<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://web.nvd.nist.gov/view/vuln/search">
    <title>National Vulnerability Database</title>
    <link>https://web.nvd.nist.gov/view/vuln/search</link>
    <description>This feed contains the most recent CVE cyber vulnerabilities published within the National Vulnerability Database.</description>
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18636" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14468" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14879" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14880" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14881" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14882" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16227" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16228" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16229" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16230" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16451" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16452" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19592" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9425" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9581" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10409" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10432" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10433" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10434" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10435" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10489" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10492" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10497" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10498" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10499" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10501" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10506" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10507" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10508" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10509" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10510" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10538" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10539" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10540" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11279" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11733" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11734" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11735" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11736" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11737" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11738" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11739" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11740" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11741" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11742" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11743" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11744" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11746" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11747" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11748" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11749" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11750" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11751" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11752" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11753" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11754" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11755" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11927" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12646" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12647" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12648" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12649" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12652" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12653" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12654" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12655" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12656" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12657" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12658" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12659" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12660" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12661" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12662" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12669" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12670" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12671" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12736" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13123" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13124" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13466" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13467" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13523" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13957" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14454" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14666" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14752" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14844" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14952" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14953" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14956" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14959" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14961" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15036" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15037" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15039" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15040" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15067" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15166" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15810" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15862" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15891" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15940" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15941" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16171" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16253" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16276" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16409" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16414" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16524" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16676" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16683" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16684" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16685" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16686" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16687" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16688" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16743" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16744" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16745" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16755" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16889" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16892" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16910" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16920" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16922" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16924" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16925" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16926" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16927" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16928" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16930" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16932" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16935" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16941" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16993" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16994" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16995" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16996" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16997" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16999" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17040" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17045" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17046" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17049" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17050" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17051" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17073" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2055" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2059" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2060" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2061" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2062" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2063" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2064" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2065" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2066" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2067" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2068" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2069" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2070" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2071" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2072" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2073" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2074" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2075" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2076" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2077" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2078" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2079" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2080" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2081" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2082" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2083" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2084" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2085" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2086" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2087" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2138" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2139" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2140" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2141" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2142" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2143" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2144" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2145" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2146" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2147" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2148" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2149" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2150" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2151" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2152" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2153" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2154" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2155" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2156" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2157" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2158" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2159" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2160" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2161" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2162" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2163" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2164" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2165" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2166" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2167" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2168" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2169" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2170" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2172" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2188" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2189" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2190" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2191" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2252" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2284" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2294" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2333" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2341" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3736" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3746" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3747" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3766" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4106" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4109" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4112" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4115" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4246" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4280" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4304" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4305" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4422" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4423" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4441" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4494" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4495" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4497" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4520" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4538" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4539" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4542" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4549" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6161" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6649" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6656" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8072" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8073" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8074" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8075" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8288" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8289" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8290" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9232" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9233" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9234" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9235" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9236" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9237" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9238" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9239" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9240" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9241" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9242" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9243" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9244" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9247" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9249" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9250" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9251" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9252" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9253" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9256" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9257" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9258" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9259" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9260" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9261" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9262" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9264" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9265" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9266" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9268" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9269" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9272" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9277" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9278" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9279" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9281" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9282" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9283" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9284" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9285" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9286" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9287" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9288" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9289" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9290" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9291" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9292" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9293" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9294" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9295" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9296" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9297" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9298" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9299" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9300" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