tag:blogger.com,1999:blog-76546604059776652382024-03-28T16:30:37.028+02:00Блог за всичко полезноpippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.comBlogger1933125tag:blogger.com,1999:blog-7654660405977665238.post-45224767048986300082024-03-28T16:29:00.002+02:002024-03-28T16:29:44.598+02:00Върви, Народе Възродени...<p> Върви, народе възродени,</p><div><span id="text_glaven">към светли бъднини върви<br />С книжовността, таз сила нова,<br />съдбините си поднови!<br />Върви към мощната просвета,<br />в световните борби върви,<br />От длъжност неизменно воден -<br />и Бог ще те благослови!<br /><br />Напред! Науката е слънце,<br />което във душите грей!<br />Напред! Народността не пада<br />там, гдето знаньето живей!<br /><br />Безвестен беше ти, безславен!<br />О, влез в историята веч,<br />едно със другите славяни<br />кръстосай дух със огнен меч!<br /><br />Тъй солунските двама братя<br />насърчваха дедите ни...<br />О, минало незабравимо,<br />о, пресвещенни старини!<br /><br />България остана вярна<br />на достославний тоз завет -<br />в тържествованье и в страданье<br />извърши подвизи безчет...<br /><br /><br /></span></div><span id="text_glaven">И оригиналния текст<br /></span><table border="0" cellpadding="5" style="width: 667px;"><tbody><tr><td colspan="2" valign="top">текст Стоян Михайловски<br /><br /></td></tr><tr><td valign="top">Върви, народе възродени,<br />към светла бъднина върви,<br />с книжовността, таз сила нова,<br />ти чест и слава поднови!<br /><br />Върви към мощната просвета!<br />В световните борби върви,<br />/от длъжност неизменна воден -<br />и Бог ще те благослови! /2<br /><br />Напред! Науката е слънце,<br />което във душите грей!<br />Напред! Народността не пада<br />там, гдето знаньето живей!<br /><br />Безвестен беше ти, безславен!<br />О, влез в историята веч,<br />/духовно покори страните,<br />които завладя със меч! /2<br /><br />Тъй солунските двама братя<br />насърчваха дедите ни...<br />О, минало незабравимо,<br />о, пресвещени старини!<br /><br />България остана вярна<br />на достославний тоз завет -<br />/в тържествованье и в страданье<br />извърши подвизи безчет... /2<br /><br />Да, родината ни години<br />пресветли преживя, в беда<br />неописуема изпадна,<br />но върши дълга си всегда!<br /><br /><a href="http://www.tyxo.bg/?2534" target="_blank" title="Tyxo.bg counter"><img alt="Tyxo.bg counter" border="0" height="1" src="http://cnt.tyxo.bg/2534?rnd=1011444764&sp=1920x1080&r=http%3A//www.google.bg/url%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26cad%3Drja%26uact%3D8%26sqi%3D2%26ved%3D0CCkQFjAA%26url%3Dhttp%253A%252F%252F24-may.balkanfolk.com%252Ftext-notes-varvi-narode-vazrodeni.php%26ei%3Dfx97U-3pLeOV0QXn7YHoDg%26usg%3DAFQjCNHbMn-HSTx84wGNs_PDnHaKDBbNIA%26sig2%3DYwQOYAHqQjLqJBDXmg0G2Q%26bvm%3Dbv.67229260%2Cd.bGQ" width="1" /></a></td><td valign="top">Бе време, писмеността наша<br />кога обходи целий мир;<br />/за всесветовната просвета<br />тя бе неизчерпаем вир. /2<br /><br />Бе и тъжовно робско време...<br />тогаз балканский храбър син<br />навеждаше лице под гнета<br />на отомански властелин...<br /><br />Но винаги духът народен<br />подпорка търсеше у вас,<br />/о, мъдреци! През десет века<br />все жив остана ваший глас! /2<br /><br />О вий, които цяло племе<br />извлякохте из мъртвина,<br />народен гений възкресихте -<br />заспал в глубока тъмнина.<br /><br />Подвижници за права вяра,<br />сеятели на правда, мир,<br />/апостоли високославни,<br />звезди върху славянский мир, /2<br /><br />бъдете преблагословени,<br />о вий, Методий и Кирил,<br />отци на българското знанье,<br />творци на наший говор мил!<br /><br />Нек името ви да живее<br />във всенародната любов,<br />/речта ви мощна нек се помни<br />в славянството во век веков! /2</td></tr></tbody></table>pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-79436688405972167702023-10-11T18:01:00.000+03:002023-10-11T18:02:21.101+03:00Медицински въпросиВъпрос
<br>
<br>Здравейте, възможно ли е да бъде анулирано издадено направление
<br>/неизползвано/ от специалист /кардиолог за съдов хирург/ и да бъде
<br>преиздадено с по- късна дата. Благодаря предварително! М. Г.
<br>
<br>Отговор
<br>
<br>Ако направлението към специалист остане неизползвано, то не може да
<br>бъде „анулирано" при положение, че е отразено в амбулаторен лист,
<br>отчетен в РЗОК с електронния отчет за дейност през месеца. Тъй като не
<br>е разходен ресурс от определените на лекаря брой за специализирани
<br>медицински дейности и стойност за медико-диагностични дейности,
<br>пациентът може да уведоми общопрактикуващия (личния лекар) за това
<br>обстоятелство и той, ако прецени, може да му издаде друго направление.
<br>
<br>Всички здравноосигурени лица над 18-годишна възраст – жени и мъже,
<br>имат право на един задължителен профилактичен преглед годишно. Той се
<br>осъществява от личния лекар и включва: анамнеза и подробен статус,
<br>изчисляване на индекс на телесна маса, оценка на психичен статус,
<br>изследване на острота на зрение (ориентировъчно, без определяне на
<br>диоптри), измерване на артериално налягане, електрокардиограма (ЕКГ) и
<br>изследване на урина с тест-ленти в кабинет за: протеин, глюкоза,
<br>кетонни тела, уробилиноген/билирубин,
<br>Останалите изследвания, включени в обема на профилактичния преглед са
<br>в зависимост от възрастовата група, в която лицата попадат.
<br>Личният лекар преценява кога да Ви издаде направление за извършване на
<br>изследванията, съобразно изискванията за провеждане на профилактичните
<br>прегледи. При всички случаи той е задължен да извърши профилактичния
<br>преглед, на който Вие имате право веднъж в календарната година, в
<br>целия му обем.
<br>Подробна информация за прегледите и изследванията, които следва да
<br>бъдат извършени по време на профилактичния преглед, който личният
<br>лекар е задължен да проведе в рамките на календарната година, ще
<br>намерите на сайта на НЗОК – меню„НРД" – „Национален рамков договор
<br>2023-2025 г. за медицински дейности" – Приложение № 12 „Дейности на
<br>ОПЛ по имунопрофилактика, програма „Детско здравеопазване",
<br>профилактични прегледи на ЗОЛ над 18 години, формиране на групи от
<br>лица с рискови фактори за развитие на заболяване при ЗОЛ над 18
<br>години, профилактични дейности при ЗОЛ над 18 години с рискови фактори
<br>за развитие на заболяване ..." - Дейност на ОПЛ при провеждане на
<br>профилактични прегледи на ЗОЛ над 18-годишна възраст.
<br>
<br>Високоспециализираното изследване ядрено-магнитен резонанс (ЯМР) се
<br>извършва от лекар специалист по образна диагностика на основание на
<br>издадено "Направление за медико-диагностична дейност" (бл.МЗ-НЗОК№4)
<br>от лекар специалист от извънболничната помощ.
<br>Тъй като ЯМР е скъпоструващо изследване в обхвата на извънболничната
<br>помощ и направленията за него са ограничени, на лекарите специалисти
<br>е дадена допълнителна възможност да го назначават - освен от
<br>определените им средства за медико-диагностични дейности за
<br>тримесечието, и чрез допълнителни средства - допълнителен брой ЯМР,
<br>разпределяни от директора на съответната РЗОК.
<br>За целта лекарят специалист подготвя и представя в РЗОК мотивирано
<br>заявление за отпускане на направление за изследването ЯМР с
<br>придружаваща документация, установяваща необходимостта от извършването
<br>му.
<br>След завеждане на молбата и разглеждане на документите, се издава
<br>евентуално одобрение или отказ от директора на РЗОК, което лекарят
<br>специалист получава. Преценката е в зависимост от здравословното
<br>състояние на пациента на база на предоставената медицинска
<br>документация. Лекарят специалист по служебен път получава становището
<br>на директора и уведомява пациента. Пациентът няма ангажимент по
<br>отношение на попълването и изпращането на документите до директора на
<br>РЗОК.
<br>Пациентите не могат да бъдат принуждавани да избират медицински екип в
<br>лечебните заведения за болнична помощ. Случаите, в които
<br>здравноосигурените лица имат право срещу заплащане да получат
<br>допълнително поискани услуги, са ясно и конкретно определени в чл.24а
<br>от Наредбата за осъществяване правото на достъп до медицинска помощ и
<br>всяко искане да се заплатят други условия и/или услуги, извън
<br>посочените, е нарушение на нормативния акт. Освен това лечебните
<br>заведения са длъжни да поставят на общодостъпни места информация
<br>относно вида и цената на медицинските и други услуги, реда за
<br>използването и начина на заплащането им.
<br>
<br>НЗОК заплаща частично или напълно следните дентални дейности от пакета
<br>първична извънболнична дентална помощ за лица над 18-годишна възраст:
<br>
<br> а) обстоен преглед със снемане на орален статус, веднъж за
<br>съответната година, като доплащането от здравноосигуреното лице е 1,80
<br>лева.
<br>
<br> б) до три лечебни дейности, които могат да бъдат:
<br>
<br> - обтурация с химичен композит или амалгама (пломба), като
<br>доплащането от пациента е 4,00 лева.
<br>
<br>и/или
<br>
<br> - екстракция (изваждане) на постоянен зъб с анестезия (упойка),
<br>за което доплащането от пациента е 4,00 лева.
<br>
<br>В първичната дентална помощ за лица с психични заболявания над 18г.
<br>под обща анестезия пациентът не дължи доплащане.
<br>
<br>В специализираната извънболнична дентална помощ:
<br>
<br> а) специализиран обстоен преглед, като доплащането от
<br>здравноосигуреното лице е 1,80 лева.
<br>
<br> б) инцизия в съединителнотъканни ложи, включително анестезия -
<br>доплащането от пациента е 7,50 лева.
<br>
<br> в) екстракция на дълбоко фрактуриран или дълбоко разрушен зъб,
<br>включително анестезия - доплащането от пациента е 13,50 лева.
<br>
<br> г) контролен преглед след някоя от дейностите по букви "б" и "в",
<br>като доплащането от пациента е 0,80 лв.
<br>
<br>Отделно, в пакета дентални дейности са включени и до две дейности по
<br>възстановяване функцията на дъвкателния апарат при обеззъбени пациенти
<br>цялостно обеззъбени челюсти с цели зъбни протези (съответно по една за
<br>горна и долна челюст) полагащи се за срок от 4 години, в т.ч. и
<br>контролни прегледи до 2 месеца след поставяне на протезата.
<br>независимо от възрастта на пациента.
<br>
<br>Цената, която НЗОК заплаща обаче, не включва материала за протезата и
<br>медико-техническата дейност за изработката й.
<br>
<br>Извън регламентираното доплащане за дейности от бюджета на НЗОК,
<br>когато необходимото лечение не е включено в договорения пакет
<br>дентални дейности, както и ако здравноосигурените лица са получили
<br>полагащия им се обем дентални дейности или по време на
<br>лечебно-диагностичните дейности изрично предпочетат материали,
<br>средства или методики невключени в посочения пакет, пациентите дължат
<br>заплащане по цени на лечебното заведение.
