| CVE, Title, Vendor | 
			Description | 
			CVSS v3.1 Base Score | 
			Date Created | 
			Date Updated | 
		
		
			
			CVE-2020-3187
			Cisco ASA Software and FTD Software Web Services Path Traversal Vulnerability
			Cisco
			 | 
			A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. | 
			CVSSv3BaseScore:9.1(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | 
			05/06/2020 | 
			07/29/2020 | 
		
		
			
			CVE-2020-3452
			Cisco ASA Software and FTD Software Web Services Read-Only Path Traversal Vulnerability
			Cisco
			 | 
			A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. | 
			CVSSv3BaseScore:7.5(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | 
			07/22/2020 | 
			07/29/2020 | 
		
		
			
			CVE-2020-8163
			Ruby On Rails Remote Code Execution Vulnerability
			Ruby On Rails
			 | 
			The is a code injection vulnerability that would allow an attacker who controlled the "locals" argument of a "render" call to perform a remote code execution vulnerability. | 
			CVSSv3BaseScore:8.8(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | 
			07/02/2020 | 
			07/27/2020 | 
		
		
			
			CVE-2020-5902
			F5 BIG-IP Remote Code Execution Vulnerability
			F5
			 | 
			F5 BIG-IP is exposed to remote code execution vulnerability. The vulnerability that has been actively exploited in the wild allows attackers to read files, execute code or take complete control over vulnerable systems having network access. | 
			CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | 
			07/01/2020 | 
			07/27/2020 | 
		
		
			
			CVE-2020-1350
			Microsoft Windows DNS Server Remote Code Execution Vulnerability
			Microsoft
			 | 
			A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability. | 
			CVSSv3BaseScore:10.0(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) | 
			07/14/2020 | 
			07/23/2020 | 
		
		
			
			CVE-2020-3140
			Cisco Prime License Manager Privilege Escalation Vulnerability
			Cisco
			 | 
			A vulnerability in the web management interface of Cisco Prime License Manager (PLM) Software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of user input on the web management interface. An attacker could exploit this vulnerability by submitting a malicious request to an affected system. An exploit could allow the attacker to gain administrative-level privileges on the system. | 
			CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | 
			07/16/2020 | 
			07/23/2020 | 
		
		
			
			CVE-2020-2021
			Palo Alto Networks PAN-OS Authentication Bypass in SAML Authentication Vulnerability
			Palo Alto Networks
			 | 
			When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability. | 
			CVSSv3BaseScore:10.0(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) | 
			06/29/2020 | 
			07/06/2020 |