9301" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9302" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9303" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9304" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9305" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9306" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9307" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9308" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9309" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9310" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9311" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9313" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9314" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9315" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9316" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9317" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9318" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9319" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9320" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9321" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9322" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9323" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9325" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9326" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9327" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9328" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9329" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9330" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9331" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9332" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9333" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9334" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9335" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9336" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9337" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9338" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9341" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9342" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9343" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9344" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9346" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9347" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9348" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9349" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9350" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9351" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9352" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9353" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9354" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9355" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9357" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9358" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9359" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9360" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9361" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9362" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9363" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9364" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9365" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9366" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9367" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9368" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9369" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9370" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9371" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9372" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9373" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9374" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9375" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9376" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9378" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9379" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9380" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9381" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9382" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9383" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9384" />
        <rdf:li rdf:resource="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9385" />
      </rdf:Seq>
    </items>
    <dc:date>2019-10-05T20:00:33Z</dc:date>
    <dc:language>en-us</dc:language>
    <dc:rights>This material is not copywritten and may be freely used, however, attribution is requested.</dc:rights>
  </channel>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18636">
    <title>CVE-2017-18636 (cdg)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-18636</link>
    <description>CDG through 2017-01-01 allows downloadDocument.jsp?command=download&amp;amp;pathAndName= directory traversal.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14468">
    <title>CVE-2018-14468 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14468</link>
    <description>The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().</description>
    <dc:date>2019-10-03T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14879">
    <title>CVE-2018-14879 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14879</link>
    <description>The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14880">
    <title>CVE-2018-14880 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14880</link>
    <description>The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14881">
    <title>CVE-2018-14881 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14881</link>
    <description>The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14882">
    <title>CVE-2018-14882 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-14882</link>
    <description>The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16227">
    <title>CVE-2018-16227 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16227</link>
    <description>The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16228">
    <title>CVE-2018-16228 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16228</link>
    <description>The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16229">
    <title>CVE-2018-16229 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16229</link>
    <description>The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16230">
    <title>CVE-2018-16230 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16230</link>
    <description>The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16451">
    <title>CVE-2018-16451 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16451</link>
    <description>The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16452">
    <title>CVE-2018-16452 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-16452</link>
    <description>The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.</description>
    <dc:date>2019-10-03T16:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19592">
    <title>CVE-2018-19592 (link)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19592</link>
    <description>The &amp;quot;CLink4Service&amp;quot; service is installed with Corsair Link 4.9.7.35 with insecure permissions by default. This allows unprivileged users to take control of the service and execute commands in the context of NT AUTHORITY\SYSTEM, leading to total system takeover, a similar issue to CVE-2018-12441.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9425">
    <title>CVE-2018-9425 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9425</link>
    <description>In Platform, there is a possible bypass of user interaction requirements due to missing permission checks. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-73884967</description>
    <dc:date>2019-09-27T19:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9581">
    <title>CVE-2018-9581 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9581</link>
    <description>In WiFi, the RSSI value and SSID information is broadcast as part of android.net.wifi.RSSI_CHANGE and android.net.wifi.STATE_CHANGE intents. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111698366</description>
    <dc:date>2019-09-27T19:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10409">
    <title>CVE-2019-10409 (project_inheritance)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10409</link>
    <description>A missing permission check in Jenkins Project Inheritance Plugin 2.0.0 and earlier allowed attackers with Overall/Read permission to trigger project generation from templates.</description>
    <dc:date>2019-09-25T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10432">
    <title>CVE-2019-10432 (html_publisher)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10432</link>
    <description>Jenkins HTML Publisher Plugin 1.20 and earlier did not escape the project and build display names in the HTML report frame, resulting in a cross-site scripting vulnerability exploitable by users able to change those.</description>
    <dc:date>2019-10-01T14:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10433">
    <title>CVE-2019-10433 (dingding)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10433</link>
    <description>Jenkins Dingding[??] Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.</description>
    <dc:date>2019-10-01T14:15:28Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10434">
    <title>CVE-2019-10434 (ldap_email)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10434</link>
    <description>Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.</description>
    <dc:date>2019-10-01T14:15:30Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10435">
    <title>CVE-2019-10435 (sourcegear_vault)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10435</link>
    <description>Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.</description>
    <dc:date>2019-10-01T14:15:31Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10489">
    <title>CVE-2019-10489 (mdm9206_firmware, mdm9607_firmware, msm8909w_firmware, msm8996au_firmware, qca6574au_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_415_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_600_firmware, sd_615_firmware, sd_616_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10489</link>
    <description>Possible null-pointer dereference can occur while parsing avi clip during copy in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9206, MDM9607, MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10492">
    <title>CVE-2019-10492 (mdm9607_firmware, msm8909w_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_820_firmware, sd_820a_firmware, sdm439_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10492</link>
    <description>Boot image not getting verified by AVB in Snapdragon Auto, Snapdragon Mobile, Snapdragon Wearables in MDM9607, MSM8909W, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 820, SD 820A, SDM439</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10497">
    <title>CVE-2019-10497 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_415_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_615_firmware, sd_616_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10497</link>
    <description>Use after free issue occurs If another instance of open for voice_svc node has been called from application without closing the previous one. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10498">
    <title>CVE-2019-10498 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_415_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_615_firmware, sd_616_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10498</link>
    <description>Buffer overflow scenario if the client sends more than 5 io_vec requests to the server in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10499">
    <title>CVE-2019-10499 (ipq4019_firmware, ipq8064_firmware, ipq8074_firmware, qcs405_firmware, sd_665_firmware, sd_675_firmware, sd_730_firmware, sd_855_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10499</link>
    <description>Improper validation of read and write index of tx and rx fifo`s before using for data copy from fifo can lead to out-of-bound access. in Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, QCS405, SD 665, SD 675, SD 730, SD 855</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10501">
    <title>CVE-2019-10501 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10501</link>
    <description>Possible use after free issue due to improper input validation in volume listener library in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10506">
    <title>CVE-2019-10506 (mdm9206_firmware, mdm9607_firmware, msm8996au_firmware, qca6174a_firmware, qca6574au_firmware, qca9377_firmware, qca9379_firmware, qcs605_firmware, sd_600_firmware, sd_625_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sdm630_firmware, sdm660_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10506</link>
    <description>While processing QCA_NL80211_VENDOR_SUBCMD_AVOID_FREQUENCY vendor command, driver does not validate the data obtained from the user space which could be invalid and thus leads to an undesired behaviour in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10507">
    <title>CVE-2019-10507 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8996au_firmware, qca6174a_firmware, qca6574au_firmware, qca9377_firmware, qca9379_firmware, qcs605_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_430_firmware, sd_600_firmware, sd_625_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10507</link>
    <description>Lack of check of extscan change results received from firmware can lead to an out of buffer read in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCS605, SD 210/SD 212/SD 205, SD 425, SD 430, SD 600, SD 625, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10508">
    <title>CVE-2019-10508 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qca6174a_firmware, qca6574au_firmware, qca9377_firmware, qca9379_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_415_firmware, sd_425_firmware, sd_430_firmware, sd_600_firmware, sd_615_firmware, sd_616_firmware, sd_625_firmware, sd_632_firmware, sd_650_firmware, sd_652_firmware, sd_820a_firmware, sdx20_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10508</link>
    <description>Lack of input validation for data received from user space can lead to OOB access in WLAN in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 425, SD 430, SD 600, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820A, SDX20</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10509">
    <title>CVE-2019-10509 (msm8909w_firmware, msm8996au_firmware, qca6574au_firmware, qcs405_firmware, qcs605_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, snapdragon_high_med_2016_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10509</link>
    <description>Device record of the pairing device used after free during ACL disconnection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10510">
    <title>CVE-2019-10510 (qcs405_firmware, qcs605_firmware, sd_636_firmware, sd_675_firmware, sd_730_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sdm630_firmware, sdm660_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10510</link>
    <description>BT process died and BT toggled due to null pointer dereference when invalid vendor pass through command sent from remote in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music in QCS405, QCS605, SD 636, SD 675, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM630, SDM660</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10538">
    <title>CVE-2019-10538 (msm8909w_firmware, msm8996au_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_425_firmware, sd_429_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820a_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10538</link>
    <description>Lack of check of address range received from firmware response allows modem to respond arbitrary pages into its address range which can compromise HLOS in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10539">
    <title>CVE-2019-10539 (ipq8074_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8996au_firmware, qca6174a_firmware, qca6574_firmware, qca6574au_firmware, qca6584_firmware, qca8081_firmware, qca9379_firmware, qcs404_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sd_8cx_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware, sxr1130_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10539</link>
    <description>Possible buffer overflow issue due to lack of length check when parsing the extended cap IE header length in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA8081, QCA9379, QCS404, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24, SXR1130</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10540">
    <title>CVE-2019-10540 (ipq8074_firmware, msm8996au_firmware, qca6174a_firmware, qca6574au_firmware, qca8081_firmware, qca9377_firmware, qca9379_firmware, qcs404_firmware, qcs405_firmware, qcs605_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sd_8cx_firmware, sda660_firmware, sdm630_firmware, sdm660_firmware, sxr1130_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10540</link>
    <description>Buffer overflow in WLAN NAN function due to lack of check of count value received in NAN availability attribute in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, MSM8996AU, QCA6174A, QCA6574AU, QCA8081, QCA9377, QCA9379, QCS404, QCS405, QCS605, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SXR1130</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11279">
    <title>CVE-2019-11279 (uaa_release)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11279</link>
    <description>CF UAA versions prior to 74.1.0 can request scopes for a client that shouldn't be allowed by submitting an array of requested scopes. A remote malicious user can escalate their own privileges to any scope, allowing them to take control of UAA and the resources it controls.</description>
    <dc:date>2019-09-26T22:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11733">
