| CVE, Title, Vendor | 
			Description | 
			CVSS v3.1 Base Score | 
			Date Created | 
			Date Updated | 
		
		
			
			CVE-2020-1300
			Microsoft Windows Remote Code Execution Vulnerability
			Microsoft
			 | 
			A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files. To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver. | 
			CVSSv3BaseScore:7.8(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | 
			06/09/2020 | 
			06/16/2020 | 
		
		
			
			CVE-2020-1206
			Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability
			Microsoft
			 | 
			An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a target. | 
			CVSSv3BaseScore:8.6(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) | 
			06/09/2020 | 
			06/12/2020 | 
		
		
			
			CVE-2020-1054
			Microsoft Win32k Elevation of Privilege Vulnerability
			Microsoft
			 | 
			An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. | 
			CVSSv3BaseScore:7.0(AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | 
			05/21/2020 | 
			05/27/2020 | 
		
		
			
			CVE-2020-5410
			Spring Cloud Config Directory Traversal Vulnerability
			VMWare
			 | 
			Spring Cloud Config allows applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. | 
			CVSSv3BaseScore:7.5(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | 
			06/02/2020 | 
			06/04/2020 | 
		
		
			
			CVE-2020-1301
			Microsoft Windows SMB Authenticated Remote Code Execution Vulnerability
			Microsoft
			 | 
			A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability an authenticated attacker could send a specially crafted packet to a targeted SMBv1 server. | 
			CVSSv3BaseScore:7.5(AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | 
			06/09/2020 | 
			06/15/2020 | 
		
		
			
			CVE-2020-1181
			Microsoft SharePoint Server Remote Code Execution Vulnerability
			Microsoft
			 | 
			A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls. An authenticated attacker who successfully exploited the vulnerability could use a specially crafted page to perform actions in the security context of the SharePoint application pool process. To exploit the vulnerability, an authenticated user must create and invoke a specially crafted page on an affected version of Microsoft SharePoint Server. | 
			CVSSv3BaseScore:8.8(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | 
			06/09/2020 | 
			06/12/2020 | 
		
		
			
			CVE-2020-0796
			Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability
			Microsoft
			 | 
			A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. | 
			CVSSv3BaseScore:10.0(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) | 
			03/12/2020 | 
			06/11/2020 | 
		
		
			
			CVE-2020-13160
			AnyDesk UDP Discovery Remote Code Execution Vulnerability
			AnyDesk
			 | 
			A format string vulnerability exists in AnyDesk that can be exploited for remote code execution. By sending a single UDP packet to the target machine, an attacker can successfully exploit the discovered format string vulnerability to gain Remote Code Execution. | 
			CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | 
			06/09/2020 | 
			06/11/2020 | 
		
		
			
			CVE-2018-13379
			Fortinet FortiOS Directory Traversal Vulnerability
			Fortinet
			 | 
			Fortinet FortiOS is exposed to a directory traversal vulnerability because it fails to properly sanitize user supplied input. A path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests. | 
			CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | 
			06/04/2019 | 
			01/22/2020 |