<br>
<br>Съгласно последните промени в Закона за здравното осигуряване на
<br>България, чуждите граждани, на които е издадено разрешение за
<br>пребиваване и работа тип "Синя карта на ЕС", са задължително
<br>здравноосигурени лица в България. Техният ЛНЧ трябва да бъде
<br>регистриран в Националната агенция за приходите (НАП), която е
<br>компетентната институция в България относно включването на лицата в
<br>системата на задължителното здравно осигуряване. След като справката
<br>на НАП „Здравноосигурителен статус" покаже, че лицето е с непрекъснати
<br>здравноосигурителни права, то има право да се включи в българската
<br>здравноосигурителна система и да изберете личен лекар.pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-55324637424385286612023-03-16T18:49:00.001+02:002023-03-16T18:49:23.353+02:00Weekly Digest: new photo essay from the Department of Defense (1 item)<div dir="ltr"><div class="gmail_quote"><br><br><div class="msg-227773134103483551"><u></u> <div class="m_-227773134103483551body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-227773134103483551mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-227773134103483551content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none" href="http://www.defense.gov?CollectionId=19529" target="_blank"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#5b7ca7!important"> Planting Peace With Partners </font> </h2> </td> <td width="30" align="right"> <img width="15" border="0" valign="middle" align="right" style="vertical-align:middle;border:0;border-style:none;margin:0;padding:0" src="https://web-assets.ifttt.com/images/email-chevron-right-gray.png"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> <b>Planting Peace With Partners</b><br> By Alicia Brown<br> U.S. service members helped cultivate valuable relationships during a recent event to plant "peace trees" in the village of Damerjog, Djibouti.<br> <br> Published February 16, 2022 at 07:00AM<br> <a href="http://www.defense.gov?CollectionId=19529" target="_blank">View more at https://defense.gov</a><br> <br> <a href="http://www.defense.gov?CollectionId=19529" style="color:#000000!important;text-decoration:underline" target="_blank">February 17, 2022 at 04:22AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via Department of Defense <a style="color:#000000!important;text-decoration:underline">http://www.defense.gov?CollectionId=19529</a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-227773134103483551footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYU-2BdP-2FWkeIRvKk-2F-2BP61FkkSw6jdFfB2dP-2FOu-2BRuXVz9DBbl-2FzujRza8TGlLn8-2FUYUF6t7Oo-2BaPk5QK0l60USfCxfUzdbL5f8DfInqABl2IlhUgti9Y3vfWfaZ5hMTmwMKLoQbCR-2FO32LRpGILTmVGU-2F6a5bLNa5iHLiUFU2TeD8uyiJVJXK-2B86VDTzMnMacYHeAd-2F-2BzAvQo6f1kcf-2FQzDcEfUtUaU8gBURZ0PeX-2Bj-2B-2B3YctaM-2BX-2BTJiXYACANirJcz" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-91242849820856240002023-03-16T18:48:00.003+02:002023-03-16T18:49:00.013+02:00Weekly Digest: New diabetes clinical trial (9 items)<div dir="ltr"><div class="gmail_quote"><div class="msg324704202935445189"><div class="m_324704202935445189body"><table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_324704202935445189mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_324704202935445189content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Heat Therapy in Patients With Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 14, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Insulin Resistance<br> <b>Interventions</b>: Procedure: Passive heating; Procedure: Thermoneutral<br> <b>Sponsor</b>: University of Pecs<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05237219?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05237219?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 14, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: In-Home Study With MiniMed™ 780G Pump Automated Control in Type 2-Evaluation of the AHCL System in Adults With Insulin-requiring Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 14, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes Treated With Insulin<br> <b>Intervention</b>: Device: MiniMed™ 780G Insulin Pump system<br> <b>Sponsor</b>: Medtronic Diabetes<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05238142?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05238142?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 14, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Clinical Utility Trial for the SomaLogic CVD-T2D Test </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 14, 2022 at 07:00PM<br> <b>Conditions</b>: Cardiovascular Diseases; Type 2 Diabetes<br> <b>Interventions</b>: Other: Educational Materials on the Cardiovascular Disease in Type 2 Diabetes (CVD-T2D); Other: Educational Materials on the CVD-T2D and Bundled Metabolic Panel<br> <b>Sponsors</b>: Qure Healthcare, LLC; SomaLogic, Inc.<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05237271?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05237271?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 14, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Serum Endocan Levels and Gestational Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 14, 2022 at 07:00PM<br> <b>Conditions</b>: Gestational Diabetes; Endocan<br> <b>Intervention</b>: Diagnostic Test: Serum Endocan Levels<br> <b>Sponsor</b>: Gaziosmanpasa Research and Education Hospital<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05237895?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05237895?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 14, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The POWERED Study: Prophylaxis With Metformin to Prevent PTDM </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 15, 2022 at 07:00PM<br> <b>Conditions</b>: Post-transplant Diabetes Mellitus; New Onset Diabetes After Transplant; New Onset Diabetes After Transplantation; Kidney Transplant; Complications; Renal Transplantation; End Stage Renal Disease; Metformin<br> <b>Interventions</b>: Drug: Metformin; Drug: Placebo<br> <b>Sponsor</b>: Barts & The London NHS Trust<br> <b>Active, not recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05240274?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05240274?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 15, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Medication Review in Patients With Schizophrenia and Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 16, 2022 at 07:00PM<br> <b>Conditions</b>: Schizophrenia; Diabetes; Metabolic Syndrome<br> <b>Intervention</b>: Other: medication review<br> <b>Sponsors</b>: Psychiatric Research Unit, Region Zealand, Denmark; Steno Diabetes Center Sjaelland; Region Zealand<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05243160?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05243160?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 16, 2022 at 04:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Afrezza With Basal Combination </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 17, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Interventions</b>: Biological: Afrezza (insulin human) Inhalation Powder; Biological: insulin degludec; Device: Continuous Subcutaneous Insulin Infusion (CSII) pump with Automatic Insulin Delivery (AID)<br> <b>Sponsor</b>: Mannkind Corporation<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05243628?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05243628?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 17, 2022 at 02:23PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effect of Insulin Staging in the Context of Pharmaceutical Care on Patients With Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 17, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes Mellitus<br> <b>Intervention</b>: Other: Pharmaceutical care and insulin staging.<br> <b>Sponsor</b>: University of Sulaimani<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05244200?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05244200?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 17, 2022 at 02:23PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Digital Lifestyle Intervention For Diabetes/Pre-Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 18, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes; PreDiabetes; Obesity<br> <b>Interventions</b>: Behavioral: Digital Intensive Lifestyle Intervention; Behavioral: Digital Self-Help Control Condition<br> <b>Sponsor</b>: The University of Hong Kong<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05247437?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05247437?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 18, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_324704202935445189footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmFa0dQ-2BOYKEV-2Fqb3l28k4I7Fhaf9Pm4jIzShQyh-2FjzURAjEV1GEwQxX5RqosTeC-2Be8UGuXFAEdGYFNeFKE-2FKU6GFZPEI-2Bwl9kJAUS8IuczD-2F1Vui5gcRSmCt-2BuJtaugtxacria6s7pihTlWoXfUwDjkIpCySJjjuQCcXPJDes4hcXQCp7Wk0nXJ223ENs9RcVlF6-2F9uVrN8jIzErub-2B-2B8Jy6gDILu21u297ZSh1nU6fPYyX85ktemWkDKNLoPdBjpw-3D-3D" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-16050483285178964032023-03-16T18:48:00.001+02:002023-03-16T18:48:33.539+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (42 items)<div dir="ltr"><div class="gmail_quote"><br><br><div class="msg-5882237759109433009"><u></u> <div class="m_-5882237759109433009body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-5882237759109433009mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-5882237759109433009content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-43943 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Affected versions of Atlassian Jira Service Management Server and Data Center allow attackers with administrator privileges to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the "Object Schema" field of /secure/admin/InsightDefaultCustomFieldConfig.jspa. The affected versions are before version 4.21.0.<br> Published at: February 24, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43943" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-35689 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A potential vulnerability in the Oracle Talent Acquisition Cloud - Taleo Enterprise Edition. This high severity potential vulnerability allows attackers to perform remote code execution on Taleo Enterprise Edition system. Successful attacks of this vulnerability can result in unauthorized remote code execution within Taleo Enterprise Edition and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Talent Acquisition Cloud - Taleo Enterprise Edition. All affected customers were notified of CVE-2021-35689 by Oracle.<br> Published at: February 24, 2022 at 05:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35689" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26092 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.<br> Published at: February 24, 2022 at 05:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26092" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3876 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3876" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3873 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3873" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3871 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3871" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3870 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3870" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3868 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3868" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-3867 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3867" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25636 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25636" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-27467 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Directory Traversal vulnerability exits in Processwire CMS before 2.7.1 via the download parameter to index.php.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27467" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-25058 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.<br> Published at: February 24, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-25058" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26252 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in htmldoc in v1.9.12. Heap buffer overflow in pspdf_prepare_page(),in ps-pdf.cxx may lead to execute arbitrary code and denial of service.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26252" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14504 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The web interface of the 1734-AENTR communication module mishandles authentication for HTTP POST requests. A remote, unauthenticated attacker can send a crafted request that may allow for modification of the configuration settings.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14504" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14502 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The web interface of the 1734-AENTR communication module is vulnerable to stored XSS. A remote, unauthenticated attacker could store a malicious script within the web interface that, when executed, could modify some string values on the homepage of the web interface.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14502" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14481 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an administrative account, an attacker could gain full access to the user’s operating system and certain components of FactoryTalk View SE.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14481" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14480 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Due to usernames/passwords being stored in plaintext in Random Access Memory (RAM), a local, authenticated attacker could gain access to certain credentials, including Windows Logon credentials.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14480" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14478 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A local, authenticated attacker could use an XML External Entity (XXE) attack to exploit weakly configured XML files to access local or remote content. A successful exploit could potentially cause a denial-of-service condition and allow the attacker to arbitrarily read any local file via system-level services.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14478" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-10640 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10640" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-10636 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Inadequate encryption may allow the passwords for Emerson OpenEnterprise versions through 3.3.4 user accounts to be obtained.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10636" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-10635 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Simulation models for KUKA.Sim Pro version 3.1 are hosted by a server maintained by KUKA. When these devices request a model, the server transmits the model in plaintext.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10635" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-10632 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Inadequate folder security permissions in Emerson OpenEnterprise versions through 3.3.4 may allow modification of important configuration files, which could cause the system to fail or behave in an unpredictable manner.<br> Published at: February 24, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10632" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23495 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The package karma before 6.3.16 are vulnerable to Open Redirect due to missing validation of the return_url query parameter.<br> Published at: February 25, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23495" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22489 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22489" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22480 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22480" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22479 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22479" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22478 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The interface of a certain HarmonyOS module has a UAF vulnerability. Successful exploitation of this vulnerability may lead to information leakage.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22478" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22448 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22448" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22441 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Some Huawei products have an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to kernel crash.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22441" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22437 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22437" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22434 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22434" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22433 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22433" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22432 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22432" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22431 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22431" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22430 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22430" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22429 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22429" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22426 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22426" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22395 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22395" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22394 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22394" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22319 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows.<br> Published at: February 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22319" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36516 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.<br> Published at: February 26, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36516" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 26, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-27958 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Job Composer app in Ohio Supercomputer Center Open OnDemand before 1.7.19 and 1.8.x before 1.8.18 allows remote authenticated users to provide crafted input in a job template.<br> Published at: February 26, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27958" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 26, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-5882237759109433009footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackBwfFVaI63BC30GyNs9wPaM4M1UpDh7ziYuMbW6Cq6FnrJVD3faGbM9IEYGBgpPRiBMarUScukTjmcxO-2Bv-2FTQsCnkLbbgRozmDo-2BBKR9-2B-2FnNBfIqv-2BEU-2B9OdZHFY-2FKVMRghiu3QQS-2FHdneOziJBprrE4xLL-2BCgz3-2BG0gRlo7MCs9NIhFI4znmqwtg5-2FF8wmlG-2F9flntFjEjunn-2FhjQZX-2F8-2FFe-2Fdbdo38liCrO3xWNaElx" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-20612554401841347342023-03-16T18:47:00.002+02:002023-03-16T18:48:02.379+02:00Weekly Digest: New diabetes clinical trial (14 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg9082029843477956872"><u></u> <div class="m_9082029843477956872body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_9082029843477956872mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_9082029843477956872content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Efficacy, Safety and Pharmacokinetics Study of CPL207280 After 2-weeks Administration in Subjects With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 21, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Interventions</b>: Drug: CPL207280; Drug: Placebo<br> <b>Sponsors</b>: Celon Pharma SA; National Center for Research and Development, Poland<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05248776?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05248776?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 21, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: "Efficacy of Once Weekly GLP 1 Analogue: Semaglutide. A Multicenter Experience From Pakistan." </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 22, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Weight Change, Body<br> <b>Intervention</b>: Drug: Semaglutide Pen Injector<br> <b>Sponsors</b>: Aga Khan University; Rehman Medical Institute - RMI<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05249881?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05249881?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 22, 2022 at 02:23PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Evaluation of Laser Lancing Devices in Adult Type 2 Diabetes Patients </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 22, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Intervention</b>: Device: laser lancing device or lancet for blood glucose level measurement<br> <b>Sponsors</b>: Korea University Guro Hospital; Korea Medical Device Development Fund<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05251506?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05251506?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 22, 2022 at 02:23PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Altered Faecal Microbiome and Metabolome in CT1D, AT1D and T2D </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 23, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes Mellitus Maturity Onset<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Second Xiangya Hospital of Central South University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05252728?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05252728?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 23, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effect of Education Based on The Health Belief Model on Healthy Lifestyle Behaviors in Individuals With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 23, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Intervention</b>: Behavioral: Education based on the health belief model<br> <b>Sponsor</b>: Gazi University<br> <b>Active, not recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05252793?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05252793?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 23, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Effect of Sensorial Biodex Balance Balance System Exercises in Diabetic Neuropathy </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 24, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetic Neuropathies; Diabetes Mellitus; Exercise Training<br> <b>Intervention</b>: Device: Biodex Balance Exercise System<br> <b>Sponsor</b>: Duygu AKTAR REYHANIOGLU<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05255497?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05255497?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Dietary Guidelines 3 Diet Patterns Study (DG3D): Phase 2 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 24, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Obesity<br> <b>Intervention</b>: Behavioral: Dietary Intervention Classes<br> <b>Sponsor</b>: University of South Carolina<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05254496?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05254496?