    <title>CVE-2019-11733 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11733</link>
    <description>When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox &amp;lt; 68.0.2 and Firefox ESR &amp;lt; 68.0.2.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11734">
    <title>CVE-2019-11734 (firefox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11734</link>
    <description>Mozilla developers and community members reported memory safety bugs present in Firefox 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 69.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11735">
    <title>CVE-2019-11735 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11735</link>
    <description>Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11736">
    <title>CVE-2019-11736 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11736</link>
    <description>The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. &amp;lt;br&amp;gt;*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11737">
    <title>CVE-2019-11737 (firefox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11737</link>
    <description>If a wildcard ('*') is specified for the host in Content Security Policy (CSP) directives, any port or path restriction of the directive will be ignored, leading to CSP directives not being properly applied to content. This vulnerability affects Firefox &amp;lt; 69.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11738">
    <title>CVE-2019-11738 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11738</link>
    <description>If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11739">
    <title>CVE-2019-11739 (thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11739</link>
    <description>Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird &amp;lt; 68.1 and Thunderbird &amp;lt; 60.9.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11740">
    <title>CVE-2019-11740 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11740</link>
    <description>Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11741">
    <title>CVE-2019-11741 (firefox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11741</link>
    <description>A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox &amp;lt; 69.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11742">
    <title>CVE-2019-11742 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11742</link>
    <description>A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &amp;amp;lt;canvas&amp;amp;gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11743">
    <title>CVE-2019-11743 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11743</link>
    <description>Navigation events were not fully adhering to the W3C's &amp;quot;Navigation-Timing Level 2&amp;quot; draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11744">
    <title>CVE-2019-11744 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11744</link>
    <description>Some HTML elements, such as &amp;amp;lt;title&amp;amp;gt; and &amp;amp;lt;textarea&amp;amp;gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11746">
    <title>CVE-2019-11746 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11746</link>
    <description>A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11747">
    <title>CVE-2019-11747 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11747</link>
    <description>The &amp;quot;Forget about this site&amp;quot; feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11748">
    <title>CVE-2019-11748 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11748</link>
    <description>WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11749">
    <title>CVE-2019-11749 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11749</link>
    <description>A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11750">
    <title>CVE-2019-11750 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11750</link>
    <description>A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11751">
    <title>CVE-2019-11751 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11751</link>
    <description>Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. &amp;lt;br&amp;gt;*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox &amp;lt; 69 and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11752">
    <title>CVE-2019-11752 (firefox, firefox_esr, thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11752</link>
    <description>It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &amp;lt; 69, Thunderbird &amp;lt; 68.1, Thunderbird &amp;lt; 60.9, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11753">
    <title>CVE-2019-11753 (firefox, firefox_esr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11753</link>
    <description>The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. &amp;lt;br&amp;gt;*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &amp;lt; 69, Firefox ESR &amp;lt; 60.9, and Firefox ESR &amp;lt; 68.1.</description>
    <dc:date>2019-09-27T18:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11754">
    <title>CVE-2019-11754 (firefox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11754</link>
    <description>When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox &amp;lt; 69.0.1.</description>
    <dc:date>2019-09-27T18:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11755">
    <title>CVE-2019-11755 (thunderbird)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11755</link>
    <description>A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird &amp;lt; 68.1.1.</description>
    <dc:date>2019-09-27T18:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11927">
    <title>CVE-2019-11927 (whatsapp)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-11927</link>
    <description>An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100.</description>
    <dc:date>2019-09-27T21:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12646">
    <title>CVE-2019-12646 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12646</link>
    <description>A vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper processing of transient SIP packets on which NAT is performed on an affected device. An attacker could exploit this vulnerability by using UDP port 5060 to send crafted SIP packets through an affected device that is performing NAT for SIP packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.</description>
    <dc:date>2019-09-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12647">
    <title>CVE-2019-12647 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12647</link>
    <description>A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.</description>
    <dc:date>2019-09-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12648">
    <title>CVE-2019-12648 (ios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12648</link>
    <description>A vulnerability in the IOx application environment for Cisco IOS Software could allow an authenticated, remote attacker to gain unauthorized access to the Guest Operating System (Guest OS) running on an affected device. The vulnerability is due to incorrect role-based access control (RBAC) evaluation when a low-privileged user requests access to a Guest OS that should be restricted to administrative accounts. An attacker could exploit this vulnerability by authenticating to the Guest OS by using the low-privileged-user credentials. An exploit could allow the attacker to gain unauthorized access to the Guest OS as a root user.</description>
    <dc:date>2019-09-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12649">
    <title>CVE-2019-12649 (ios, ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12649</link>
    <description>A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device.</description>
    <dc:date>2019-09-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12652">
    <title>CVE-2019-12652 (ios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12652</link>
    <description>A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12653">
    <title>CVE-2019-12653 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12653</link>
    <description>A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12654">
    <title>CVE-2019-12654 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12654</link>
    <description>A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12655">
    <title>CVE-2019-12655 (ios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12655</link>
    <description>A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a buffer overflow that occurs when an affected device inspects certain FTP traffic. An attacker could exploit this vulnerability by performing a specific FTP transfer through the device. A successful exploit could allow the attacker to cause the device to reload.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12656">
    <title>CVE-2019-12656 (cgr_1000_firmware, ic3000_firmware, ie_4000_firmware, industrial_ethernet_2000_series_firmware, ios, ir510_wpan_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12656</link>
    <description>A vulnerability in the IOx application environment of multiple Cisco platforms could allow an unauthenticated, remote attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a denial of service (DoS) condition. The vulnerability is due to a Transport Layer Security (TLS) implementation issue. An attacker could exploit this vulnerability by sending crafted TLS packets to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing HTTPS requests, resulting in a DoS condition.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12657">
    <title>CVE-2019-12657 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12657</link>
    <description>A vulnerability in Unified Threat Defense (UTD) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper validation of IPv6 packets through the UTD feature. An attacker could exploit this vulnerability by sending IPv6 traffic through an affected device that is configured with UTD. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12658">
    <title>CVE-2019-12658 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12658</link>
    <description>A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.</description>
    <dc:date>2019-09-25T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12659">
    <title>CVE-2019-12659 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12659</link>
    <description>A vulnerability in the HTTP server code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the HTTP server to crash. The vulnerability is due to a logical error in the logging mechanism. An attacker could exploit this vulnerability by generating a high amount of long-lived connections to the HTTP service on the device. A successful exploit could allow the attacker to cause the HTTP server to crash.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12660">
    <title>CVE-2019-12660 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12660</link>
    <description>A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to write values to the underlying memory of an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to modify the configuration of the device to cause it to be non-secure and abnormally functioning.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12661">
    <title>CVE-2019-12661 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12661</link>
    <description>A vulnerability in a Virtualization Manager (VMAN) related CLI command of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on the affected device. An attacker who has administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges, which may lead to complete system compromise.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12662">
    <title>CVE-2019-12662 (ios_xe, nexus_3016_firmware, nexus_3048_firmware, nexus_3064-t_firmware, nexus_3064_firmware, nexus_31108pc-v_firmware, nexus_31108tc-v_firmware, nexus_31128pq_firmware, nexus_3132c-z_firmware, nexus_3132q-v_firmware, nexus_3132q-xl_firmware, nexus_3132q_firmware, nexus_3164q_firmware, nexus_3172_firmware, nexus_3172pq-xl_firmware, nexus_3172tq-32t_firmware, nexus_3172tq-xl_firmware, nexus_3172tq_firmware, nexus_3232c_firmware, nexus_3264c-e_firmware, nexus_3264q_firmware, nexus_3408-s_firmware, nexus_34180yc_firmware, nexus_34200yc-sm_firmware, nexus_3432d-s_firmware, nexus_3464c_firmware, nexus_3524-x_firmware, nexus_3524-xl_firmware, nexus_3524_firmware, nexus_3548-x_firmware, nexus_3548-xl_firmware, nexus_3548_firmware, nexus_5548p_firmware, nexus_5548up_firmware, nexus_5596t_firmware, nexus_5596up_firmware, nexus_56128p_firmware, nexus_5624q_firmware, nexus_5648q_firmware, nexus_5672up_firmware, nexus_5696q_firmware, nexus_6001_firmware, nexus_6004_firmware, nexus_7000_10-slot_firmware, nexus_7000_18-slot_firmware, nexus_7000_4-slot_firmware, nexus_7000_9-slot_firmware, nexus_7700_10-slot_firmware, nexus_7700_18-slot_firmware, nexus_7700_2-slot_firmware, nexus_7700_6-slot_firmware, nx-os)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12662</link>
    <description>A vulnerability in Cisco NX-OS Software and Cisco IOS XE Software could allow an authenticated, local attacker with valid administrator or privilege level 15 credentials to load a virtual service image and bypass signature verification on an affected device. The vulnerability is due to improper signature verification during the installation of an Open Virtual Appliance (OVA) image. An authenticated, local attacker could exploit this vulnerability and load a malicious, unsigned OVA image on an affected device. A successful exploit could allow an attacker to perform code execution on a crafted software OVA image.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12669">
    <title>CVE-2019-12669 (ios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12669</link>
    <description>A vulnerability in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec, a feature within Cisco IOS XE Software, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of a malformed packet. An attacker could exploit this vulnerability by sending a malformed packet to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12670">
    <title>CVE-2019-12670 (ios)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12670</link>
    <description>A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker within the IOx Guest Shell to modify the namespace container protections on an affected device. The vulnerability is due to insufficient file permissions. An attacker could exploit this vulnerability by modifying files that they should not have access to. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12671">
    <title>CVE-2019-12671 (ios_xe)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12671</link>
    <description>A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.</description>
    <dc:date>2019-09-25T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12736">
    <title>CVE-2019-12736 (ktor)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12736</link>
    <description>JetBrains Ktor framework before 1.2.0-rc does not sanitize the username provided by the user for the LDAP protocol, leading to command injection.</description>
    <dc:date>2019-10-02T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13123">
    <title>CVE-2019-13123 (foxit_reader)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13123</link>
    <description>Foxit Reader 9.6.0.25114 and earlier has two unique RecursiveCall bugs involving 3 functions exhausting available stack memory because of Uncontrolled Recursion in the V8 JavaScript engine (issue 1 of 2).</description>
    <dc:date>2019-09-30T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13124">
    <title>CVE-2019-13124 (foxit_reader)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13124</link>
    <description>Foxit Reader 9.6.0.25114 and earlier has two unique RecursiveCall bugs involving 3 functions exhausting available stack memory because of Uncontrolled Recursion in the V8 JavaScript engine (issue 2 of 2).</description>
    <dc:date>2019-09-30T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13466">
    <title>CVE-2019-13466 (ssd_dashboard)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13466</link>
    <description>Western Digital SSD Dashboard before 2.5.1.0 and SanDisk SSD Dashboard before 2.5.1.0 have Incorrect Access Control. The ?generate reports? archive is protected with a hard-coded password. An application update that addresses the protection of archive encryption is available.</description>
    <dc:date>2019-09-30T18:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13467">
    <title>CVE-2019-13467 (ssd_dashboard)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13467</link>
    <description>Description: Western Digital SSD Dashboard before 2.5.1.0 and SanDisk SSD Dashboard before 2.5.1.0 applications are potentially vulnerable to man-in-the-middle attacks when the applications download resources from the Dashboard web service. This vulnerability may allow an attacker to substitute downloaded resources with arbitrary files.</description>
    <dc:date>2019-09-30T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13523">
    <title>CVE-2019-13523 (h2w2pc1m_firmware, h2w2per3_firmware, h2w4per3_firmware, h4d3prv2_firmware, h4d3prv3_firmware, h4w2per2_firmware, h4w2per3_firmware, h4w8pr2_firmware, hbd3pr1_firmware, hbd3pr2_firmware, hbw2per1_firmware, hbw2per2_firmware, hbw8pr2_firmware, hed3pr3_firmware, hen04103_firmware, hen04103l_firmware, hen04113_firmware, hen04123_firmware, hen08103_firmware, hen08103l_firmware, hen08104_firmware, hen081124_firmware, hen08113_firmware, hen08123_firmware, hen08143_firmware, hen08144_firmware, hen16103_firmware, hen16103l_firmware, hen16104_firmware, hen16123_firmware, hen16143_firmware, hen16144_firmware, hen16163_firmware, hen16184_firmware, hen16204_firmware, hen162244_firmware, hen16284_firmware, hen16304_firmware, hen16384_firmware, hen32103l_firmware, hen32104_firmware, hen321124_firmware, hen32204_firmware, hen322164_firmware, hen32284_firmware, hen32304_firmware, hen323164_firmware, hen32384_firmware, hen64204_firmware, hen64304_firmware, hen643164_firmware, hen643324_firmware, hen643484_firmware, hew2per2_firmware, hew2per3_firmware, hew4per2_firmware, hew4per2b_firmware, hew4per3b_firmware, hpw2p1_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13523</link>
