A <Impact> exists when <Product> <Bug>, aka '<Product> <Impact> Vulnerability'.
<Impact>
is one of: "remote code execution", "elevation of privilege", "spoofing", "denial of service", "information disclosure", "cross site scripting", "security feature bypass".
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. (CVE-2020-1472)
This affects <Product> before <Patched Version>. <Description>
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the
_transformMeasurements
function. (CVE-2020-7750)
<Weakness> in <Product> allows <Attacker> to <Impact> via unspeficied vectors.
FileZen (V3.0.0 to V4.2.7 and V5.0.0 to V5.0.2) allows a remote attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.
<Weakness> in <Component> in <Product> before <Patched Version> allowed <Attacker> to <Impact> via <Attack Vector>.
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2020-15999)