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study to Learn How Well the Treatment Combination of Finerenone and Empagliflozin Works and How Safe it is Compared to Each Treatment Alone in Adult Participants With Long-term Kidney Disease (Chronic Kidney Disease)... </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 24, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes Mellitus; Chronic Kidney Disease<br> <b>Interventions</b>: Drug: Finerenone (Kerendia, BAY94-8862 ); Drug: Empagliflozin; Drug: Placebo<br> <b>Sponsor</b>: Bayer<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05254002?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05254002?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Safety and Efficacy of Human Microbiota Transplantation for Overweight and Obese Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 24, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes Mellitus; Overweight and Obesity<br> <b>Interventions</b>: Biological: Fecal microbiota transplant (FMT); Other: normal saline and glycerin/food coloring<br> <b>Sponsors</b>: Zhujiang Hospital; First Affiliated Hospital of Shantou University Medical College; Dongguan People's Hospital; Shenzhen Hengsheng Hospital; The Fifth People's Hospital of Zhuhai; Dongguan Wanjiang Hospital; Shaoguan Qide Hospital; People's Hospital of Wengyuan County, Shaoguan; Zhaoqing First People's Hospital; Suixi Hospital of Guangdong Medical University; Shenzhen University General Hospital<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05253768?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05253768?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 24, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Closing the Loop in Adults With Type 1 Diabetes Under Free Living Conditions (AP@Home04_Phase 4) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 25, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Interventions</b>: Device: Hybrid closed-loop using ultra-rapid insulin lispro; Device: Hybrid closed-loop using standard insulin lispro<br> <b>Sponsor</b>: University of Cambridge<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05257460?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05257460?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: An Analysis to Assess Non-adherence in People With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 25, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Hypertension; Medication Adherence<br> <b>Intervention</b>: Other: chemical adherence test, medication adherence questionnaire, pharmacy refill rate<br> <b>Sponsor</b>: University of Leicester<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05256875?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05256875?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: SomaSignal Tests on Medical Management and Change in Risk in Patients With Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 25, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Diagnostic Test: SomaSignal Informed Medical Management SSCVD; Other: Standard of Care<br> <b>Sponsors</b>: Emory University; SomaLogic, Inc.<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05256706?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05256706?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Exercise Timing and Gestational Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 25, 2022 at 07:00PM<br> <b>Conditions</b>: Pregnancy Related; Diabetes; Diabete Mellitus; Type 2 Diabetes; Pre-diabetes; Exercise<br> <b>Interventions</b>: Behavioral: 30-minute walking intervention; Behavioral: 10-minute<br> <b>Sponsor</b>: University of Alberta<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05256615?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05256615?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Investigation of Critically Ill Patients With Newly Diagnosed Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 25, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus<br> <b>Intervention</b>: Diagnostic Test: Diabetes Diagnosis<br> <b>Sponsor</b>: Stamford Hospital<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05256043?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05256043?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 25, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_9082029843477956872footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmFlpkiF8aNiNE6QKGwLKqcfJcepBs7YZt-2BqDA4QCGhKK44C9FLkU9rV0g6ZuBtVWrwZ9JR-2BiRqbQYgk4TqFDeOjF7LvOzc7HEMglI-2Fqz3LamOAn5ftNN7lmjIN5TyNWZ5Ik-2BwyMxsu1bdCSZVUsw3iG9yuDpOcnJaN-2BP4uu4OsUPMEBlgNy2FOVU84hE6FpUuIMdWcyjl33uzfcOV0rPu-2F4DGpHl-2FG30OGv7uBMouZCe" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-77967495791199557632023-03-16T18:47:00.001+02:002023-03-16T18:47:28.721+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (30 items)<div dir="ltr"><div class="gmail_quote"><div dir="ltr" class="gmail_attr"><br></div><br><div class="msg5750610298172804952"><u></u> <div class="m_5750610298172804952body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_5750610298172804952mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_5750610298172804952content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-21708 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.<br> Published at: February 27, 2022 at 10:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21708" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 27, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36510 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The 15Zine WordPress theme before 3.3.0 does not sanitise and escape the cbi parameter before outputing it back in the response via the cb_s_a AJAX action, leading to a Reflected Cross-Site Scripting<br> Published at: February 28, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36510" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-22845 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted FTP requests.<br> Published at: February 28, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-22845" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-22844 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.<br> Published at: February 28, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-22844" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-12775 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Hicos citizen certificate client-side component does not filter special characters for command parameters in specific web URLs. An unauthenticated remote attacker can exploit this vulnerability to perform command injection attack to execute arbitrary system command, disrupt system or terminate service.<br> Published at: March 01, 2022 at 04:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12775" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 01, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-4925 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A security vulnerability in the Spectrum Scale 5.0 and 5.1 allows a non-root user to overflow the mmfsd daemon with requests and preventing the daemon to service other requests. IBM X-Force ID: 191599.<br> Published at: March 01, 2022 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4925" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 01, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-15936 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets.<br> Published at: March 01, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15936" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 01, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23206 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in htmldoc in v1.9.12 and prior. A stack buffer overflow in parse_table() in ps-pdf.cxx may lead to execute arbitrary code and denial of service.<br> Published at: March 03, 2022 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23206" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23192 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request, and chose to fragment it, an attacker could replace later fragments with their own data, bypassing the signature requirements.<br> Published at: March 03, 2022 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23192" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23191 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A security issue was found in htmldoc v1.9.12 and before. A NULL pointer dereference in the function image_load_jpeg() in image.cxx may result in denial of service.<br> Published at: March 03, 2022 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23191" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23180 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in htmldoc in v1.9.12 and before. Null pointer dereference in file_extension(),in file.c may lead to execute arbitrary code and denial of service.<br> Published at: March 03, 2022 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23180" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22695 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22695" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22694 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22694" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22693 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22693" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22692 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22692" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22691 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22691" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22690 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22690" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22689 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22689" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22688 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22688" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22687 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22687" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22686 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.<br> Published at: March 04, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22686" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23214 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.<br> Published at: March 04, 2022 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23214" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18327 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Scripting (XSS) vulnerability exists in Alfresco Alfresco Community Edition v5.2.0 via the action parameter in the alfresco/s/admin/admin-nodebrowser API. Fixed in v6.2<br> Published at: March 04, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18327" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18326 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.<br> Published at: March 04, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18326" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18325 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.<br> Published at: March 04, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18325" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18324 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q parameter in the Kickstart template.<br> Published at: March 04, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18324" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20319 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.<br> Published at: March 04, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20319" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20303 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.<br> Published at: March 04, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20303" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20302 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.<br> Published at: March 04, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20302" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20300 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.<br> Published at: March 04, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20300" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_5750610298172804952footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB7s-2F7Fd3-2Boa-2FFPSjtwjpow3hFdBB0hhzY3wfK-2BJOMeU-2FagX0PiVX8c6jsoNIyRa7lCGsmsA-2BepbNGMido850SZg60TQD0gtvBBIClnK8zVnMxbRBj4rSRu5xji1Kc5Vir8qNZJVPR6gQhOIjmFY9bcnSBb4vX2d1TL0hwXi47f8rBb4xh4omOf9kmrI0noZwmM7uO8Xrwxcnji6v4SBpTmqMqm5aegfFNkRnU2-2F4Obmx" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-57371262233299744832023-03-16T18:46:00.001+02:002023-03-16T18:46:29.187+02:00Weekly Digest: New diabetes clinical trial (26 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg4192174996443528359"><u></u> <div class="m_4192174996443528359body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_4192174996443528359mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_4192174996443528359content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Efficacy of Educational Nutrition and Exercise on the Regulation of Appetite Through Exosomes in Type 2 Diabetics </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 28, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Behavioral: Nutritional education program; Other: The High-Intensity Interval Training (HIIT); Other: The Moderate-Intensity Continuous Training (MICT)<br> <b>Sponsors</b>: University of Cadiz; Ministerio de Ciencia e Innovación, Spain<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05259449?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05259449?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Ectopic Fat in Singaporean Women - the Culprit Leading to Gestational Diabetes, Metabolic Syndrome, and Type 2 Diabetes (TANGO Study) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 28, 2022 at 07:00PM<br> <b>Condition</b>: Non-Alcoholic Fatty Liver Disease<br> <b>Interventions</b>: Other: Lifestyle Advice; Other: Diet Intervention; Other: OCFA Meal-Based Diet-Intervention<br> <b>Sponsors</b>: Singapore Institute for Clinical Sciences; Wilmar International Limited; SATA CommHealth (Singapore); National University Polyclinics, Singapore; National University, Singapore<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05259475?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05259475?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Research Study to See How Well the New Weekly Medicine IcoSema, Which is a Combination of Insulin Icodec and Semaglutide, Controls Blood Sugar Level in People With Type 2 Diabetes Compared to Weekly Semaglutide (COMB... </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 28, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Drug: IcoSema; Drug: Semaglutide 1 mg<br> <b>Sponsor</b>: Novo Nordisk A/S<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05259033?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05259033?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Glycemic Variations During the Menstrual Cycle in Women With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 28, 2022 at 07:00PM<br> <b>Condition</b>: Type1diabetes<br> <b>Interventions</b>: Device: Continuous glucose monitoring; Drug: Insulin; Other: Premenstrual symptoms; Other: Ovulation kits; Device: Fitbit Inspire 2; Other: Keenoa; Other: Menstrual cycle<br> <b>Sponsor</b>: Institut de Recherches Cliniques de Montreal<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05258292?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05258292?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: D-HOMES Randomized Pilot Trial </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: February 28, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Housing Problems; Psychological Distress<br> <b>Interventions</b>: Behavioral: Diabetes Homeless Medication Support (D-Homes); Behavioral: Brief diabetes education<br> <b>Sponsors</b>: Hennepin Healthcare Research Institute; National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK)<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05258630?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05258630?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">February 28, 2022 at 11:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The FreeStyle Libre Enabled Reduction of A1c Through Effective Eating and Exercise Study </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Behavioral: LIBERATE<br> <b>Sponsors</b>: Western University, Canada; Abbott Diabetes Care<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05261906?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05261906?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study to Evaluate Tirzepatide (LY3298176) in Pediatric and Adolescent Participants With Type 2 Diabetes Mellitus Inadequately Controlled With Metformin or Basal Insulin or Both </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 01, 2022 at 07:00PM<br> <b>Conditions</b>: Type2 Diabetes; Diabetes Mellitus; Diabetes Mellitus, Type 2; T2D; T2DM (Type 2 Diabetes Mellitus); Glucose Metabolism Disorders; Endocrine System Diseases; Metabolic Disease<br> <b>Interventions</b>: Drug: Tirzepatide Dose 1; Drug: Tirzepatide Dose 2; Drug: Placebo<br> <b>Sponsor</b>: Eli Lilly and Company<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05260021?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05260021?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Metabolic Effects of Natural Office Light in Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 2; Circadian Dysregulation<br> <b>Intervention</b>: Other: Natural or artificial office light exposure<br> <b>Sponsors</b>: Maastricht University; Velux Fonden; University of Geneva, Switzerland<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05263232?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05263232?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Keto Drinks as a Meal Primer in Patients With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes; Ketoses, Metabolic<br> <b>Intervention</b>: Dietary Supplement: 3-hydroxybutyrate<br> <b>Sponsors</b>: University of Aarhus; Aarhus University Hospital<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05263401?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05263401?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study to Look at How Insulin NNC0471-0119 Works in the Body in People With Type 1 Diabetes When Injected by Insulin Pump </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 1<br> <b>Interventions</b>: Drug: NNC0471-0119 A; Drug: NNC0471-0119 B; Drug: NNC0471-0119 D; Drug: Faster aspart<br> <b>Sponsor</b>: Novo Nordisk A/S<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05262595?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05262595?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Comparison of Two Oral Hygiene Routines on the Glycemic Control for Type 2 Diabetes Patients With Chronic Periodontitis </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 01, 2022 at 07:00PM<br> <b>Conditions</b>: Periodontal Diseases; Diabetes Mellitus<br> <b>Intervention</b>: Device: Electric toothbrush with smart phone app<br> <b>Sponsor</b>: Harvard School of Dental Medicine<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05260814?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05260814?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Effects of Pilates on Functional Capacity and Blood Glucose Levels in Adults With Diabetes Type 2 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes Mellitus<br> <b>Interventions</b>: Other: pilates exercise; Other: brisk walk<br> <b>Sponsor</b>: Riphah International University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05261776?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05261776?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of LY900014 (Lyumjev) Versus Insulin Lispro (Humalog) in Participants With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 1<br> <b>Interventions</b>: Drug: Lyumjev; Drug: Humalog<br> <b>Sponsor</b>: Eli Lilly and Company<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05262387?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05262387?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Evaluation and Intervention of Cognitive Function in Patients With Diabetes Mellitus. </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Condition</b>: Type2 Diabetes<br> <b>Interventions</b>: Drug: Metformin; Drug: Dapagliflozin; Behavioral: Lifestyle intervention<br> <b>Sponsor</b>: The First Affiliated Hospital with Nanjing Medical University<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05262257?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05262257?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Clinical Guideline-based Management of Type-2 Diabetes by Ayurvedic Practitioners in Nepal </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 01, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetes; Type2Diabetes; Diabetes Mellitus<br> <b>Interventions</b>: Combination Product: Clinical Guideline based Management; Other: Comparator<br> <b>Sponsors</b>: Nepal Health Research Council; University of Nottingham<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05259735?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05259735?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Prepare for Your Diabetes Care </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 02, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes Mellitus With Hypoglycemia; Aging; Patient Activation<br> <b>Interventions</b>: Behavioral: Prepare for Your Diabetes Care; Behavioral: Usual Care<br> <b>Sponsors</b>: Kaiser Permanente; National Institute on Aging (NIA)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05263310?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05263310?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Potential Effectiveness of the Diabetes Prevention Program in the Peri-urban Area of Bamako, Mali </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 01, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Behavioral: Diabetes prevention program<br> <b>Sponsors</b>: University Clinical Research Center, Mali; Columbia University; Hpi Institute; Fogarty International Center of the National Institute of Health<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05260879?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05260879?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Acceptance and Commitment Therapy Principles for Diabetes Prevention </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 01, 2022 at 07:00PM<br> <b>Conditions</b>: PreDiabetes; Diabetes Mellitus, Type 2; Diabetes; Diabetes type2<br> <b>Interventions</b>: Behavioral: Diabetes Prevention Education and Acceptance and Commitment Therapy; Behavioral: Diabetes Prevention Education Only<br> <b>Sponsor</b>: University of Oregon<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05260983?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05260983?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 02, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Eating Disorder Prevention Program for Women With T1D </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 03, 2022 at 07:00PM<br> <b>Conditions</b>: Eating Disorders; Type 1 Diabetes<br> <b>Interventions</b>: Behavioral: Diabetes Body Project; Behavioral: Educational Control<br> <b>Sponsor</b>: Stanford University<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05264376?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05264376?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Gestational Diabetes Mellitus (GDM) in Pregnant Women </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 03, 2022 at 07:00PM<br> <b>Conditions</b>: Gestational Diabetes Mellitus; Pregnancy Complications<br> <b>Intervention</b>: Behavioral: Recommended Diet<br> <b>Sponsors</b>: Long Island University; BROOKLYN INNOSEQ INC.