    <description>In Honeywell Performance IP Cameras and Performance NVRs, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data in JSON format for IP cameras and NVRs (Network Video Recorders), which can be accessed without authentication over the network. Affected performance IP Cameras: HBD3PR2,H4D3PRV3,HED3PR3,H4D3PRV2,HBD3PR1,H4W8PR2,HBW8PR2,H2W2PC1M,H2W4PER3,H2W2PER3,HEW2PER3,HEW4PER3B,HBW2PER1,HEW4PER2,HEW4PER2B,HEW2PER2,H4W2PER2,HBW2PER2,H4W2PER3, and HPW2P1. Affected Performance Series NVRs: HEN08104,HEN08144,HEN081124,HEN16104,HEN16144,HEN16184,HEN16204,HEN162244,HEN16284,HEN16304,HEN16384,HEN32104,HEN321124,HEN32204,HEN32284,HEN322164,HEN32304, HEN32384,HEN323164,HEN64204,HEN64304,HEN643164,HEN643324,HEN643484,HEN04103,HEN04113,HEN04123,HEN08103,HEN08113,HEN08123,HEN08143,HEN16103,HEN16123,HEN16143,HEN16163,HEN04103L,HEN08103L,HEN16103L,HEN32103L.</description>
    <dc:date>2019-09-26T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13957">
    <title>CVE-2019-13957 (umbraco)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13957</link>
    <description>In Umbraco 7.3.8, there is SQL Injection in the backoffice/PageWApprove/PageWApproveApi/GetInpectSearch method via the nodeName parameter.</description>
    <dc:date>2019-10-02T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14454">
    <title>CVE-2019-14454 (suitecrm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14454</link>
    <description>SuiteCRM 7.11.x and 7.10.x before 7.11.8 and 7.10.20 is vulnerable to vertical privilege escalation.</description>
    <dc:date>2019-10-02T12:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14666">
    <title>CVE-2019-14666 (glpi)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14666</link>
    <description>GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.</description>
    <dc:date>2019-09-25T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14752">
    <title>CVE-2019-14752 (suitecrm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14752</link>
    <description>SuiteCRM 7.10.x and 7.11.x before 7.10.20 and 7.11.8 has XSS.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14844">
    <title>CVE-2019-14844 (enterprise_linux, fedora, kerberos)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14844</link>
    <description>A flaw was found in, Fedora versions of krb5 from 1.16.1 to, including 1.17.x, in the way a Kerberos client could crash the KDC by sending one of the RFC 4556 &amp;quot;enctypes&amp;quot;. A remote unauthenticated user could use this flaw to crash the KDC.</description>
    <dc:date>2019-09-26T12:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14952">
    <title>CVE-2019-14952 (youtrack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14952</link>
    <description>JetBrains YouTrack versions before 2019.1.52584 had a possible XSS in the issue titles.</description>
    <dc:date>2019-10-01T14:15:32Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14953">
    <title>CVE-2019-14953 (youtrack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14953</link>
    <description>JetBrains YouTrack versions before 2019.2.53938 had a possible XSS through issue attachments when using the Firefox browser.</description>
    <dc:date>2019-10-01T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14956">
    <title>CVE-2019-14956 (youtrack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14956</link>
    <description>JetBrains YouTrack before 2019.2.53938 was using incorrect settings, allowing a user without necessary permissions to get other project names.</description>
    <dc:date>2019-10-02T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14959">
    <title>CVE-2019-14959 (toolbox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14959</link>
    <description>JetBrains Toolbox before 1.15.5605 was resolving an internal URL via a cleartext http connection.</description>
    <dc:date>2019-10-02T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14961">
    <title>CVE-2019-14961 (upsource)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14961</link>
    <description>JetBrains Upsource before 2019.1.1412 was not properly escaping HTML tags in a code block comments, leading to XSS.</description>
    <dc:date>2019-10-01T17:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15036">
    <title>CVE-2019-15036 (teamcity)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15036</link>
    <description>An issue was discovered in JetBrains TeamCity 2018.2.4. A TeamCity Project administrator could execute any command on the server machine. The issue was fixed in TeamCity 2018.2.5 and 2019.1.</description>
    <dc:date>2019-10-02T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15037">
    <title>CVE-2019-15037 (teamcity)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15037</link>
    <description>An issue was discovered in JetBrains TeamCity 2018.2.4. It had several XSS vulnerabilities on the settings pages. The issues were fixed in TeamCity 2019.1.</description>
    <dc:date>2019-10-02T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15039">
    <title>CVE-2019-15039 (teamcity)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15039</link>
    <description>An issue was discovered in JetBrains TeamCity 2018.2.4. It had a possible remote code execution issue. This was fixed in TeamCity 2018.2.5 and 2019.1.</description>
    <dc:date>2019-10-01T14:15:38Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15040">
    <title>CVE-2019-15040 (youtrack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15040</link>
    <description>JetBrains YouTrack versions before 2019.1 had a CSRF vulnerability on the settings page.</description>
    <dc:date>2019-10-02T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15067">
    <title>CVE-2019-15067 (smart_battery_a2-25de_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15067</link>
    <description>An authentication bypass vulnerability discovered in Smart Battery A2-25DE, a multifunctional portable charger, firmware version ?&amp;lt;= SECFS-2013-10-16-13:42:58-629c30ee-60c68be6. An attacker can bypass authentication and gain privilege by modifying the login page.</description>
    <dc:date>2019-09-25T19:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15166">
    <title>CVE-2019-15166 (tcpdump)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15166</link>
    <description>lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.</description>
    <dc:date>2019-10-03T17:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15810">
    <title>CVE-2019-15810 (netdisco)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15810</link>
    <description>Insufficient sanitization during device search in Netdisco 2.042010 allows for reflected XSS via manipulation of a URL parameter.</description>
    <dc:date>2019-09-30T17:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15862">
    <title>CVE-2019-15862 (ckfinder)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15862</link>
    <description>An issue was discovered in CKFinder through 2.6.2.1. Improper checks of file names allows remote attackers to upload files without any extension (even if the application was configured to accept files only with a defined set of extensions). This affects CKFinder for ASP, CKFinder for ASP.NET, CKFinder for ColdFusion, and CKFinder for PHP.</description>
    <dc:date>2019-09-26T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15891">
    <title>CVE-2019-15891 (ckfinder)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15891</link>
    <description>An issue was discovered in CKFinder through 2.6.2.1 and 3.x through 3.5.0. The documentation has misleading information that could lead to a conclusion that the application has a built-in bulletproof content sniffing protection.</description>
    <dc:date>2019-09-26T21:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15940">
    <title>CVE-2019-15940 (pc530_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15940</link>
    <description>Victure PC530 devices allow unauthenticated TELNET access as root.</description>
    <dc:date>2019-10-01T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15941">
    <title>CVE-2019-15941 (debian_linux, lemonldap::)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-15941</link>
    <description>OpenID Connect Issuer in LemonLDAP::NG 2.x through 2.0.5 may allow an attacker to bypass access control rules via a crafted OpenID Connect authorization request. To be vulnerable, there must exist an OIDC Relaying party within the LemonLDAP configuration with weaker access control rules than the target RP, and no filtering on redirection URIs.</description>
    <dc:date>2019-09-25T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16171">
    <title>CVE-2019-16171 (youtrack)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16171</link>
    <description>In JetBrains YouTrack through 2019.2.56594, stored XSS was found on the issue page.</description>
    <dc:date>2019-10-02T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16253">
    <title>CVE-2019-16253 (text-to-speech)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16253</link>
    <description>The Text-to-speech Engine (aka SamsungTTS) application before 3.0.02.7 and 3.0.00.101 for Android allows a local attacker to escalate privileges, e.g., to system privileges. The Samsung case ID is 101755.</description>
    <dc:date>2019-09-25T23:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16276">
    <title>CVE-2019-16276 (go)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16276</link>
    <description>Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.</description>
    <dc:date>2019-09-30T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16409">
    <title>CVE-2019-16409 (silverstripe, versionedfiles)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16409</link>
    <description>In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)</description>
    <dc:date>2019-09-26T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16414">
    <title>CVE-2019-16414 (kerio_control)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16414</link>
    <description>A DOM based XSS in GFI Kerio Control v9.3.0 allows embedding of malicious code and manipulating the login page to send back a victim's cleartext credentials to an attacker via a login/?reason=failure&amp;amp;NTLM= URI.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16524">
    <title>CVE-2019-16524 (easy_fancybox)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16524</link>
    <description>The easy-fancybox plugin before 1.8.18 for WordPress (aka Easy FancyBox) is susceptible to Stored XSS in the Settings Menu inc/class-easyfancybox.php due to improper encoding of arbitrarily submitted settings parameters. This occurs because there is no inline styles output filter.</description>
    <dc:date>2019-09-26T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16676">
    <title>CVE-2019-16676 (simple_form)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16676</link>
    <description>Plataformatec Simple Form has Incorrect Access Control in file_method? in lib/simple_form/form_builder.rb, because a user-supplied string is invoked as a method call.</description>
    <dc:date>2019-09-30T12:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16683">
    <title>CVE-2019-16683 (xoops)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16683</link>
    <description>An issue was discovered in the image-manager in Xoops 2.5.10. When the breadcrumb showing the category name is hovered over while editing any image, a JavaScript payload executes.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16684">
    <title>CVE-2019-16684 (xoops)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16684</link>
    <description>An issue was discovered in the image-manager in Xoops 2.5.10. When any image with a JavaScript payload as its name is hovered over in the list or in the Edit page, the payload executes.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16685">
    <title>CVE-2019-16685 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16685</link>
    <description>Dolibarr 9.0.5 has stored XSS vulnerability via a User Group Description section to card.php. A user with the &amp;quot;Create/modify other users, groups and permissions&amp;quot; privilege can inject script and can also achieve privilege escalation.</description>
    <dc:date>2019-09-27T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16686">
    <title>CVE-2019-16686 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16686</link>
    <description>Dolibarr 9.0.5 has stored XSS in a User Note section to note.php. A user with no privileges can inject script to attack the admin.</description>
    <dc:date>2019-09-27T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16687">
    <title>CVE-2019-16687 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16687</link>
    <description>Dolibarr 9.0.5 has stored XSS in a User Profile in a Signature section to card.php. A user with the &amp;quot;Create/modify other users, groups and permissions&amp;quot; privilege can inject script and can also achieve privilege escalation.</description>
    <dc:date>2019-09-27T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16688">
    <title>CVE-2019-16688 (dolibarr)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16688</link>
    <description>Dolibarr 9.0.5 has stored XSS in an Email Template section to mails_templates.php. A user with no privileges can inject script to attack the admin. (This stored XSS can affect all types of user privilege from Admin to users with no permissions.)</description>
    <dc:date>2019-09-27T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16743">
    <title>CVE-2019-16743 (ebrigade)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16743</link>
    <description>eBrigade before 5.0 has evenement_ical.php evenement SQL Injection.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16744">
    <title>CVE-2019-16744 (ebrigade)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16744</link>
    <description>eBrigade before 5.0 has evenements.php cid SQL Injection.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16745">
    <title>CVE-2019-16745 (ebrigade)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16745</link>
    <description>eBrigade before 5.0 has evenement_choice.php chxCal SQL Injection.</description>
    <dc:date>2019-09-30T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16755">
    <title>CVE-2019-16755 (myit_digital_workplace)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16755</link>
    <description>BMC Remedy ITSM Suite is prone to unspecified vulnerabilities in both DWP and SmartIT components, which can permit remote attackers to perform pre-authenticated remote commands execution on the Operating System running the targeted application. Affected DWP versions: versions: 3.x to 18.x, all versions, service packs, and patches are affected by this vulnerability. Affected SmartIT versions: 1.x, 2.0, 18.05, 18.08, and 19.02, all versions, service packs, and patches are affected by this vulnerability.</description>
    <dc:date>2019-09-26T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16889">
    <title>CVE-2019-16889 (ep-r6_firmware, ep-r8_firmware, er-12_firmware, er-4_firmware, er-6p_firmware, er-8-xg_firmware, er-8_firmware, er-x-sfp_firmware, er-x_firmware, erlite-3_firmware, erpoe-5_firmware, erpro-8_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16889</link>
    <description>Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. The attacker can use a long series of unique session IDs.</description>
    <dc:date>2019-09-25T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16892">
    <title>CVE-2019-16892 (rubyzip)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16892</link>
    <description>In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).</description>
    <dc:date>2019-09-25T22:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16910">
    <title>CVE-2019-16910 (fedora, mbed_crypto, mbed_tls)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16910</link>
    <description>Arm Mbed TLS before 2.19.0 and Arm Mbed Crypto before 2.0.0, when deterministic ECDSA is enabled, use an RNG with insufficient entropy for blinding, which might allow an attacker to recover a private key via side-channel attacks if a victim signs the same message many times. (For Mbed TLS, the fix is also available in versions 2.7.12 and 2.16.3.)</description>
    <dc:date>2019-09-26T13:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16920">
    <title>CVE-2019-16920 (dhp-1565_firmware, dir-652_firmware, dir-655_firmware, dir-866l_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16920</link>
    <description>Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a &amp;quot;PingTest&amp;quot; device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise.</description>
    <dc:date>2019-09-27T12:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16922">
    <title>CVE-2019-16922 (suitecrm)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16922</link>
    <description>SuiteCRM 7.10.x before 7.10.20 and 7.11.x before 7.11.8 allows unintended public exposure of files.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16924">
    <title>CVE-2019-16924 (nulock)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16924</link>
    <description>The Nulock application 1.5.0 for mobile devices sends a cleartext password over Bluetooth, which allows remote attackers (after sniffing the network) to take control of the lock.</description>
    <dc:date>2019-09-27T18:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16925">
    <title>CVE-2019-16925 (flower)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16925</link>
    <description>Flower 0.9.3 has XSS via the name parameter in an @app.task call.</description>
    <dc:date>2019-09-28T00:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16926">
    <title>CVE-2019-16926 (flower)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16926</link>
    <description>Flower 0.9.3 has XSS via a crafted worker name.</description>
