<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0020\/\">usd-2018-0020<\/a> (CVE-2018-18473)<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>07\/2018<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0013 | Lexware professional 2017\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Lexware professional 2017 , Affected Version: 17.02<br \/>Vulnerability Type: Improper Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0013\/\">usd-2018-0013<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0014 | Lexware professional 2017\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Lexware professional 2017, Affected Version: 17.02<br \/>Vulnerability Type: Improper Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0014\/\">usd-2018-0014<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0015 | Lexware professional 2017\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Lexware professional 2017, Affected Version: 17.02<br \/>Vulnerability Type: Improper Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0015\/\">usd-2018-0015<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0016 | Lexware professional 2017\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Lexware professional 2017, Affected Version: 17.02<br \/>Vulnerability Type: Denial of Service<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0016\/\">usd-2018-0016<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0017 | Lexware professional 2017\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Lexware professional 2017, Affected Version: 17.02<br \/>Vulnerability Type: Broken Authentication<\/p>\n<p>Download: <a href=\"\/security-advisories\/usd-2018-0017\/\">usd-2018-0017<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>06\/2018<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0006 | FirstSpirit SiteArchitect\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: FirstSpirit SiteArchitect, Affected Version: 5.2<br \/>Vulnerability Type: Path Traversal<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0006\/\">usd-2018-0006<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0012 | FirstSpirit SiteArchitect\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: FirstSpirit SiteArchitect, Affected Version: 5.2<br \/>Vulnerability Type: Improper Access Control<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0012\/\">usd-2018-0012<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0019 (CVE-2018-6462) | Pdf-Xchange Viewer\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Pdf-Xchange Viewer, Affected Version: 2.5.322.7 and earlier, Vulnerability Type: Heap Overflow<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0019\/\">usd-2018-0019<\/a> (CVE-2018-6462)<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" header_3_text_color=\"#86CCCF\" custom_margin=\"||17px|||\" global_colors_info=\"{}\"]<\/p>\n<h3><span>05\/2018<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=\"#FFFFFF\" _builder_version=\"4.16\" _module_preset=\"d2e90c1c-0b39-43e7-a467-906cd6c87989\" global_colors_info=\"{}\" open_toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"off|desktop\" toggle_text_color__hover=\"#F07F1D\" toggle_text_color__hover_enabled=\"off|desktop\"][et_pb_accordion_item title=\"!!nicht bearbeiten!!\" open=\"on\" open_toggle_text_color=\"#2E353D\" _builder_version=\"4.16\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" toggle_text_color=\"#2E353D\" toggle_font=\"||||||||\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0001 | Starface\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Starface, Affected Version: 6.4.3.34<br \/>Vulnerability Type: Reflected XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0001\/\">usd-2018-0001<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0002 | Starface\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Starface, Affected Version: 6.4.3.34<br \/>Vulnerability Type: Language Expression Injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0002\/\">usd-2018-0002<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0003 | Starface\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Starface, Affected Version: 6.4.3.34<br \/>Vulnerability Type: SQL Injection<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0003\/\">usd-2018-0003<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0004 | Starface\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Starface, Affected Version: 6.4.3.34<br \/>Vulnerability Type: Cross-site request forgery<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0004\/\">usd-2018-0004<\/a><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"usd-2018-0018 | Projektron BCS\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" open=\"off\"]<\/p>\n<p>Product: Projektron BCS, Affected Version: All versions before 7.38.45, Vulnerability Type: Reflected XSS<\/p>\n<p>More details: <a href=\"\/security-advisories\/usd-2018-0018\/\">usd-2018-0018<\/a><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Advisories - Archive &nbsp; In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22216","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=22216"}],"version-history":[{"count":6,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22216\/revisions"}],"predecessor-version":[{"id":22229,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/22216\/revisions\/22229"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=22216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}