<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05265741?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05265741?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Implementation and Evaluation of a Diabetes Prevention Clinical Pathway in Primary Care </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 03, 2022 at 07:00PM<br> <b>Conditions</b>: PreDiabetes; Prediabetic State<br> <b>Intervention</b>: Other: START diabetes prevention clinical pathway<br> <b>Sponsors</b>: Johns Hopkins University; National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05265312?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05265312?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 03, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Prevalence of Hypertension in Type-2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 04, 2022 at 07:00PM<br> <b>Condition</b>: Prevalence of Elevated Blood Pressure in Type-2 Diabetics<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Kabul University of Medical Sciences<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05266885?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05266885?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Pancreatic Enzyme Replacement and Glucose Regulation in Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 04, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Interventions</b>: Drug: CREON; Drug: Placebo<br> <b>Sponsor</b>: Vanderbilt University Medical Center<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05266963?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05266963?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Digital Therapeutic Based Randomized Investigation to Improve Glycemic Control in Patients With Type 2 Diabetes and Residual Hyperglycemia on Stable Medical Therapy (BRIGHT) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 04, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Behavioral: PHOENIX; Other: Sham Controlled App<br> <b>Sponsors</b>: Better Therapeutics; CPC Clinical Research; University of Colorado, Denver<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05266625?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05266625?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Investigation of the Effect of Web-based Education on Self-Care Management and Family Support in Women With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 04, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Type 2<br> <b>Intervention</b>: Other: web based education<br> <b>Sponsor</b>: Ankara Yildirim Beyazıt University<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05266742?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05266742?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Associations of Plasma Vanadium Concentrations With Gestational Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 04, 2022 at 07:00PM<br> <b>Condition</b>: Gestational Diabetes<br> <b>Intervention</b>: Other: Plasma vanadium concentration<br> <b>Sponsor</b>: Liegang Liu<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05267457?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05267457?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 04, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_4192174996443528359footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmMkS-2FY9kjCGq7NeKXfKP5JOuXbX6bUc8w-2Bibv3XqdFuxBOF-2BvXrWQIUiWYgo2hQYu-2B2-2BIjoUPzhWdNqoZ6IjtU-2FMyWRgGjyqAoYtCkpKES-2Fa13cG1ryPRPZ3ohIXT-2BRkE0ZtniJt5XTTL8QSwcKcQAh6OeqnZ4BolS-2BOCI-2Fmdzb6X401RRG5lNGX21WYje26CyUTfe3-2BkrKKV62Bp978t9vwfbs9s5THwvaCZiFeX-2Bvw" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-37813269490680495992023-03-16T18:45:00.001+02:002023-03-16T18:45:52.929+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (26 items)<div dir="ltr"><div class="gmail_quote"><br><br><div class="msg-1796189195636630531"><u></u> <div class="m_-1796189195636630531body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-1796189195636630531mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-1796189195636630531content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24824 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The [field] shortcode included with the Custom Content Shortcode WordPress plugin before 4.0.1, allows authenticated users with a role as low as contributor, to access arbitrary post metadata. This could lead to sensitive data disclosure, for example when used in combination with WooCommerce, the email address of orders can be retrieved<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24824" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24821 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Cost Calculator WordPress plugin before 1.6 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the Description fields of a Cost Calculator > Price Settings (which gets injected on the edit page as well as any page that embeds the calculator using the shortcode), as well as the Text Preview field of a Project (injected on the edit project page)<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24821" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24810 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The WP Event Manager WordPress plugin before 3.1.23 does not escape some of its Field Editor settings when outputting them, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24810" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24778 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The test parameter of the xmlfeed in the Tradetracker-Store WordPress plugin before 4.6.60 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24778" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24777 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The view submission functionality in the Hotscot Contact Form WordPress plugin before 1.3 makes a get request with the sub_id parameter which not sanitised, escaped or validated before inserting to a SQL statement, leading to an SQL injection.<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24777" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24216 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The All-in-One WP Migration WordPress plugin before 7.41 does not validate uploaded files' extension, which allows administrators to upload PHP files on their site, even on multisite installations.<br> Published at: March 07, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24216" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22783 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A CWE-200: Information Exposure vulnerability exists which could allow a session hijack when the door panel is communicating with the door. Affected Product: Ritto Wiser Door (All versions)<br> Published at: March 10, 2022 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22783" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-38296 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later<br> Published at: March 10, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38296" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-32435 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Stack-based buffer overflow in the function get_key in parse.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32435" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-32434 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> abcm2ps v8.14.11 was discovered to contain an out-of-bounds read in the function calculate_beam at draw.c.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32434" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-32025 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An elevation of privilege vulnerability in the QNX Neutrino Kernel of affected versions of QNX Software Development Platform version(s) 6.4.0 to 7.0, QNX Momentics all 6.3.x versions, QNX OS for Safety versions 1.0.0 to 1.0.2, QNX OS for Safety versions 2.0.0 to 2.0.1, QNX for Medical versions 1.0.0 to 1.1.1, and QNX OS for Medical version 2.0.0 could allow an attacker to potentially access data, modify behavior, or permanently crash the system.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32025" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-32006 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> This issue affects: Secomea GateManager Version 9.6.621421014 and all prior versions. Permission Issues vulnerability in LinkManager web portal of Secomea GateManager allows logged in LinkManager user to access stored SiteManager backup files.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32006" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-32005 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross-site Scripting (XSS) vulnerability in log view of Secomea SiteManager allows a logged in user to store javascript for later execution. This issue affects: Secomea SiteManager Version 9.6.621421014 and all prior versions.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32005" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-28488 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Ericsson Network Manager 20.2 has Insecure Permissions.<br> Published at: March 10, 2022 at 07:42PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28488" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20269 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20269" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36517 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An information leak in Nabu Casa Home Assistant Operating System and Home Assistant Supervised 2022.03 allows a DNS operator to gain knowledge about internal network resources via the hardcoded DNS resolver configuration.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36517" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36123 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> saitoha libsixel v1.8.6 was discovered to contain a double free via the component sixel_chunk_destroy at /root/libsixel/src/chunk.c.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36123" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14115 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14115" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14112 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14112" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-14111 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code.<br> Published at: March 10, 2022 at 07:41PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-14111" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36518 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.<br> Published at: March 11, 2022 at 09:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36518" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2018-25031 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.<br> Published at: March 11, 2022 at 09:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25031" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27414 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An attacker could trick a user of Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 into visiting a malicious website posing as a login page for the Ellipse application and gather authentication credentials.<br> Published at: March 11, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27414" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26401 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.<br> Published at: March 11, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26401" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26341 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.<br> Published at: March 11, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26341" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23246 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In ACE2 ColorOS11, the attacker can obtain the foreground package name through permission promotion, resulting in user information disclosure.<br> Published at: March 11, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23246" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-1796189195636630531footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB59sns0-2F9nDW9r-2BbMzC9LmECgcafXSqBJw1U03g1DMTN1LEr8487y9-2FVimUGiNivnDNccrFtMZef-2BHfWiQjp6HwIVW-2FqYp-2BkgVwQM6UhowLPlWSmGLsDOF9w0dOZzdBQRi9vaZwsm5507LxkKVRCOvzpZn-2BXm8W0vzNp3sWF4xziNgMrdhDmyR6nb8NAX73jpH9KHhRcfiCEuu7-2BCm-2BbxMMd-2BkHLuxFUyAqvFAOrDygB" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-26631162566840397292023-03-16T18:44:00.002+02:002023-03-16T18:45:03.964+02:00Weekly Digest: New diabetes clinical trial (13 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg7280410417217012360"><u></u> <div class="m_7280410417217012360body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_7280410417217012360mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_7280410417217012360content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: CuraLin Herbal Supplement for Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Intervention</b>: Dietary Supplement: CuraLin<br> <b>Sponsor</b>: National University of Natural Medicine<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05267925?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05267925?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Coronary Artery Calcium-guided Primary Prevention of Major Coronary Heart Disease in Asymptomatic Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Conditions</b>: Type2 Diabetes; Coronary Heart Disease<br> <b>Intervention</b>: Diagnostic Test: Multi-Detector Computed Tomography<br> <b>Sponsors</b>: JuFeng, Hsiao; Lotung Poh-Ai Hospital<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05267990?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05267990?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Feasibility Trial of a Mindfulness Based Intervention in Youth With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Condition</b>: type1diabetes<br> <b>Intervention</b>: Behavioral: BREATHE-T1D<br> <b>Sponsor</b>: Children's National Research Institute<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05268393?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05268393?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Specialist Conferences Between General Practitioners and Endocrinologists </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Other: Virtual specialist conferences<br> <b>Sponsors</b>: University of Aarhus; Aarhus University Hospital; Region MidtJylland Denmark<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05268081?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05268081?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Impact of Macronutrient Composition on Glucose Dynamics in Persons With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Condition</b>: type1diabetes<br> <b>Intervention</b>: Other: 7-day diet<br> <b>Sponsors</b>: Steno Diabetes Center Copenhagen; Swansea University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05268705?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05268705?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Remedy to Diabetes Distress (R2D2): A Scalable Screen to Treat Program for School-age Families </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 07, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Intervention</b>: Behavioral: R2D2 mHealth intervention<br> <b>Sponsors</b>: Nemours Children's Clinic; Children's Mercy Hospital Kansas City<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05268250?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05268250?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 07, 2022 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Assessment of the Efficacy of Vitamins A and D and γ-oryzanol-fortified Canola Oil in Adults With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 08, 2022 at 07:00PM<br> <b>Condition</b>: Diabetes<br> <b>Interventions</b>: Dietary Supplement: fortified canola oil with vitamins A and D and γ-oryzanol; Dietary Supplement: Active comparator; Dietary Supplement: Placebo<br> <b>Sponsor</b>: National Nutrition and Food Technology Institute<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05271045?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05271045?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 08, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Early High-Dose Vitamin D and Residual β-Cell Function in Pediatric Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 08, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Intervention</b>: Drug: Cholecalciferol (Vit D3) 400Unit Cap<br> <b>Sponsor</b>: Shanghai Jiao Tong University School of Medicine<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05270343?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05270343?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 08, 2022 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Multiple Ascending Dose Study of MHS552 in Adults With Type 1 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 09, 2022 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes Mellitus<br> <b>Interventions</b>: Drug: MHS552; Drug: Placebo<br> <b>Sponsor</b>: Novartis Pharmaceuticals<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05272059?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05272059?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 09, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effect of Dietary Inflammatory Index on Inflammatory Markers and Metabolic Parameters, in Patients With Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 09, 2022 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes; Dietary Inflammatory Index (DII); Inflammation; Medical Nutrition Therapy<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Istanbul University<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05271695?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05271695?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 09, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effects of Probiotics on Gut Microbiota Composition and Metabolic Outcomes in Post- Gestational Diabetes Women </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 10, 2022 at 07:00PM<br> <b>Condition</b>: Gestational Diabetes<br> <b>Interventions</b>: Dietary Supplement: Probiotics; Dietary Supplement: Placebo<br> <b>Sponsors</b>: National University of Malaysia; B-Crobes Laboratory (M) Sdn Bhd; Ministry of Higher Education Malaysia<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05273073?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05273073?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 10, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of LY3209590 Compared With Insulin Degludec in Participants With Type 2 Diabetes Currently Treated With Basal Insulin </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 11, 2022 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Interventions</b>: Drug: LY3209590; Drug: Insulin Degludec<br> <b>Sponsor</b>: Eli Lilly and Company<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05275400?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05275400?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 04:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Diabetic Retinopathy Screening in General Practice </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 11, 2022 at 07:00PM<br> <b>Conditions</b>: Diabetic Retinopathy; Type2 Diabetes<br> <b>Intervention</b>: Diagnostic Test: Diabetic Retinopathy Screening<br> <b>Sponsor</b>: Aalborg University<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05276778?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05276778?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 11, 2022 at 04:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_7280410417217012360footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmMLOOEHnGCv5NZGBqeVwsL8k9i3g0011-2FE7E9poW1ZoVhCvobmc0sZQasO7CJf8Dm6Hxbsu6aYzn4uVDsRspyVxC4TeuZKB5juCXPEeeeqrNONis6UTUNR4jF4EdWtKkGLvcyLdqbvAtHp2jpw2-2FckzuTwJKeg4Ery7b67mA-2FVeHqAyXysIRpnYF1Skdy0IEWFW5hiHKntnTVpjsGl5iJ2Jdy0Ahj4ljz6-2B92BmRw1vJ" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-65040032545381191242023-03-16T18:44:00.001+02:002023-03-16T18:44:31.148+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (41 items)<div dir="ltr"><div class="gmail_quote"><br><br><div class="msg7222532825740210848"><u></u> <div class="m_7222532825740210848body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_7222532825740210848mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_7222532825740210848content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25026 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Patreon WordPress plugin before 1.8.2 does not sanitise and escape the field "Custom Patreon Page name", which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25026" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25007 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The MOLIE WordPress plugin through 0.5 does not validate and escape a post parameter before using in a SQL statement, leading to an SQL Injection<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25007" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25006 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The MOLIE WordPress plugin through 0.5 does not escape the course_id parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting issue<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25006" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25003 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The WPCargo Track & Trace WordPress plugin before 6.9.0 contains a file which could allow unauthenticated attackers to write a PHP file anywhere on the web server, leading to RCE<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25003" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24996 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The IDPay for Contact Form 7 WordPress plugin through 2.1.2 does not sanitise and escape the idpay_error parameter before outputting it back in the page leading to a Reflected Cross-Site Scripting<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24996" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24995 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The HTML5 Responsive FAQ WordPress plugin through 2.8.5 does not properly sanitise and escape some of its settings, which could allow a high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24995" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24982 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Child Theme Generator WordPress plugin through 2.2.7 does not sanitise escape the parade parameter before outputting it back, leading to a Reflected Cross-Site Scripting in the admin dashboard<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24982" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24966 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24966" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24959 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The WP Email Users WordPress plugin through 1.7.6 does not escape the data_raw parameter in the weu_selected_users_1 AJAX action, available to any authenticated users, allowing them to perform SQL injection attacks.