    <dc:date>2019-09-28T00:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16927">
    <title>CVE-2019-16927 (xpdf)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16927</link>
    <description>Xpdf 4.01.01 has an out-of-bounds write in the vertProfile part of the TextPage::findGaps function in TextOutputDev.cc, a different vulnerability than CVE-2019-9877.</description>
    <dc:date>2019-09-27T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16928">
    <title>CVE-2019-16928 (debian_linux, exim, ubuntu_linux)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16928</link>
    <description>Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.</description>
    <dc:date>2019-09-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16930">
    <title>CVE-2019-16930 (zcash)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16930</link>
    <description>Zcashd in Zcash before 2.0.7-3 allows discovery of the IP address of a full node that owns a shielded address, related to mishandling of exceptions during deserialization of note plaintexts. This affects anyone who has disclosed their zaddr to a third party.</description>
    <dc:date>2019-09-28T22:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16932">
    <title>CVE-2019-16932 (visualizer)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16932</link>
    <description>A blind SSRF vulnerability exists in the Visualizer plugin before 3.3.1 for WordPress via wp-json/visualizer/v1/upload-data.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16935">
    <title>CVE-2019-16935 (python)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16935</link>
    <description>The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.</description>
    <dc:date>2019-09-28T02:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16941">
    <title>CVE-2019-16941 (ghidra)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16941</link>
    <description>NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary code execution if the Read XML Files feature of Bit Patterns Explorer is used with a modified XML document. This occurs in Features/BytePatterns/src/main/java/ghidra/bitpatterns/info/FileBitPatternInfoReader.java. An attack could start with an XML document that was originally created by DumpFunctionPatternInfoScript but then directly modified by an attacker (for example, to make a java.lang.Runtime.exec call).</description>
    <dc:date>2019-09-28T16:15:09Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16993">
    <title>CVE-2019-16993 (phpbb)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16993</link>
    <description>In phpBB before 3.1.7-PL1, includes/acp/acp_bbcodes.php has improper verification of a CSRF token on the BBCode page in the Administration Control Panel. An actual CSRF attack is possible if an attacker also manages to retrieve the session id of a reauthenticated administrator prior to targeting them.</description>
    <dc:date>2019-09-30T12:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16994">
    <title>CVE-2019-16994 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16994</link>
    <description>In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn-&amp;gt;fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.</description>
    <dc:date>2019-09-30T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16995">
    <title>CVE-2019-16995 (linux_kernel)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16995</link>
    <description>In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.</description>
    <dc:date>2019-09-30T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16996">
    <title>CVE-2019-16996 (metinfo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16996</link>
    <description>In Metinfo 7.0.0beta, a SQL Injection was discovered in app/system/product/admin/product_admin.class.php via the admin/?n=product&amp;amp;c=product_admin&amp;amp;a=dopara&amp;amp;app_type=shop id parameter.</description>
    <dc:date>2019-09-30T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16997">
    <title>CVE-2019-16997 (metinfo)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16997</link>
    <description>In Metinfo 7.0.0beta, a SQL Injection was discovered in app/system/language/admin/language_general.class.php via the admin/?n=language&amp;amp;c=language_general&amp;amp;a=doExportPack appno parameter.</description>
    <dc:date>2019-09-30T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16999">
    <title>CVE-2019-16999 (cloudboot)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16999</link>
    <description>CloudBoot through 2019-03-08 allows SQL Injection via a crafted Status field in JSON data to the api/osinstall/v1/device/getNumByStatus URI.</description>
    <dc:date>2019-09-30T13:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17040">
    <title>CVE-2019-17040 (rsyslog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17040</link>
    <description>contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled.</description>
    <dc:date>2019-09-30T14:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17045">
    <title>CVE-2019-17045 (ilch_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17045</link>
    <description>Ilch 2.1.22 allows stored XSS via the title, text, or email id to the Jobs Tab.</description>
    <dc:date>2019-09-30T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17046">
    <title>CVE-2019-17046 (ilch_cms)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17046</link>
    <description>Ilch 2.1.22 allows remote code execution because php is listed under &amp;quot;Allowed files&amp;quot; on the index.php/admin/media/settings/index page.</description>
    <dc:date>2019-09-30T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17049">
    <title>CVE-2019-17049 (srx5308_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17049</link>
    <description>NETGEAR SRX5308 4.3.5-3 devices allow SQL Injection, as exploited in the wild in September 2019 to add a new user account.</description>
    <dc:date>2019-09-30T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17050">
    <title>CVE-2019-17050 (voyager)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17050</link>
    <description>An issue was discovered in the Voyager package through 1.2.7 for Laravel. An attacker with admin privileges and Compass access can read or delete arbitrary files, such as the .env file. NOTE: a software maintainer has suggested a solution in which Compass is switched off in a production environment.</description>
    <dc:date>2019-09-30T19:15:08Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17051">
    <title>CVE-2019-17051 (evernote)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17051</link>
    <description>Evernote before 7.13 GA on macOS allows code execution because the com.apple.quarantine attribute is not used for attachment files, as demonstrated by a one-click attack involving a drag-and-drop operation on a crafted Terminal file.</description>
    <dc:date>2019-09-30T20:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17073">
    <title>CVE-2019-17073 (emlog)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17073</link>
    <description>emlog through 6.0.0beta allows remote authenticated users to delete arbitrary files via admin/template.php?action=del&amp;amp;tpl=../ directory traversal.</description>
    <dc:date>2019-10-01T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2055">
    <title>CVE-2019-2055 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2055</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113164693</description>
    <dc:date>2019-09-27T19:15:12Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2059">
    <title>CVE-2019-2059 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2059</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118386824</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2060">
    <title>CVE-2019-2060 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2060</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112709994</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2061">
    <title>CVE-2019-2061 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2061</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112610994</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2062">
    <title>CVE-2019-2062 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2062</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117660045</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2063">
    <title>CVE-2019-2063 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2063</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in the media server with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116019594</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2064">
    <title>CVE-2019-2064 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2064</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116469592</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2065">
    <title>CVE-2019-2065 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2065</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118143575</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2066">
    <title>CVE-2019-2066 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2066</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117100617</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2067">
    <title>CVE-2019-2067 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2067</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116114402</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2068">
    <title>CVE-2019-2068 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2068</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117099943</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2069">
    <title>CVE-2019-2069 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2069</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117832864</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2070">
    <title>CVE-2019-2070 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2070</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117883804</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2071">
    <title>CVE-2019-2071 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2071</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117216549</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2072">
    <title>CVE-2019-2072 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2072</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116117112</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2073">
    <title>CVE-2019-2073 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2073</link>
    <description>In libxaac there is a possible out of bounds write to missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117100484</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2074">
    <title>CVE-2019-2074 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2074</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116617847</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2075">
    <title>CVE-2019-2075 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2075</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115908308</description>
    <dc:date>2019-09-27T19:15:13Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2076">
    <title>CVE-2019-2076 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2076</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115907334</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2077">
    <title>CVE-2019-2077 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2077</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114745929</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2078">
    <title>CVE-2019-2078 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2078</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114749542</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2079">
    <title>CVE-2019-2079 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2079</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115509210</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2080">
    <title>CVE-2019-2080 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2080</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118619159</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2081">
    <title>CVE-2019-2081 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2081</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116473261</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2082">
    <title>CVE-2019-2082 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2082</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117495103</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2083">
    <title>CVE-2019-2083 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2083</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117495362</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2084">
    <title>CVE-2019-2084 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2084</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117494734</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2085">
    <title>CVE-2019-2085 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2085</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117496180</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2086">
    <title>CVE-2019-2086 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2086</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114735603</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2087">
    <title>CVE-2019-2087 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2087</link>
    <description>In libxaac, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118149009</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2138">
    <title>CVE-2019-2138 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2138</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118494320</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2139">
    <title>CVE-2019-2139 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2139</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117610049</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2140">
    <title>CVE-2019-2140 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2140</link>
    <description>In libxaac, there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112705708</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2141">
    <title>CVE-2019-2141 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2141</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112705155</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2142">
    <title>CVE-2019-2142 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2142</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112768568</description>
    <dc:date>2019-09-27T19:15:14Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2143">
    <title>CVE-2019-2143 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2143</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114746174</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2144">
    <title>CVE-2019-2144 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2144</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112856493</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2145">
    <title>CVE-2019-2145 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2145</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112858430</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2146">
    <title>CVE-2019-2146 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2146</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112859714</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2147">
    <title>CVE-2019-2147 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2147</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116474108</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2148">
    <title>CVE-2019-2148 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2148</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113508105</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2149">
    <title>CVE-2019-2149 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2149</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113262406</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2150">
    <title>CVE-2019-2150 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2150</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117935831</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2151">
    <title>CVE-2019-2151 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2151</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117495174</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2152">
    <title>CVE-2019-2152 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2152</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118145923</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2153">
    <title>CVE-2019-2153 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2153</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112611181</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2154">
    <title>CVE-2019-2154 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2154</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117610057</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2155">
    <title>CVE-2019-2155 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2155</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117655547</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2156">
    <title>CVE-2019-2156 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2156</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112552816</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2157">
    <title>CVE-2019-2157 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2157</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112611363</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2158">
    <title>CVE-2019-2158 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2158</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118766492</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2159">
