Sas microsoft office

broken image
broken image

XStream API: code execution via DeserializationĪn attacker can use a vulnerability via Deserialization of XStream API, in order to run code.ġ109925, CERTFR-2019-AVI-586, cpuapr2021, cpujan2021, cpujul2021, cpuoct2020, CVE-2019-10173, RHSA-2020:0445-01, VIGILANCE-VUL-30921

broken image

Computer vulnerabilities of SAS Add-in for Microsoft Office Apache Ant: file corruptionĪ local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Apache Ant.Ħ344075, cpuapr2021, cpujan2021, cpujul2020, cpujul2021, cpuoct2020, CVE-2020-1945, FEDORA-2020-52741b0a49, FEDORA-2020-7f07da3fef, openSUSE-SU-2020:1022-1, USN-4380-1, VIGILANCE-VUL-32379