<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24959" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24958 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Meks Easy Photo Feed Widget WordPress plugin before 1.2.4 does not have capability and CSRF checks in the meks_save_business_selected_account AJAX action, available to any authenticated user, and does not escape some of the settings. As a result, any authenticated user, such as subscriber could update the plugin's settings and put Cross-Site Scripting payloads in them<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24958" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24950 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Insight Core WordPress plugin through 1.0 does not have any authorisation and CSRF checks in the insight_customizer_options_import (available to any authenticated user), does not validate user input before passing it to unserialize(), nor sanitise and escape it before outputting it in the response. As a result, it could allow users with a role as low as Subscriber to perform PHP Object Injection, as well as Stored Cross-Site Scripting attacks<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24950" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24940 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Persian Woocommerce WordPress plugin through 5.8.0 does not escape the s parameter before outputting it back in an attribute in the admin dashboard, which could lead to a Reflected Cross-Site Scripting issue<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24940" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24897 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Add Subtitle WordPress plugin through 1.1.0 does not sanitise or escape the sub-title field (available only with classic editor) when output in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24897" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24895 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Cybersoldier WordPress plugin before 1.7.0 does not sanitise and escape the URL settings before outputting it in an attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24895" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24692 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Simple Download Monitor WordPress plugin before 3.9.5 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector.<br> Published at: March 14, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24692" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-4989 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Engineering Workflow Management 7.0, 7.0.1, and 7.0.2 and IBM Rational Team Concert 6.0.6 and 6.0.0.1 could allow an authenticated user to obtain sensitive information about build definitions. IBM X-Force ID: 192707.<br> Published at: March 15, 2022 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4989" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 15, 2022 at 08:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-36519 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Mimecast Email Security before 2020-01-10 allows any admin to spoof any domain, and pass DMARC alignment via SPF. This occurs through misuse of the address rewrite feature. (The domain being spoofed must be a customer in the Mimecast grid from which the spoofing occurs.)<br> Published at: March 16, 2022 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36519" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 07:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23165 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in htmldoc before v1.9.12. Heap buffer overflow in pspdf_prepare_outpages(), in ps-pdf.cxx may lead to execute arbitrary code and denial of service.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23165" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23158 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in htmldoc in v1.9.12. Double-free in function pspdf_export(),in ps-pdf.cxx may result in a write-what-where condition, allowing an attacker to execute arbitrary code and denial of service.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23158" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20299 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20299" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20257 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20257" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20180 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20180" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0957 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In NotificationStackScrollLayout of NotificationStackScrollLayout.java, there is a possible way to bypass Factory Reset Protections. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193149550<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0957" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25721 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.<br> Published at: March 16, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25721" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23648 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The package @braintree/sanitize-url before 6.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in sanitizeUrl function.<br> Published at: March 16, 2022 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23648" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 08:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23771 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](<a href="https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878" target="_blank">https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878</a>).<br> Published at: March 17, 2022 at 02:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23771" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 04:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23632 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. Steps to Reproduce 1. Create a file named exploit.js with the following content: js var Git = require("git").Git; var repo = new Git("repo-test"); var user_input = "version; date"; repo.git(user_input, function(err, result) { console.log(result); }) 2. In the same directory as exploit.js, run npm install git. 3. Run exploit.js: node exploit.js. You should see the outputs of both the git version and date command-lines. Note that the repo-test Git repository does not need to be present to make this PoC work.<br> Published at: March 17, 2022 at 02:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23632" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 04:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23556 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.<br> Published at: March 17, 2022 at 02:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23556" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 04:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-15591 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> fexsrv in F*EX (aka Frams' Fast File EXchange) before fex-20160919_2 allows eval injection (for unauthenticated remote code execution).<br> Published at: March 17, 2022 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15591" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 08:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22571 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.<br> Published at: March 18, 2022 at 01:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22571" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 02:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23209 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Multiple Authenticated (admin user role) Persistent Cross-Site Scripting (XSS) vulnerabilities discovered in AMP for WP â€" Accelerated Mobile Pages WordPress plugin (versions <= 1.0.77.32).<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23209" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-23150 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability discovered in AMP for WP â€" Accelerated Mobile Pages WordPress plugin (versions <= 1.0.77.31).<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23150" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25197 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25197" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25193 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25193" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25184 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25184" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25182 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25182" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25180 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25180" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25178 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25178" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-25176 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25176" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-16232 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16232" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-15388 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A vulnerability in the Brocade Fabric OS before Brocade Fabric OS v9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h could allow an authenticated CLI user to abuse the history command to write arbitrary content to files.<br> Published at: March 18, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15388" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_7222532825740210848footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB2y9nANWm-2FHpwK1Jg0RnW-2BqQKvTDnpgMs2I6Xljyj7bYHBSy-2FWlqifjrVcj7oZz-2BPgSsUtszokjewIRVBxdJgmQSqF4ZaP2JeGSSyhbEWZto5ysXgVKkxbJYl47amFSmMxEpr-2FiuXplxvDoEkVy9P1xR604-2Br3HP01Ava6s-2BW9ZOYO8lj7uVlzFQoesYMkJ4AAAUBStIb5k4aF1ZgIxdZHcfOsynNWjvO9TT4U61kM8q" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-21983899145782348672023-03-16T18:43:00.000+02:002023-03-16T18:44:00.437+02:00Weekly Digest: New diabetes clinical trial (10 items)<div dir="ltr"><div class="gmail_quote"><div class="msg-6921975655087298000"><div class="m_5366797463512733625body"><table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"><tbody><tr><td align="left" valign="top"><table border="0" cellspacing="0" cellpadding="0" class="m_5366797463512733625mobile-shell"><tbody><tr><td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"><table class="m_5366797463512733625content" cellpadding="0" cellspacing="0" border="0" width="600"><tbody><tr><td><table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"><tbody><tr><td><a style="display:block;text-decoration:none"><table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"><tbody><tr><td><h2 style="margin:0"><font style="color:#055696!important">New diabetes clinical trial: Brain Health in Youth With Normal Weight, Overweight and Obesity at Risk for Type 2 Diabetes (T2D) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 14, 2022 at 06:00PM<br> <b>Conditions</b>: Type2 Diabetes; Type 2 Diabetes Mellitus in Obese; Dysglycemia; Microvascular Complications; Brain Structure; Obesity, Childhood; Diabetes in Adolescence; Inflammation; Insulin Resistance; Overweight, Childhood; Cognitive Decline<br> <b>Intervention</b>: Other: Observational<br> <b>Sponsors</b>: Washington University School of Medicine; National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05277558?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05277558?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effect of Circadian Rhythm and Physical Exercise in Overweight Type 1 Diabetes Patients </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 14, 2022 at 06:00PM<br> <b>Conditions</b>: Type 1 Diabetes; Overweight<br> <b>Intervention</b>: Behavioral: High intensity interval training (HIIT)<br> <b>Sponsor</b>: Karolinska Institutet<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05277532?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05277532?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 14, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Virtual SMAs in Lifestyle Approach for Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 15, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes Type 2<br> <b>Intervention</b>: Behavioral: Virtual SMAs<br> <b>Sponsors</b>: Universidade do Porto; Unidade de Saúde Familiar Homem do Leme; Health4All Primary Healthcare Research Network<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05279326?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05279326?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 15, 2022 at 09:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Pragmatic Approach to Lower Diabetes Risk After Gestational Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 15, 2022 at 06:00PM<br> <b>Conditions</b>: Diabetes, Gestational; PreDiabetes; Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Drug: Metformin<br> <b>Sponsor</b>: Tufts Medical Center<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05280496?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05280496?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 15, 2022 at 09:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Acceptability of Hybrid Closed-loop Systems in Patients Living With Highly Unbalanced Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 16, 2022 at 06:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Intervention</b>: Other: device<br> <b>Sponsor</b>: Centre Hospitalier Sud Francilien<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05282264?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05282264?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Hong Kong Diabetes Biobank </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 16, 2022 at 06:00PM<br> <b>Conditions</b>: Diabetes Mellitus; Type 2 Diabetes; Type 1 Diabetes; Diabetic Nephropathies; Diabetic Kidney Disease; Diabetic Angiopathies; Cardiovascular Diseases; Coronary Heart Disease; Diabetic Retinopathy; Stroke; Diabetes<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Chinese University of Hong Kong<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05282680?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05282680?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 16, 2022 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Impact of Glucotoxicity on Gastric Emptying in Chinese Patients With Newly Diagnosed Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 17, 2022 at 06:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Intervention</b>: Drug: Anti-Diabetics<br> <b>Sponsors</b>: University of Adelaide; The First Affiliated Hospital with Nanjing Medical University<br> <b>Active, not recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05284344?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05284344?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Actiste® Diabetes Management as a Service (ADMS) Clinical Investigation </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 17, 2022 at 06:00PM<br> <b>Conditions</b>: Diabetes type1; Diabetes type2<br> <b>Intervention</b>: Device: Device: Actiste 1.0 and the Companion app with TBL Backend<br> <b>Sponsors</b>: Northern Care Alliance NHS Foundation Trust; Brighter AB<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05284071?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05284071?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 17, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of Renal Autologous Cell Therapy (REACT®) in Participants With Type 2 Diabetes and Chronic Kidney Disease </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 18, 2022 at 06:00PM<br> <b>Conditions</b>: T2DM (Type 2 Diabetes Mellitus); CKD (Chronic Kidney Disease)<br> <b>Intervention</b>: Biological: Renal Autologous Cell Therapy (REACT®)<br> <b>Sponsors</b>: Prokidney; Iqvia Pty Ltd<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05286853?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05286853?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Diabetes Learning in Virtual Environments Just in Time for Community Reentry </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 18, 2022 at 06:00PM<br> <b>Conditions</b>: Diabetes Mellitus, Type 1; Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Other: Diabetes LIVE JustICE; Other: Enhanced Education<br> <b>Sponsors</b>: Louise Reagan; American Diabetes Association<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05286892?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05286892?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 18, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_5366797463512733625footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmE9VBd4ipk42FrHceMUd-2FY6LmnKPOS98McFgx-2FRQQ7hBX1haSd1NW-2BI-2FRyHgSleduxMV8-2FM75p0Pi6XtaYL7qEhZyDGFS-2BsQdfFguerEenvHYZTzvdYuCTIegr-2B7ZIoC4ejGQXt5aDDkHEihGn74blhLW46FPtu8KHzrYKv4Gt8-2Bs9H2KUDEseaAYBUOZTti1ENglVpf0RJQXzvhqFNFAqbQuHmaVw4IkKOiP9S6CVFX" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-14226099506876297912023-03-16T18:41:00.003+02:002023-03-16T18:41:57.177+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (33 items)<div dir="ltr"><div class="gmail_quote"><div dir="ltr" class="gmail_attr"><br></div><div class="msg-2152502717995407848"><u></u> <div class="m_-2152502717995407848body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-2152502717995407848mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-2152502717995407848content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-26008 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The PluginsUpload function in application/service/PluginsAdminService.php of ShopXO v1.9.0 contains an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via uploading a crafted PHP file.<br> Published at: March 21, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26008" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-26007 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An arbitrary file upload vulnerability in the upload payment plugin of ShopXO v1.9.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.<br> Published at: March 21, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26007" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-24772 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Dreamacro 1.1.0, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).<br> Published at: March 21, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24772" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25019 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The SEO Plugin by Squirrly SEO WordPress plugin before 11.1.12 does not escape the type parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting<br> Published at: March 21, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25019" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 10:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24905 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Advanced Contact form 7 DB WordPress plugin before 1.8.7 does not have authorisation nor CSRF checks in the acf7_db_edit_scr_file_delete AJAX action, and does not validate the file to be deleted, allowing any authenticated user to delete arbitrary files on the web server. For example, removing the wp-config.php allows attackers to trigger WordPress setup again, gain administrator privileges and execute arbitrary code or display arbitrary content to the users.<br> Published at: March 21, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24905" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 10:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-33961 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Cross Site Scripting (XSS) vulnerabililty exists in enhanced-github v5.0.11 via the file name parameter.<br> Published at: March 22, 2022 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33961" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-25220 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.<br> Published at: March 23, 2022 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25220" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 04:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-38772 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the list parameter in the fromSetIpMacBind function.<br> Published at: March 23, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38772" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-38278 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the urls parameter in the saveParentControlInfo function.<br> Published at: March 23, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38278" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27466 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27466" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27464 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27464" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27462 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27462" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27460 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27460" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27456 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Philips Gemini PET/CT family software stores sensitive information in a removable media device that does not have built-in access control.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27456" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27430 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27430" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27428 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool â€" Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27428" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27426 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR IED firmware versions prior to version 8.1x with “Basicâ€� security variant does not allow the disabling of the “Factory Mode,â€� which is used for servicing the IED by a “Factoryâ€� user.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27426" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27424 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressedâ€� MODBUS register can be used to gain unauthorized information.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27424" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27422 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27422" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27420 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27420" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27418 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.<br> Published at: March 23, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27418" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 12:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20096 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.<br> Published at: March 24, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20096" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20095 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> iMessage (Messages app) iOS 12.4 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.<br> Published at: March 24, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20095" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20094 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Instagram iOS 106.0 and prior and Android 107.0.0.11 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages<br> Published at: March 24, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20094" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20093 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.<br> Published at: March 24, 2022 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20093" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 02:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2018-25032 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.<br> Published at: March 25, 2022 at 11:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-25032" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 12:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21554 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A File Deletion vulnerability exists in TinyShop 3.1.1 in the back_list parameter in controllers\admin.php, which could let a malicious user delete any file such as install.lock to reinstall cms.