    <title>CVE-2019-2159 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2159</link>
    <description>In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112707186</description>
    <dc:date>2019-09-27T19:15:15Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2160">
    <title>CVE-2019-2160 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2160</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112715795</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2161">
    <title>CVE-2019-2161 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2161</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112553431</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2162">
    <title>CVE-2019-2162 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2162</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112713720</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2163">
    <title>CVE-2019-2163 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2163</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118138797</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2164">
    <title>CVE-2019-2164 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2164</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113263695</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2165">
    <title>CVE-2019-2165 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2165</link>
    <description>In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112712154</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2166">
    <title>CVE-2019-2166 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2166</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117661478</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2167">
    <title>CVE-2019-2167 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2167</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118615501</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2168">
    <title>CVE-2019-2168 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2168</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118492594</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2169">
    <title>CVE-2019-2169 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2169</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118492282</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2170">
    <title>CVE-2019-2170 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2170</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118615735</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2172">
    <title>CVE-2019-2172 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2172</link>
    <description>In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113035224</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2188">
    <title>CVE-2019-2188 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2188</link>
    <description>In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112309571</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2189">
    <title>CVE-2019-2189 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2189</link>
    <description>In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112312381</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2190">
    <title>CVE-2019-2190 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2190</link>
    <description>In LG's LAF component, there is a possible leak of information in a protected disk partition due to a missing bounds check. This could lead to local information disclosure via USB with User execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-68771598</description>
    <dc:date>2019-09-27T19:15:16Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2191">
    <title>CVE-2019-2191 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2191</link>
    <description>In LG's LAF component, there is a possible leak of information in a protected disk partition due to a missing bounds check. This could lead to local information disclosure via USB with User execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-68770980</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2252">
    <title>CVE-2019-2252 (mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sd_8cx_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, snapdragon_high_med_2016_firmware, sxr1130_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2252</link>
    <description>Classic buffer overflow vulnerability while playing the specific video whose Decode picture buffer size is more than 16 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2284">
    <title>CVE-2019-2284 (msm8909w_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_425_firmware, sd_429_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sdm439_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2284</link>
    <description>Possible use-after-free issue due to a race condition while calling camera ioctl concurrently in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MSM8909W, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 845 / SD 850, SD 855, SDM439, SDX24</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2294">
    <title>CVE-2019-2294 (mdm9205_firmware, mdm9206_firmware, mdm9607_firmware, mdm9615_firmware, mdm9625_firmware, mdm9635m_firmware, mdm9655_firmware, msm8909w_firmware, msm8996au_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_410_firmware, sd_412_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_650_firmware, sd_652_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sd_8cx_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, snapdragon_high_med_2016_firmware, sxr1130_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2294</link>
    <description>Usage of hard-coded magic number for calculating heap guard bytes can allow users to corrupt heap blocks without heap algorithm knowledge in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9205, MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2333">
    <title>CVE-2019-2333 (mdm9150_firmware, mdm9607_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2333</link>
    <description>Buffer overflow due to improper validation of buffer size while IPA driver processing to perform read operation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9650, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2341">
    <title>CVE-2019-2341 (mdm9150_firmware, mdm9206_firmware, mdm9607_firmware, mdm9640_firmware, mdm9650_firmware, msm8909w_firmware, msm8996au_firmware, qcs405_firmware, qcs605_firmware, qualcomm_215_firmware, sd_205_firmware, sd_210_firmware, sd_212_firmware, sd_415_firmware, sd_425_firmware, sd_427_firmware, sd_429_firmware, sd_430_firmware, sd_435_firmware, sd_439_firmware, sd_450_firmware, sd_615_firmware, sd_616_firmware, sd_625_firmware, sd_632_firmware, sd_636_firmware, sd_665_firmware, sd_670_firmware, sd_675_firmware, sd_710_firmware, sd_712_firmware, sd_730_firmware, sd_820_firmware, sd_820a_firmware, sd_835_firmware, sd_845_firmware, sd_850_firmware, sd_855_firmware, sda660_firmware, sdm439_firmware, sdm630_firmware, sdm660_firmware, sdx20_firmware, sdx24_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-2341</link>
    <description>Buffer overflow when the audio buffer size provided by user is larger than the maximum allowable audio buffer size. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp;amp; Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SDX24</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3736">
    <title>CVE-2019-3736 (emc_integrated_data_protection_appliance_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3736</link>
    <description>Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a password storage vulnerability in the ACM component. A remote authenticated malicious user with root privileges may potentially use a support tool to decrypt encrypted passwords stored locally on the system to use it to access other components using the privileges of the compromised user.</description>
    <dc:date>2019-09-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3746">
    <title>CVE-2019-3746 (emc_integrated_data_protection_appliance_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3746</link>
    <description>Dell EMC Integrated Data Protection Appliance versions prior to 2.3 do not limit the number of authentication attempts to the ACM API. An authenticated remote user may exploit this vulnerability to launch a brute-force authentication attack in order to gain access to the system.</description>
    <dc:date>2019-09-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3747">
    <title>CVE-2019-3747 (emc_integrated_data_protection_appliance_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3747</link>
    <description>Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a stored cross-site scripting vulnerability. A remote malicious ACM admin user may potentially exploit this vulnerability to store malicious HTML or JavaScript code in Cloud DR add-on specific field. When victim users access the page through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application.</description>
    <dc:date>2019-09-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3766">
    <title>CVE-2019-3766 (emc_elastic_cloud_storage)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3766</link>
    <description>Dell EMC ECS versions prior to 3.4.0.0 contain an improper restriction of excessive authentication attempts vulnerability. An unauthenticated remote attacker may potentially perform a password brute-force attack to gain access to the targeted accounts.</description>
    <dc:date>2019-09-27T21:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4106">
    <title>CVE-2019-4106 (websphere_extreme_scale)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4106</link>
    <description>IBM WebSphere eXtreme Scale 8.6 Admin Console is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158099.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4109">
    <title>CVE-2019-4109 (websphere_extreme_scale)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4109</link>
    <description>IBM WebSphere eXtreme Scale 8.6 Admin Console could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 158102.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4112">
    <title>CVE-2019-4112 (websphere_extreme_scale)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4112</link>
    <description>IBM WebSphere eXtreme Scale 8.6 Admin Console allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 158105.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4115">
    <title>CVE-2019-4115 (websphere_extreme_scale)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4115</link>
    <description>IBM WebSphere eXtreme Scale 8.6 Admin API is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158113.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4246">
    <title>CVE-2019-4246 (daeja_viewone)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4246</link>
    <description>IBM Daeja ViewONE Virtual 5.0 through 5.0.6 could expose internal parameters to ViewONE clients that could be used in further attacks against the system. IBM X-Force ID: 159521.</description>
    <dc:date>2019-10-01T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4280">
    <title>CVE-2019-4280 (sterling_file_gateway)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4280</link>
    <description>IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 displays sensitive information in HTTP requests which could be used in further attacks against the system. IBM X-Force ID: 160503.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4304">
    <title>CVE-2019-4304 (websphere_application_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4304</link>
    <description>IBM WebSphere Application Server - Liberty could allow a remote attacker to bypass security restrictions caused by improper session validation. IBM X-Force ID: 160950.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4305">
    <title>CVE-2019-4305 (websphere_application_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4305</link>
    <description>IBM WebSphere Application Server Liberty could allow a remote attacker to obtain sensitive information caused by the improper setting of a cookie. IBM X-Force ID: 160951.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4422">
    <title>CVE-2019-4422 (security_guardium)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4422</link>
    <description>IBM Security Guardium 9.0, 9.5, and 10.6 are vulnerable to a privilege escalation which could allow an authenticated user to change the accessmgr password. IBM X-Force ID: 162768.</description>
    <dc:date>2019-10-03T14:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4423">
    <title>CVE-2019-4423 (sterling_file_gateway)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4423</link>
    <description>IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing &amp;quot;dot dot&amp;quot; sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162769.</description>
    <dc:date>2019-09-30T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4441">
    <title>CVE-2019-4441 (websphere_application_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4441</link>
    <description>IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0, and Liberty could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser. IBM X-Force ID: 163177.</description>
    <dc:date>2019-10-03T14:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4494">
    <title>CVE-2019-4494 (jazz_reporting_service)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4494</link>
    <description>IBM Jazz Reporting Service (JRS) 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164115.</description>
    <dc:date>2019-10-01T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4495">
    <title>CVE-2019-4495 (jazz_reporting_service)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4495</link>
    <description>IBM Jazz Reporting Service (JRS) 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164116.</description>
    <dc:date>2019-10-01T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4497">
    <title>CVE-2019-4497 (jazz_reporting_service)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4497</link>
    <description>IBM Jazz Reporting Service (JRS) 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164118.</description>
    <dc:date>2019-10-01T15:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4520">
    <title>CVE-2019-4520 (security_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4520</link>
    <description>IBM Security Directory Server 6.4.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 165178.</description>
    <dc:date>2019-10-02T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4538">
    <title>CVE-2019-4538 (security_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4538</link>
    <description>IBM Security Directory Server 6.4.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 165660.</description>
    <dc:date>2019-10-02T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4539">
    <title>CVE-2019-4539 (security_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4539</link>
    <description>IBM Security Directory Server 6.4.0 does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system. IBM X-Force ID: 165812.</description>
    <dc:date>2019-10-02T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4542">
    <title>CVE-2019-4542 (security_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4542</link>
    <description>IBM Security Directory Server 6.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 165815.</description>
    <dc:date>2019-10-02T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4549">
    <title>CVE-2019-4549 (security_directory_server)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-4549</link>
    <description>IBM Security Directory Server 6.4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 165951.</description>
    <dc:date>2019-10-02T15:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6161">
    <title>CVE-2019-6161 (cp_storage_block_firmware)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6161</link>
    <description>An internal product security audit discovered a session handling vulnerability in the web interface of ThinkAgile CP-SB (Storage Block) BMC in firmware versions prior to 1908.M. This vulnerability allows session IDs to be reused, which could provide unauthorized access to the BMC under certain circumstances. This vulnerability does not affect ThinkSystem XCC, System x IMM2, or other BMCs.</description>
    <dc:date>2019-09-26T16:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6649">
    <title>CVE-2019-6649 (big-ip_access_policy_manager, big-ip_advanced_firewall_manager, big-ip_analytics, big-ip_application_acceleration_manager, big-ip_application_security_manager, big-ip_domain_name_system, big-ip_edge_gateway, big-ip_enterprise_manager, big-ip_fraud_protection_service, big-ip_global_traffic_manager, big-ip_link_controller, big-ip_local_traffic_manager, big-ip_policy_enforcement_manager, big-ip_webaccelerator)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6649</link>
    <description>F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.</description>
    <dc:date>2019-09-20T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6656">
    <title>CVE-2019-6656 (big-ip_access_policy_manager, big-ip_access_policy_manager_client)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6656</link>
    <description>BIG-IP APM Edge Client before version 7.1.8 (7180.2019.508.705) logs the full apm session ID in the log files. Vulnerable versions of the client are bundled with BIG-IP APM versions 15.0.0-15.0.1, 14,1.0-14.1.0.6, 14.0.0-14.0.0.4, 13.0.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5. In BIG-IP APM 13.1.0 and later, the APM Clients components can be updated independently from BIG-IP software. Client version 7.1.8 (7180.2019.508.705) and later has the fix.</description>
    <dc:date>2019-09-25T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8072">
    <title>CVE-2019-8072 (coldfusion)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8072</link>