<br> Published at: March 25, 2022 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21554" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 08:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26622 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An remote code execution vulnerability due to SSTI vulnerability and insufficient file name parameter validation was discovered in Genian NAC. Remote attackers are able to execute arbitrary malicious code with SYSTEM privileges on all connected nodes in NAC through this vulnerability.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26622" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26621 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An Buffer Overflow vulnerability leading to remote code execution was discovered in MEX01. Remote attackers can use this vulnerability by using the property that the target program copies parameter values to memory through the strcpy() function.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26621" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-26620 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26620" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22100 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible. An attacker can leverage this vulnerability to cause an inability for anyone to push or manage apps.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22100" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20323 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20323" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-20290 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An improper authorization handling flaw was found in Foreman. The OpenSCAP plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.<br> Published at: March 25, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20290" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 10:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-2152502717995407848footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB1QeVVepL57tmILUhQhcbp1n-2BC-2Faztvq0HtUiyEjQ1feFSJlukt8aD4Z3E4TaYFAOZQf1PDsBu8v5WBoXPfw49vs9FyLXu6I4vnrHHwRZjJm7PjJWmZY6E8dIaFni7HRb9IIHljIETw8QqAoWapCvlQWhpo6OmLhOArdCFkaYx0cLQOzZG06-2BG59K3W0t55segJp4-2FsycDeaDbkLkn1KkodPKAgmqt4cihRBhKXkb7iC" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-67996132910031750632023-03-16T18:41:00.001+02:002023-03-16T18:41:28.673+02:00Weekly Digest: New diabetes clinical trial (12 items)<div dir="ltr"><div class="gmail_quote"><div class="msg-877728445061473491"><div class="m_1528172420437926362body"><table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"><tbody><tr><td align="left" valign="top"><table border="0" cellspacing="0" cellpadding="0" class="m_1528172420437926362mobile-shell"><tbody><tr><td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"><table class="m_1528172420437926362content" cellpadding="0" cellspacing="0" border="0" width="600"><tbody><tr><td><table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"><tbody><tr><td><a style="display:block;text-decoration:none"><table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"><tbody><tr><td><h2 style="margin:0"><font style="color:#055696!important">w diabetes clinical trial: Food Delivery, Remote Monitoring, and Coaching-Enhanced Education for Optimized Diabetes Management (FREEDOM) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 21, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Behavioral: Digital Health Coaching; Dietary Supplement: Food Box Delivery; Behavioral: Remote Patient Monitoring (RPM); Behavioral: Core Intervention: Diabetes Self-Management Education and Support (DSMES) Program<br> <b>Sponsors</b>: University of Alabama at Birmingham; University of Mississippi Medical Center; Cooper Green Mercy Health Systems; Pack Health<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05288452?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05288452?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 21, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Adipose Tissue Dysfunction in Type 2 Diabetes and Its Reversibility by Bariatric Surgery </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 22, 2022 at 06:00PM<br> <b>Condition</b>: Adipose Tissue Dysfunction Type 2 Diabetes Mellitus Bariatric Surgery<br> <b>Intervention</b>: Procedure: Gastric byspass<br> <b>Sponsor</b>: Odense University Hospital<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05291013?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05291013?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 22, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Linagliptin Response to OGTT in Prediabetes and Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 22, 2022 at 06:00PM<br> <b>Conditions</b>: PreDiabetes; Type 2 Diabetes<br> <b>Intervention</b>: Drug: Dipeptidyl-Peptidase IV Inhibitors<br> <b>Sponsor</b>: National University of Malaysia<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05290506?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05290506?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 22, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Different Response of Endocrine Hormones to Hypoglycemia in Patients With Type 1 or Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 22, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes<br> <b>Intervention</b>: Diagnostic Test: The hyperinsulinaemic hypoglycaemic clamp<br> <b>Sponsor</b>: Nanjing First Hospital, Nanjing Medical University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05290207?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05290207?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 22, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Mobile Health Intervention for Improved Adherence in Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 22, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes Mellitus<br> <b>Intervention</b>: Other: mobile phone-based health information<br> <b>Sponsor</b>: Obafemi Awolowo University<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05291026?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05291026?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 22, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Study on Adherence to a Mediterranean Diet in a Population of Patients With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 23, 2022 at 06:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Assistance Publique - Hôpitaux de Paris<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05292833?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05292833?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 04:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: NP-Supported Multidisciplinary Diabetes Management During Perioperative Period </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 23, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes<br> <b>Intervention</b>: Other: NP-Supported Multidisciplinary Diabetes Management<br> <b>Sponsors</b>: Peking University Third Hospital; Roche Pharma AG<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05293015?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05293015?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 23, 2022 at 04:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Continuous Glucose Monitoring and Hass Avocado Trial ("CHAT") </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 24, 2022 at 06:00PM<br> <b>Conditions</b>: Dietary Habits; Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Dietary Supplement: Avocado Vouchers<br> <b>Sponsors</b>: Sansum Diabetes Research Institute; Hass Avocado Board<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05293340?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05293340?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Atherosclerotic Cardiovascular Risk in Childhood and Teen-age Onset Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 24, 2022 at 06:00PM<br> <b>Conditions</b>: Atherosclerotic Cardiovascular Disease; Childhood Diabetes Mellitus; Juvenile Diabetes<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Shanghai Jiao Tong University School of Medicine<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05294653?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05294653?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Fasting-Associated Immune-metabolic Remission of Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 24, 2022 at 06:00PM<br> <b>Conditions</b>: Type 2 Diabetes Mellitus; Obesity<br> <b>Intervention</b>: Behavioral: weight loss by very low energy diet intake which may differ in protein or carbohydrate content<br> <b>Sponsor</b>: Charite University, Berlin, Germany<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05295160?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05295160?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Autologous Regenerative Islet Transplantation for Insulin-dependent Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 24, 2022 at 06:00PM<br> <b>Condition</b>: Diabetes<br> <b>Intervention</b>: Procedure: Autologous regenerative islet transplantation for insulin-dependent diabetes mellitus<br> <b>Sponsor</b>: Shanghai Changzheng Hospital<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05294822?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05294822?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 24, 2022 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of Oral GLP1RA RGT001-075 in Adults With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: March 25, 2022 at 06:00PM<br> <b>Condition</b>: Type 2 Diabetes Mellitus<br> <b>Interventions</b>: Drug: RGT001-075; Other: Placebo<br> <b>Sponsor</b>: Regor Pharmaceuticals Inc.<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05297045?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05297045?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">March 25, 2022 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_1528172420437926362footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmGK-2FHs7O80A-2FgrJZ-2F66qn3JQEZjZF4Lnn7a-2BMuDANPTGg60aLvTG7ROzmSyAUO7XllCfiq3n8ocscoiA5J3rPNFenpV40YfGsJ-2BGQjZHDFJQh26GL-2FP1hxUD673-2FflAYqvNJ4yRMQbEQcBlUR-2BZAY-2BMzMt-2BhiTIFdiZjDOntd9h2KV1J06ivdCzmgTALbjmLX21dDWE6mZbZM-2BccDNN08ptHsPaaEbHq4mMDswH8R6Zj" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-37407812167782674222023-03-16T18:40:00.001+02:002023-03-16T18:40:21.433+02:00Weekly Digest: New diabetes clinical trial (18 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg460758728218205246"><u></u> <div class="m_460758728218205246body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_460758728218205246mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_460758728218205246content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Pharmacokinetics, Safety and Tolerability of IN-C009 in Healthy Subjects </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus<br> <b>Intervention</b>: Drug: FCDP, dapagliflozin 10mg/linagliptin 5 mg or co-administration of a single dose of dapagliflozin and linagliptin<br> <b>Sponsor</b>: Korea University Anam Hospital<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05066516?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05066516?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Pediatric Boot Camp Program </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Conditions</b>: Type 1 Diabetes; Children, Only<br> <b>Intervention</b>: Other: telehealth visits<br> <b>Sponsor</b>: Georgetown University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05066893?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05066893?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Evaluation of Immunogenicity and Safety of COVAX (Produced in Wuhan) in Patients With Hypertension and/or Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Condition</b>: COVID-19 Pneumonia<br> <b>Intervention</b>: Biological: COVAX<br> <b>Sponsors</b>: China National Biotec Group Company Limited; Guizhou Center for Disease Control and Prevention; Hunan Center for Disease Control and Prevention; Fujian Center for Disease Control and Prevention; Wuhan Institute of Biological Products Co., Ltd<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05065892?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05065892?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Evaluation of Immunogenicity and Safety of COVAX (Produced in Beijing) in Patients With Hypertension and/or Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Condition</b>: COVID-19 Pneumonia<br> <b>Intervention</b>: Biological: COVAX<br> <b>Sponsors</b>: China National Biotec Group Company Limited; Hunan Center for Disease Control and Prevention; Guizhou Center for Disease Control and Prevention; Fujian Center for Disease Control and Prevention; Beijing Institute of Biological Products Co Ltd.<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05065879?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05065879?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Effect of Single Probiotic on Metabolic Control in Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Dietary Supplement: Lactobacillus rhamnosus GG (ATCC 53103); Dietary Supplement: Placebo<br> <b>Sponsor</b>: Istanbul University<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05066152?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05066152?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: MANATEE-T1D: Metformin ANd AutomaTEd Insulin Delivery System Effects on Renal Vascular Resistance, Insulin Sensitivity, and Cardiometabolic Function in Youth With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Conditions</b>: Type 1 Diabetes; Diabetic Kidney Disease; Cardiovascular Diseases; Endothelial Dysfunction; Insulin Sensitivity<br> <b>Interventions</b>: Drug: Metformin Hcl 1000Mg Tab; Drug: Aminohippurate Sodium 20 % Injection; Drug: Iohexol 300 Mg/mL Injectable Solution; Drug: Placebo<br> <b>Sponsors</b>: University of Colorado, Denver; National Heart, Lung, and Blood Institute (NHLBI)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05065372?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05065372?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Recreational Basketball to Increase Participation in Diabetes Prevention </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 04, 2021 at 07:00PM<br> <b>Conditions</b>: Type 2 Diabetes; PreDiabetes<br> <b>Interventions</b>: Behavioral: NDPP + Basketball (BB); Behavioral: NDPP Standard of Care SOC<br> <b>Sponsor</b>: Kaiser Permanente<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05066542?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05066542?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The CGMS in GDM Labor and Delivery Study </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 05, 2021 at 07:00PM<br> <b>Condition</b>: Gestational Diabetes Mellitus in Pregnancy<br> <b>Intervention</b>: Device: Blinded CGM<br> <b>Sponsors</b>: Woman's; DexCom, Inc.<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05067075?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05067075?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Liraglutide Effects in Obese Youth With Prediabetes/New Onset Type 2 Diabetes and Non-Alcoholic Fatty Liver Disease </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 05, 2021 at 07:00PM<br> <b>Conditions</b>: New Onset Type 2 Diabetes in Obese Adolescent; Impaired Glucose Tolerance in Obese Adolescent; Non-Alcoholic Fatty Liver Disease in Obese Adolescent<br> <b>Interventions</b>: Drug: Liraglutide Pen Injector; Drug: Placebo<br> <b>Sponsors</b>: Yale University; National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05067621?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05067621?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of Infusion Site Pain After Infusion of Excipients in Participants With Type 1 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 05, 2021 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes Mellitus<br> <b>Interventions</b>: Drug: Sodium Citrate; Drug: Treprostinil; Drug: Humalog diluent; Drug: Magnesium Chloride; Device: Medtronic™ MiniMed™ 770G pump<br> <b>Sponsor</b>: Eli Lilly and Company<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05067270?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05067270?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Pilot Trial of the Nutrition-Supported Diabetes Education Program </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 05, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Other: Food support; Other: Case-management<br> <b>Sponsors</b>: University of California, San Francisco; Project Open Hand; Contra Costa Health Services; National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05067452?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05067452?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Simple Initiation of Advanced Hybrid Closed Loop System </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 06, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes type1<br> <b>Interventions</b>: Procedure: Regular Protocol with advanced carbohydrate counting; Procedure: Simplified Protocol with fixed carbohydrate content<br> <b>Sponsor</b>: Sidra Medical and Research Center<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05069727?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05069727?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Assessment of Metabolic Profiles of Lower Extremity Arterial Disease in Patiens Withe Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 06, 2021 at 07:00PM<br> <b>Conditions</b>: Diabetic Angiopathies; Diabetes Mellitus, Type 2<br> <b>Intervention</b>: Other: liquid chromatography-mass spectrometry<br> <b>Sponsor</b>: Zhiming Zhu<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05068895?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05068895?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Research Study Looking at How the Use of NovoPen® 6 for Treatment With Tresiba® & Fiasp® Affects the Blood Sugar Level in Patients With Type 1 Diabetes as Part of Local Clinical Practice </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 06, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 1<br> <b>Interventions</b>: Drug: Insulin degludec; Drug: Fast-acting insulin aspart<br> <b>Sponsor</b>: Novo Nordisk A/S<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05069545?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05069545?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Self-compassion to Reduce Diabetes Distress in Persons With Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 07, 2021 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Intervention</b>: Behavioral: Mindful Self-Compassion<br> <b>Sponsors</b>: Mahidol University; Chulalongkorn University<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05070949?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05070949?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Pharmacogenetics of Response to GLP1R Agonists </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 08, 2021 at 07:00PM<br> <b>Conditions</b>: Obesity; Diabetes Type 2<br> <b>Intervention</b>: Drug: Semaglutide Pen Injector [Ozempic]<br> <b>Sponsor</b>: University of Maryland, Baltimore<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05071898?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05071898?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Effect of D-allulose on Glycemic Changes in Patients With Type 2 Diabetes Mellitus During Ramadan Fasting </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 08, 2021 at 07:00PM<br> <b>Condition</b>: Glucose, High Blood<br> <b>Interventions</b>: Other: Control period; Dietary Supplement: D-allulose period<br> <b>Sponsors</b>: Universiti Putra Malaysia; Matsutani Chemical Industry Co., Ltd.; Kagawa University<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05071950?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05071950?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Microlearning Application for Diabetes Prevention </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 08, 2021 at 07:00PM<br> <b>Condition</b>: PreDiabetes<br> <b>Interventions</b>: Other: Health U mobile application; Other: National Diabetes Prevention Program<br> <b>Sponsor</b>: Stanford University<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05071820?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05071820?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td> </tr> </tbody></table> </td> </tr> <tr> <td> <table class="m_460758728218205246footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"> <tbody><tr> <td style="padding:50px 0"> <table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmMPWLcIjrzJFL9Do2xnnJFEwjCjMqVI5-2FbcHhte6typa5-2FZXMoMMrrO4pfOIhjP6xQoQRmiynvd9Sb-2BiKUzj70LK3aGUITpmqihaE4hzwR0KMjFFwMiYz-2FTg2VOdBNVJUy72Z-2Bv3crYunyDd2xPtpy-2B3qC4nd-2FmgkbY69Z2jQnEoSahXNaWJNCS-2FmheGu0VJ-2B1x4oLgg6wLdHGavpyZND11mTbp9tX13Ief2hqM-2F-2F6w2" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-65637723694161269752023-03-16T18:38:00.002+02:002023-03-16T18:39:14.507+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (48 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg3859187563806619292"><u></u> <div class="m_3859187563806619292body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_3859187563806619292mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_3859187563806619292content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-21706 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.<br> Published at: October 04, 2021 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21706" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-21705 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.<br> Published at: October 04, 2021 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21705" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-21704 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.<br> Published at: October 04, 2021 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21704" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22557 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past <a href="https://github.com/google/slo-generator/pull/173" target="_blank">https://github.com/google/slo-generator/pull/173</a><br> Published at: October 04, 2021 at 01:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22557" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 03:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22259 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A potential DOS vulnerability was discovered in GitLab EE starting with version 12.6 due to lack of pagination in dependencies API.<br> Published at: October 04, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22259" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-28119 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross site scripting vulnerability in 53KF < 2.0.0.2 that allows for arbitrary code to be executed via crafted HTML statement inserted into chat window.<br> Published at: October 04, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-28119" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 04, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21496 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitebrief parameter.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21496" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21495 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitename parameter.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21495" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21494 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the component install\install.sql of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via changing the doctype value to 0.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21494" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21493 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue in the component route\user.php of Xiuno BBS v4.0.4 allows attackers to enumerate usernames.