    <description>ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Security bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8073">
    <title>CVE-2019-8073 (coldfusion)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8073</link>
    <description>ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Command Injection via Vulnerable component vulnerability. Successful exploitation could lead to Arbitrary code execution in the context of the current user.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8074">
    <title>CVE-2019-8074 (coldfusion)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8074</link>
    <description>ColdFusion 2018- update 4 and earlier and ColdFusion 2016- update 11 and earlier have a Path Traversal vulnerability. Successful exploitation could lead to Access Control Bypass in the context of the current user.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8075">
    <title>CVE-2019-8075 (flash_player, flash_player_desktop_runtime)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8075</link>
    <description>Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.</description>
    <dc:date>2019-09-27T16:15:10Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8288">
    <title>CVE-2019-8288 (online_store_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8288</link>
    <description>Vulnerability in Online Store v1.0, Stored XSS in user_view.php where adidas_member_user variable is not sanitized.</description>
    <dc:date>2019-10-01T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8289">
    <title>CVE-2019-8289 (online_store_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8289</link>
    <description>Vulnerability in Online Store v1.0, stored XSS in admin/user_view.php adidas_member_email variable</description>
    <dc:date>2019-10-01T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8290">
    <title>CVE-2019-8290 (online_store_system)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8290</link>
    <description>Vulnerability in Online Store v1.0, The registration form requirements for the member email format can be bypassed by posting directly to sent_register.php allowing special characters to be included and an XSS payload to be injected.</description>
    <dc:date>2019-10-01T20:15:11Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9232">
    <title>CVE-2019-9232 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9232</link>
    <description>In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9233">
    <title>CVE-2019-9233 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9233</link>
    <description>In wpa_supplicant_8, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122529021</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9234">
    <title>CVE-2019-9234 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9234</link>
    <description>In wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122465453</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9235">
    <title>CVE-2019-9235 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9235</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122323053</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9236">
    <title>CVE-2019-9236 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9236</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122322613</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9237">
    <title>CVE-2019-9237 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9237</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121325979</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9238">
    <title>CVE-2019-9238 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9238</link>
    <description>In the NFC stack, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121267042</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9239">
    <title>CVE-2019-9239 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9239</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121263487</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9240">
    <title>CVE-2019-9240 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9240</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121150966</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9241">
    <title>CVE-2019-9241 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9241</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121036603</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9242">
    <title>CVE-2019-9242 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9242</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121035878</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9243">
    <title>CVE-2019-9243 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9243</link>
    <description>In wpa_supplicant_8, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120905706</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9244">
    <title>CVE-2019-9244 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9244</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120865977</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9247">
    <title>CVE-2019-9247 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9247</link>
    <description>In AAC Codec, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120426166</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9249">
    <title>CVE-2019-9249 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9249</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120255805</description>
    <dc:date>2019-09-27T19:15:17Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9250">
    <title>CVE-2019-9250 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9250</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120276962</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9251">
    <title>CVE-2019-9251 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9251</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120274615</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9252">
    <title>CVE-2019-9252 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9252</link>
    <description>In libavc there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-73339042</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9253">
    <title>CVE-2019-9253 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9253</link>
    <description>In KeyStore, there is a possible storage of symmetric keys in the TEE instead of the strongbox due to a missing strongbox flag. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109769728</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9256">
    <title>CVE-2019-9256 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9256</link>
    <description>In libmediaextractor there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111921829</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9257">
    <title>CVE-2019-9257 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9257</link>
    <description>In Bluetooth, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113572342</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9258">
    <title>CVE-2019-9258 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9258</link>
    <description>In wifilogd, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113655028</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9259">
    <title>CVE-2019-9259 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9259</link>
    <description>In the Bluetooth stack, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113575306</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9260">
    <title>CVE-2019-9260 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9260</link>
    <description>In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113495295</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9261">
    <title>CVE-2019-9261 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9261</link>
    <description>In libxaac there is a possible out of bounds read due to missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116774214</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9262">
    <title>CVE-2019-9262 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9262</link>
    <description>In MPEG4Extractor, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution in the media extractor with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111792351</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9264">
    <title>CVE-2019-9264 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9264</link>
    <description>In libxaac there is a possible out of bounds read due to missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116774502</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9265">
    <title>CVE-2019-9265 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9265</link>
    <description>In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-37994606</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9266">
    <title>CVE-2019-9266 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9266</link>
    <description>In sensorservice, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-119501435</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9268">
    <title>CVE-2019-9268 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9268</link>
    <description>In libstagefright, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-77474014</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9269">
    <title>CVE-2019-9269 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9269</link>
    <description>In System Settings, there is a possible permissions bypass due to a cached Linux user ID. This could lead to a local permissions bypass with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-36899497</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9272">
    <title>CVE-2019-9272 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9272</link>
    <description>In WiFi, there is a possible leak of WiFi state due to a permissions bypass. This could lead to a local information disclosure which could be used to determine device location with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-11596047</description>
    <dc:date>2019-09-27T19:15:18Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9277">
    <title>CVE-2019-9277 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9277</link>
    <description>In the proc filesystem, there is a possible information disclosure due to log information disclosure. This could lead to local disclosure of app and browser activity with User execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-68016944</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9278">
    <title>CVE-2019-9278 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9278</link>
    <description>In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9279">
    <title>CVE-2019-9279 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9279</link>
    <description>In the wifi hotspot service, there is a possible denial of service due to a null pointer dereference. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-110476382</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9281">
    <title>CVE-2019-9281 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9281</link>
    <description>In GoogleContactsSyncAdapter, there is a possible path traversal due to improper input sanitization. This could lead to a bypass of user interaction requirements with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-32748076</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9282">
    <title>CVE-2019-9282 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9282</link>
    <description>In skia, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113211371</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9283">
    <title>CVE-2019-9283 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9283</link>
    <description>In AAC Codec, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112663564</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9284">
    <title>CVE-2019-9284 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9284</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure, with no additional privileges required. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111850706</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9285">
    <title>CVE-2019-9285 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9285</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111215315</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9286">
    <title>CVE-2019-9286 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9286</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111213909</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9287">
    <title>CVE-2019-9287 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9287</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-78287084</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9288">
    <title>CVE-2019-9288 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9288</link>
    <description>In libhidcommand_jni, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the USB service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111363077</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9289">
    <title>CVE-2019-9289 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9289</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79883824</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9290">
    <title>CVE-2019-9290 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9290</link>
    <description>In tzdata there is possible memory corruption due to a mismatch between allocation and deallocation functions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113039724</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9291">
    <title>CVE-2019-9291 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9291</link>
    <description>In Bluetooth, there is a possible remote code execution due to an improper memory allocation. This could lead to remote code execution in Bluetooth with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112159179</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9292">
    <title>CVE-2019-9292 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9292</link>
    <description>In the Activity Manager service, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of current foreground process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115384617</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9293">
    <title>CVE-2019-9293 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9293</link>
    <description>In libstagefright, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117661116</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9294">
    <title>CVE-2019-9294 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9294</link>
    <description>In libstagefright, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111764444</description>
    <dc:date>2019-09-27T19:15:19Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9295">
    <title>CVE-2019-9295 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9295</link>
    <description>In com.android.apps.tag, there is a possible bypass of user interaction requirements due to a missing permission check. This could lead to a to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-36885811</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9296">
    <title>CVE-2019-9296 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9296</link>
    <description>In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112162089</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9297">
    <title>CVE-2019-9297 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9297</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112890242</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9298">
    <title>CVE-2019-9298 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9298</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112892194</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9299">
    <title>CVE-2019-9299 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9299</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112663886</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9300">
    <title>CVE-2019-9300 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9300</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661610</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9301">
    <title>CVE-2019-9301 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9301</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112663384</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9302">
    <title>CVE-2019-9302 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9302</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661356</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9303">
    <title>CVE-2019-9303 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9303</link>
    <description>In libFDK, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661057</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9304">
    <title>CVE-2019-9304 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9304</link>
    <description>In libMpegTPDec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112662270</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9305">
    <title>CVE-2019-9305 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9305</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661835</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9306">
    <title>CVE-2019-9306 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9306</link>
    <description>In libMpegTPDec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661348</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9307">
    <title>CVE-2019-9307 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9307</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661893</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9308">
    <title>CVE-2019-9308 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9308</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112661742</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9309">