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21493" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21434 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Maccms 10 contains a cross-site scripting (XSS) vulnerability in the Editing function under the Member module. This vulnerability is exploited via a crafted payload in the nickname text field.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21434" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21431 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> HongCMS v3.0 contains an arbitrary file read and write vulnerability in the component /admin/index.php/template/edit.<br> Published at: October 05, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21431" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21387 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the parameter type_en of Maccms 10 allows attackers to obtain the administrator cookie and escalate privileges via a crafted payload.<br> Published at: October 04, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21387" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21386 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Cross-Site Request Forgery (CSRF) in the component admin.php/admin/type/info.html of Maccms 10 allows attackers to gain administrator privileges.<br> Published at: October 04, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21386" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22258 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The project import/export feature in GitLab 8.9 and greater could be used to obtain otherwise private email addresses<br> Published at: October 05, 2021 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22258" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-22257 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. The route for /user.keys is not restricted on instances with public visibility disabled. This allows user enumeration on such instances.<br> Published at: October 05, 2021 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22257" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 05, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21506 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?m=Config&a=add.<br> Published at: October 06, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21506" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21505 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php/Link/addsave.<br> Published at: October 06, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21505" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21504 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?&m=Public&a=login.<br> Published at: October 06, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21504" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21503 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=gift&a=addsave credit parameter to -1, the product is sold for free.<br> Published at: October 06, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21503" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-15941 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.<br> Published at: October 06, 2021 at 01:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15941" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 03:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19003 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.<br> Published at: October 06, 2021 at 04:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19003" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 06:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0685 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In ParsedIntentInfo of ParsedIntentInfo.java, there is a possible parcel serialization/deserialization mismatch due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-191055353<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0685" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0684 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0684" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0683 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0683" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0682 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0682" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0681 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In system properties, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-192535337<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0681" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0680 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In system properties, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-192535676<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0680" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0644 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In conditionallyRemoveIdentifiers of SubscriptionController.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-181053462<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0644" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0636 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> When extracting the incorrectly formatted avi file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion: Android-10Android ID: A-189392423<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0636" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0635 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> When extracting the incorrectly formatted flv file, the memory is damaged, the playback interface shows that the video cannot be played, and the log is found to be crashed. This problem may lead to hacker malicious code attacks, resulting in the loss of user rights.Product: Androidversion:Android-10Android ID: A-189402477<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0635" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0598 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0598" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0595 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096<br> Published at: October 06, 2021 at 06:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0595" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 06, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21658 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Cross-Site Request Forgery (CSRF) in WDJA CMS v1.5.2 allows attackers to arbitrarily add administrator accounts via a crafted URL.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21658" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21656 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> XYHCMS v3.6 contains a stored cross-site scripting (XSS) vulnerability in the component xyhai.php?s=/Link/index.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21656" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21654 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> emlog v6.0 contains a vulnerability in the component admin\template.php, which allows attackers to getshell via a crafted Zip file.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21654" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21653 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \controller\index.php, which can be exploited via the sj() method.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21653" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21652 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\Config.php, which can be exploited via the addqq() method.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21652" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21651 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\point.php, which can be exploited via the add() method.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21651" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21650 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\Config.php, which can be exploited via the add() method.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21650" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21649 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \controller\index.php, which can be exploited via the sql() method.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21649" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21648 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> WDJA CMS v1.5.2 contains an arbitrary file deletion vulnerability in the component admin/cache/manage.php.<br> Published at: October 07, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21648" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 07, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21865 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ThinkPHP50-CMS v1.0 contains a remote code execution (RCE) vulnerability in the component /public/?s=captcha.<br> Published at: October 08, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21865" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21729 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> JEECMS x1.1 contains a stored cross-site scripting (XSS) vulnerability in the component of /member-vipcenter.htm, which allows attackers to execute arbitrary web scripts or HTML via a crafted payload.<br> Published at: October 08, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21729" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21726 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the cid parameter.<br> Published at: October 08, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21726" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21725 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the pid parameter.<br> Published at: October 08, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21725" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-4654 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow an authenticated user to obtain sensitive information due to improper permission control. IBM X-Force ID: 186090.<br> Published at: October 08, 2021 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-4654" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 08, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-22617 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Ardour v5.12 contains a use-after-free vulnerability in the component ardour/libs/pbd/xml++.cc when using xmlFreeDoc and xmlXPathFreeContext.<br> Published at: October 08, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-22617" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 09, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_3859187563806619292footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody><tr><td style="padding:50px 0"><table width="100%" border="0" cellspacing="0" cellpadding="0"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB5cDSMdUZ3S77uTutXca8HZ4yn8l7kgVLIoCwTuDzGauZVPRVmDQphjbiZ0RHRCk7zygi3Pt19VJsyjnM8cZ49h3lBIuE1PFWvH8DQmdsGfCi9qtFq-2FWm1p-2B7bd4B4JZrUUhB2Htd801lQXr1vg5n1KXPlzqpzZo4Rz9cj4yc47seNCXVaWPDRQgOu192Cw9sw3AsU7pWzPsWQHJsgtpRFa8uFIglKO0Qiqq78w94hBE" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-87161163382836354342023-03-16T18:38:00.001+02:002023-03-16T18:38:37.433+02:00Weekly Digest: New diabetes clinical trial (14 items)<div dir="ltr"><div class="gmail_quote"><div class="msg3797333134549619416"><div class="m_3797333134549619416body"><table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"><tbody><tr><td align="left" valign="top"><table border="0" cellspacing="0" cellpadding="0" class="m_3797333134549619416mobile-shell"><tbody><tr><td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"><table class="m_3797333134549619416content" cellpadding="0" cellspacing="0" border="0" width="600"><tbody><tr><td><table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"><tbody><tr><td><a style="display:block;text-decoration:none"><table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: SGLT2 Inhibitors, Ketones, and Cardiovascular Benefit Research Plan </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 27, 2021 at 07:00PM<br> <b>Conditions</b>: Type2 Diabetes; Heart Failure With Preserved Ejection Fraction<br> <b>Interventions</b>: Drug: Empagliflozin 25 MG; Drug: Placebo<br> <b>Sponsors</b>: The University of Texas Health Science Center at San Antonio; Doris Duke Charitable Foundation<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05057806?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05057806?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Investigating the Impact of the SGLT2 Inhibitor Empagliflozin on Postprandial Hypoglycaemia After Gastric Bypass </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 27, 2021 at 07:00PM<br> <b>Conditions</b>: Dumping Syndrome; Hypoglycemia, Reactive<br> <b>Interventions</b>: Drug: Empagliflozin 25 MG; Drug: Placebo<br> <b>Sponsor</b>: University Hospital Inselspital, Berne<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05057819?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05057819?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Clinical Research on Disease Progression and Intervention of Chronic HepatitisB </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 27, 2021 at 07:00PM<br> <b>Condition</b>: Hepatitis B, Chronic<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Hong Ren<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05057065?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05057065?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: UK Imaging Diabetes Study Seeing Diabetes Clearly </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 27, 2021 at 07:00PM<br> <b>Conditions</b>: Type2 Diabetes; Diabetic Retinopathy<br> <b>Intervention</b>: <br> <b>Sponsors</b>: Perspectum; Moorfields Eye Hospital NHS Foundation Trust<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05057403?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05057403?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Long Term Clinical Efficacy of Sodium-glucose Cotransporter-2 (SGLT-2) Inhibitor in Cystinurics </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 28, 2021 at 07:00PM<br> <b>Condition</b>: Cystinuria<br> <b>Intervention</b>: Drug: Dapagliflozin<br> <b>Sponsor</b>: University of California, San Francisco<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05058859?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05058859?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Artificial Intelligence to Improve Cardiometabolic Risk Evaluation Using CT Scans </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 28, 2021 at 07:00PM<br> <b>Conditions</b>: Pre-diabetes; Diabetes Mellitus<br> <b>Intervention</b>: Diagnostic Test: Oral Glucose Tolerance Test<br> <b>Sponsors</b>: Caristo Diagnostics Limited; University of Oxford; University of Leeds; Milton Keynes University Hospital NHS Foundation Trust<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05058690?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05058690?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Dexcom Hybrid Closed Loop Insulin Pump Study in Type 1 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 28, 2021 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes Mellitus<br> <b>Intervention</b>: Device: Tandem Control IQ Hybrid Closed Loop Insulin Delivery System<br> <b>Sponsors</b>: NHS Lothian; DexCom, Inc.; NHS Tayside<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05059860?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05059860?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: The Expression of circANKRD36 as a New Biomarker of Diabetic Nephropathy </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 29, 2021 at 07:00PM<br> <b>Condition</b>: Diabetic Nephropathy<br> <b>Intervention</b>: Genetic: circANKRD36 as a new biomarker<br> <b>Sponsor</b>: Assiut University<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05061459?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05061459?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Double-blinded, Randomized, Parallel, Placebo-controlled Trial of Wharton's Jelly-derived Allogeneic Mesenchymal Stromal Cells to Treat Type 1 Diabetes in Children and Adolescents </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 29, 2021 at 07:00PM<br> <b>Condition</b>: Type1diabetes<br> <b>Intervention</b>: Biological: the ATMP Protrans<br> <b>Sponsor</b>: Uppsala University Hospital<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05061030?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05061030?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Biomechanical and Viscoelastic Properties of Plantar Fascia in Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 29, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus<br> <b>Intervention</b>: Diagnostic Test: Evaluation of biomechanics and viscoelastic properties of plantar fascia<br> <b>Sponsor</b>: Bitlis Eren University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05061602?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05061602?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Glucose Testing in GDM: Adherence to One- Versus Two-hour Postprandial Glucose Monitoring in Gestational Diabetics </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 30, 2021 at 07:00PM<br> <b>Condition</b>: Gestational Diabetes<br> <b>Interventions</b>: Other: 1 hour Blood glucose monitoring; Other: 2 hour blood glucose monitoring<br> <b>Sponsor</b>: Weill Medical College of Cornell University<br> <b>Enrolling by invitation</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05062460?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05062460?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 01:22AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Help Everyone Assess Risk Today: LEnten Nutrition Study (HEART-LENS) </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 27, 2021 at 07:00PM<br> <b>Conditions</b>: Cardiovascular Morbidity; Risk Reduction; Nutrition Disorders<br> <b>Intervention</b>: Dietary Supplement: Vegan diet<br> <b>Sponsor</b>: Rush University Medical Center<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05057650?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05057650?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study to Evaluate THR-687 Treatment for Diabetic Macular Oedema. </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 01, 2021 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus; Diabetic Retinopathy; Diabetic Macular Edema<br> <b>Interventions</b>: Drug: THR-687 dose level 1; Drug: THR-687 dose level 2; Drug: THR-687 selected dose level; Drug: Aflibercept<br> <b>Sponsor</b>: Oxurion<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05063734?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05063734?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of TG103 Injection in Overweight/Obese Subjects With Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: October 01, 2021 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes Mellitus<br> <b>Interventions</b>: Drug: TG103; Drug: Placebo<br> <b>Sponsor</b>: CSPC Baike (Shandong) Biopharmaceutical Co., Ltd.<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05063253?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05063253?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 02:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_3797333134549619416footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUJWaO0M6z40qGz0JJ45s-2FmEhvAYRaropxbr-2Bq-2FJQA7eOChO5D29H-2BVtCFqA-2BoHY86L5Sg81IZhdpJzbEK6XnhCZTtY9-2FsZ5XFkhsSPFrt53yHjc-2FynnkvvQWDgYBQxy9ic8qMDWCUt0XckbDW7vYoHg83n174fXodSoTBXSgRtlF2xr70F-2Ff87OXg-2BJsE011vwzLJhs02ic5zyqu56OnOPE96jWZgzBgy7FGUkpLVFmBT9aOy7Xs-2FOi-2BNZ1wyTXou" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-33129452794063001912023-03-16T18:37:00.003+02:002023-03-16T18:37:56.030+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (26 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg-5192180723224233722"><u></u> <div class="m_-5192180723224233722body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-5192180723224233722mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-5192180723224233722content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-16651 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered on Virgin Media Super Hub 3 (based on ARRIS TG2492) devices. Because their SNMP commands have insufficient protection mechanisms, it is possible to use JavaScript and DNS rebinding to leak the WAN IP address of a user (if they are using certain VPN implementations, this would decloak them).<br> Published at: September 20, 2021 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16651" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20898 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20898" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20897 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Buffer Overflow vulnerability in function filter_slice in libavfilter/vf_bm3d.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20897" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20896 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20896" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20895 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Buffer Overflow vulnerability in function filter_vertically_##name in libavfilter/vf_avgblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20895" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20894 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Buffer Overflow vulnerability in function gaussian_blur in libavfilter/vf_edgedetect.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20894" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20893 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Buffer Overflow vulnerability in function activate in libavfilter/af_afade.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20893" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20892 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20892" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20891 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.<br> Published at: September 20, 2021 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20891" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19915 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Scripting (XSS vulnerability exists in WUZHI CMS 4.1.0 via the [mailbox username in index.php.<br> Published at: September 20, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19915" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 20, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-16630 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> TI’s BLE stack caches and reuses the LTK’s property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that a victim mobile uses secure pairing to pair with a victim BLE device based on TI chips and generate an authenticated-and-MITM-protection LTK. If a fake mobile with the victim mobile’s MAC address uses Just Works and pairs with the victim device, the generated LTK still has the property of authenticated-and-MITM-protection. Therefore, the fake mobile can access attributes with the authenticated read/write permission.<br> Published at: September 20, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-16630" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 21, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19553 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.<br> Published at: September 21, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19553" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 21, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19551 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.