    <title>CVE-2019-9309 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9309</link>
    <description>In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to a to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117985575</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9310">
    <title>CVE-2019-9310 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9310</link>
    <description>In libFDK, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112891546</description>
    <dc:date>2019-09-27T19:15:20Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9311">
    <title>CVE-2019-9311 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9311</link>
    <description>In Bluetooth, there is a possible crash due to an integer overflow. This could lead to remote denial of service on incoming calls with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79431031</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9313">
    <title>CVE-2019-9313 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9313</link>
    <description>In libstagefright, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112005441</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9314">
    <title>CVE-2019-9314 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9314</link>
    <description>In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112329563</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9315">
    <title>CVE-2019-9315 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9315</link>
    <description>In libhevc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112326216</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9316">
    <title>CVE-2019-9316 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9316</link>
    <description>In libstagefright, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112052432</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9317">
    <title>CVE-2019-9317 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9317</link>
    <description>In libstagefright, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112052258</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9318">
    <title>CVE-2019-9318 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9318</link>
    <description>In libhevc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111764725</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9319">
    <title>CVE-2019-9319 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9319</link>
    <description>In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111762100</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9320">
    <title>CVE-2019-9320 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9320</link>
    <description>In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111761624</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9321">
    <title>CVE-2019-9321 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9321</link>
    <description>In libavc, there is a missing variable initialization. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111208713</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9322">
    <title>CVE-2019-9322 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9322</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111128067</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9323">
    <title>CVE-2019-9323 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9323</link>
    <description>In the Wallpaper Manager service, there is a possible information disclosure due to a missing permission check. Any application can access wallpaper image with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-30770233</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9325">
    <title>CVE-2019-9325 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9325</link>
    <description>In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112001302</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9326">
    <title>CVE-2019-9326 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9326</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111215173</description>
    <dc:date>2019-09-27T19:15:21Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9327">
    <title>CVE-2019-9327 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9327</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112050583</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9328">
    <title>CVE-2019-9328 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9328</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure, with no additional privileges required. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111895000</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9329">
    <title>CVE-2019-9329 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9329</link>
    <description>In Bluetooth, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure, with no additional privileges required. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112917952</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9330">
    <title>CVE-2019-9330 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9330</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111214739</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9331">
    <title>CVE-2019-9331 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9331</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112272279</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9332">
    <title>CVE-2019-9332 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9332</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-78286500</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9333">
    <title>CVE-2019-9333 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9333</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109753657</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9334">
    <title>CVE-2019-9334 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9334</link>
    <description>In libhevc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112859934</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9335">
    <title>CVE-2019-9335 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9335</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112328051</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9336">
    <title>CVE-2019-9336 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9336</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112326322</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9337">
    <title>CVE-2019-9337 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9337</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112204376</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9338">
    <title>CVE-2019-9338 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9338</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111762686</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9341">
    <title>CVE-2019-9341 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9341</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111214770</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9342">
    <title>CVE-2019-9342 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9342</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111214470</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9343">
    <title>CVE-2019-9343 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9343</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112050983</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9344">
    <title>CVE-2019-9344 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9344</link>
    <description>In NFC server, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120845341</description>
    <dc:date>2019-09-27T19:15:22Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9346">
    <title>CVE-2019-9346 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9346</link>
    <description>In libstagefright, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-128433933</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9347">
    <title>CVE-2019-9347 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9347</link>
    <description>In the m4v_h263 codec, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109891727</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9348">
    <title>CVE-2019-9348 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9348</link>
    <description>In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-128431761</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9349">
    <title>CVE-2019-9349 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9349</link>
    <description>In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124330204</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9350">
    <title>CVE-2019-9350 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9350</link>
    <description>In Keymaster, there is a possible EoP due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129562815</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9351">
    <title>CVE-2019-9351 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9351</link>
    <description>In SyncStatusObserver, there is a possible bypass for operating system protections that isolate user profiles from each other due to a missing permission check. This could lead to local limited information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-128599864</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9352">
    <title>CVE-2019-9352 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9352</link>
    <description>In libstagefright, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124253062</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9353">
    <title>CVE-2019-9353 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9353</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-123024201</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9354">
    <title>CVE-2019-9354 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9354</link>
    <description>In NFC server, there's a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118148142</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9355">
    <title>CVE-2019-9355 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9355</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-115903122</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9357">
    <title>CVE-2019-9357 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9357</link>
    <description>In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112662995</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9358">
    <title>CVE-2019-9358 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9358</link>
    <description>In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to a to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120156401</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9359">
    <title>CVE-2019-9359 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9359</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111407302</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9360">
    <title>CVE-2019-9360 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9360</link>
    <description>In the TEE, there's a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120610663</description>
    <dc:date>2019-09-27T19:15:23Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9361">
    <title>CVE-2019-9361 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9361</link>
    <description>In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111762807</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9362">
    <title>CVE-2019-9362 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9362</link>
    <description>In libSACdec, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120426980</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9363">
    <title>CVE-2019-9363 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9363</link>
    <description>In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-123584306</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9364">
    <title>CVE-2019-9364 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9364</link>
    <description>In AudioService, there is a possible trigger of background user audio due to a permissions bypass. This could lead to local information disclosure by playing the background user's audio with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-73364631</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9365">
    <title>CVE-2019-9365 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9365</link>
    <description>In Bluetooth, there is a possible deserialization error due to missing string validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109838537</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9366">
    <title>CVE-2019-9366 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9366</link>
    <description>In libSBRdec there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112052062</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9367">
    <title>CVE-2019-9367 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9367</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112106425</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9368">
    <title>CVE-2019-9368 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9368</link>
    <description>In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79883568</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9369">
    <title>CVE-2019-9369 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9369</link>
    <description>In Bluetooth, there is a use of uninitialized variable. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79995407</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9370">
    <title>CVE-2019-9370 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9370</link>
    <description>In sonivox, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-133880046</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9371">
    <title>CVE-2019-9371 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9371</link>
    <description>In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9372">
    <title>CVE-2019-9372 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9372</link>
    <description>In libskia, there is a possible crash due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132782448</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9373">
    <title>CVE-2019-9373 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9373</link>
    <description>In JobStore, there is a mismatched serialization/deserialization for the &amp;quot;battery-not-low&amp;quot; job attribute. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-130173029</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9374">
    <title>CVE-2019-9374 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9374</link>
    <description>In CompanionDeviceManager, there is a possible bypass of user interaction requirements due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129476618</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9375">
    <title>CVE-2019-9375 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9375</link>
    <description>In hostapd, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129344244</description>
    <dc:date>2019-09-27T19:15:24Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9376">
    <title>CVE-2019-9376 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9376</link>
    <description>In the Accounts package, there is a possible crash due to improper input validation. This could lead to permanent local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-129287265</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9378">
    <title>CVE-2019-9378 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9378</link>
    <description>In the Activity Manager service, there is a possible permission bypass due to incorrect permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124539196</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9379">
    <title>CVE-2019-9379 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9379</link>
    <description>In libstagefright, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124329638</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9380">
    <title>CVE-2019-9380 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9380</link>
    <description>In the settings UI, there is a possible spoofing vulnerability due to a missing permission check. This could lead to a user mistakenly changing permission settings with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-123700098</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9381">
    <title>CVE-2019-9381 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9381</link>
    <description>In netd, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122677612</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9382">
    <title>CVE-2019-9382 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9382</link>
    <description>In libeffects, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120874654</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9383">
    <title>CVE-2019-9383 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9383</link>
    <description>In NFC server, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120843827</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9384">
    <title>CVE-2019-9384 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9384</link>
    <description>In LockPatternUtils, there is a possible escalation of privilege due to an improper permissions check. This could lead to local bypass of the Lockguard with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120568007</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
  <item rdf:about="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9385">
    <title>CVE-2019-9385 (android)</title>
    <link>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-9385</link>
    <description>In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-120452956</description>
    <dc:date>2019-09-27T19:15:25Z</dc:date>
  </item>
</rdf:RDF>