<br> Published at: September 21, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19551" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 21, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19554 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Cross Site Scripting (XSS) vulnerability exists in ManageEngine OPManager <=12.5.174 when the API key contains an XML-based XSS payload.<br> Published at: September 21, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19554" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 22, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-23269 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.<br> Published at: September 22, 2021 at 03:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23269" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 22, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-23267 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in gpac 0.8.0. The gf_hinter_track_process function in isom_hinter_track_process.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file<br> Published at: September 22, 2021 at 03:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23267" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 22, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-23266 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue was discovered in gpac 0.8.0. The OD_ReadUTF8String function in odf_code.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.<br> Published at: September 22, 2021 at 03:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23266" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 22, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-6288 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Edgecore ECS2020 Firmware 1.0.0.0 devices allow Unauthenticated Command Injection via the command1 HTTP header to the /EXCU_SHELL URI.<br> Published at: September 22, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6288" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 22, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-24327 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Server Side Request Forgery (SSRF) vulnerability exists in Discourse 2.3.2 and 2.6 via the email function. When writing an email in an editor, you can upload pictures of remote websites.<br> Published at: September 23, 2021 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24327" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 23, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19951 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application.<br> Published at: September 23, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19951" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 24, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19950 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the /banner/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.<br> Published at: September 23, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19950" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 24, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-19949 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in the /link/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.<br> Published at: September 23, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-19949" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 24, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2016-6556 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This issue was fixed in version 18.0.2, released on September 20, 2016.<br> Published at: September 25, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6556" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 25, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2016-6555 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in version 18.0.2, released on September 20, 2016.<br> Published at: September 25, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6555" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 25, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20514 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.<br> Published at: September 25, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20514" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 25, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20508 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.<br> Published at: September 25, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20508" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 25, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-5192180723224233722footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB-2BINAAj2-2FatoA8of6MGAx0UffsCg3m-2Fl0luEOPS3OrjS-2Fxah2RitxtKmaTJutjPslw-2BUbMqIXTpIOqE24Ns4NExE6dlwqmzc-2BOosTrjkFVZwbuIhu1A-2BjWS23kVAMH-2F52tTyuMXoNrMRirN80npV00SkVOmOG4eqKmxy0DdP1-2BDB6m5ed6bSOGtE7ElTzoxRKb1IfPuN0XF9N2YuqLG-2BIfWdCTsxLBSpggYjYz9rwrqd" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-50139892023998027782023-03-16T18:37:00.001+02:002023-03-16T18:37:15.375+02:00Weekly Digest: a new vulnerability is published on the National Vulnerability Database (39 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg-5994683598499336157"><u></u> <div class="m_-5994683598499336157body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_-5994683598499336157mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_-5994683598499336157content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0660 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In ccu, there is a possible out of bounds read due to incorrect error handling. This could lead to information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827145; Issue ID: ALPS05827145.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0660" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0612 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0612" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0611 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0611" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0610 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0610" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0425 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0425" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0424 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0424" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0423 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0423" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0422 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0422" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-0421 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.<br> Published at: September 27, 2021 at 03:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0421" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2021 at 05:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-24930 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Beijing Wuzhi Internet Technology Co., Ltd. Wuzhi CMS 4.0.1 is an open source content management system. The five fingers CMS backend in***.php file has arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.<br> Published at: September 28, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-24930" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20696 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.<br> Published at: September 28, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20696" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20695 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.<br> Published at: September 28, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20695" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20693 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.<br> Published at: September 28, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20693" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20692 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.<br> Published at: September 28, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20692" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20691 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An issue in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via bypassing the file extension filter and uploading crafted HTML files.<br> Published at: September 28, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20691" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20125 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.<br> Published at: September 29, 2021 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20125" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20124 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.<br> Published at: September 29, 2021 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20124" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20122 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Wuzhi CMS v4.1 contains a SQL injection vulnerability in the checktitle() function in /coreframe/app/content/admin/content.php.<br> Published at: September 29, 2021 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20122" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20120 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.<br> Published at: September 29, 2021 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20120" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-12030 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> There is a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway.<br> Published at: September 29, 2021 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12030" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20781 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A stored cross-site scripting (XSS) vulnerability in /ucms/index.php?do=list_edit of UCMS 1.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the title, key words, description or content text fields.<br> Published at: September 30, 2021 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20781" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20131 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows atackers to execute arbitrary web scripts or HTML via a crafted payload in the page management module.<br> Published at: September 30, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20131" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20129 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.<br> Published at: September 30, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20129" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20128 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> LaraCMS v1.0.1 transmits sensitive information in cleartext which can be intercepted by attackers.<br> Published at: September 30, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20128" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18685 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Floodlight through 1.2 has poor input validation in checkFlow in StaticFlowEntryPusherResource.java because of unchecked prerequisites related to TCP or UDP ports, or group or table IDs.<br> Published at: September 30, 2021 at 05:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18685" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18684 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Floodlight through 1.2 has an integer overflow in checkFlow in StaticFlowEntryPusherResource.java via priority or port number.<br> Published at: September 30, 2021 at 05:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18684" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-18683 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Floodlight through 1.2 has poor input validation in checkFlow in StaticFlowEntryPusherResource.java because of undefined fields mishandling.<br> Published at: September 30, 2021 at 05:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18683" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20665 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> rudp v0.6 was discovered to contain a memory leak in the component main.c.<br> Published at: September 30, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20665" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20664 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> libiec_iccp_mod v1.5 contains a segmentation violation in the component server_example1.c.<br> Published at: September 30, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20664" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20663 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c.<br> Published at: September 30, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20663" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20662 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c.<br> Published at: September 30, 2021 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20662" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 30, 2021 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20746 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg.<br> Published at: October 01, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20746" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20799 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> JeeCMS 1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the commentText parameter.<br> Published at: October 01, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20799" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20797 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php.<br> Published at: October 01, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20797" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-20796 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the "Id" parameter.<br> Published at: October 01, 2021 at 01:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-20796" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21014 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> emlog v6.0.0 contains an arbitrary file deletion vulnerability in admin/plugin.php.<br> Published at: October 01, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21014" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21013 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> emlog v6.0.0 contains a SQL injection via /admin/comment.php.<br> Published at: October 01, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21013" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21012 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Sourcecodester Hotel and Lodge Management System 2.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the email parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.<br> Published at: October 01, 2021 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21012" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 01, 2021 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2020-21228 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> JIZHICMS 1.5.1 contains a cross-site scripting (XSS) vulnerability in the component /user/release.html, which allows attackers to arbitrarily add an administrator cookie.<br> Published at: October 02, 2021 at 12:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21228" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">October 02, 2021 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_-5994683598499336157footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB-2FNtzZTiJFZ7ht6gxXGcJZzlbp-2FbnUMOyiUjAjIlxFI418RVSPOm9fAHZvIDdYSzCJLlwEwPFNy5MW5yCqwQXXCXZ9-2FFAj-2F0U-2B7Nu7mR7sfzK0IEPP8-2BIcEf2FJZWSow17-2Bb2QeFZqHrRoZ-2BvIVp66p-2Bxq2bRP2SBNaiUxqdHx-2BxHHw3vigBDk-2BI9-2BsN-2B-2FQE7Jnn0v3XG0P2gefpzIiNOkAiM7mN0-2BwRE4QvzXC47psz" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-4783235469655676272023-03-16T16:25:00.001+02:002023-03-16T16:25:52.588+02:00Fwd: Weekly Digest: a new vulnerability is published on the National Vulnerability Database (52 items)<div dir="ltr"><div class="gmail_quote"><br><div class="msg3544229509873271307"><u></u> <div class="m_3544229509873271307body"> <table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"> <tbody><tr> <td align="left" valign="top"> <table border="0" cellspacing="0" cellpadding="0" class="m_3544229509873271307mobile-shell"> <tbody><tr> <td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"> <table class="m_3544229509873271307content" cellpadding="0" cellspacing="0" border="0" width="600"> <tbody><tr> <td> <table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"> <tbody><tr> <td> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-21797 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.<br> Published at: September 26, 2022 at 08:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21797" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-21169 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.<br> Published at: September 26, 2022 at 08:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21169" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 01:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-1755 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The SVG Support WordPress plugin before 2.5 does not properly handle SVG added via an URL, which could allow users with a role as low as author to perform Cross-Site Scripting attacks<br> Published at: September 26, 2022 at 04:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1755" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 05:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-1613 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations in certain situations.<br> Published at: September 26, 2022 at 04:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1613" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 05:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-24890 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The Scripts Organizer WordPress plugin before 3.0 does not have capability and CSRF checks in the saveScript AJAX action, available to both unauthenticated and authenticated users, and does not validate user input in any way, which could allow unauthenticated users to put arbitrary PHP code in a file<br> Published at: September 26, 2022 at 04:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24890" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 05:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-41437 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An HTTP response splitting attack in web application in ASUS RT-AX88U before v3.0.0.4.388.20558 allows an attacker to craft a specific URL that if an authenticated victim visits it, the URL will give access to the cloud storage of the attacker.<br> Published at: September 26, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41437" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 07:34PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22058 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Memory corruption due to use after free issue in kernel while processing ION handles in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables<br> Published at: September 26, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22058" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-28052 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A tenant administrator Hitachi Content Platform (HCP) may modify the configuration in another tenant without authorization, potentially allowing unauthorized access to data in the other tenant. Also, a tenant user (non-administrator) may view configuration in another tenant without authorization. This issue affects: Hitachi Vantara Hitachi Content Platform versions prior to 8.3.7; 9.0.0 versions prior to 9.2.3.<br> Published at: September 26, 2022 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28052" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 26, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27862 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).<br> Published at: September 27, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27862" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27861 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)<br> Published at: September 27, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27861" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27854 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.<br> Published at: September 27, 2022 at 10:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27854" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-27853 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.<br> Published at: September 27, 2022 at 09:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27853" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 27, 2022 at 11:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-41433 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> SQL Injection vulnerability exists in version 1.0 of the Resumes Management and Job Application Website application login form by EGavilan Media that allows authentication bypass through login.php.<br> Published at: September 28, 2022 at 02:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41433" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 03:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22526 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a missing authentication allows for full access via API.<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22526" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22525 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 an remote attacker with admin rights could execute arbitrary commands due to missing input sanitization in the backup restore function<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22525" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22524 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 an unauthenticated remote attacker could utilize a SQL-Injection vulnerability to gain full database access, modify users and stop services .<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22524" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22523 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An improper authentication vulnerability exists in the Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 Web-App which allows an authentication bypass to the context of an unauthorised user if free-access is disabled.<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22523" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22522 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 a remote, unauthenticated attacker could make use of hard-coded credentials to gain full access to the device.<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22522" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-43980 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.<br> Published at: September 28, 2022 at 05:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43980" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 07:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-22387 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Application Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 221965.<br> Published at: September 28, 2022 at 07:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-22387" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2021-41434 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> A stored Cross-Site Scripting (XSS) vulnerability exists in version 1.0 of the Expense Management System application that allows for arbitrary execution of JavaScript commands through index.php.<br> Published at: September 28, 2022 at 08:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41434" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 28, 2022 at 09:33PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2022-1270 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> In GraphicsMagick, a heap buffer overflow was found when parsing MIFF.<br> Published at: September 28, 2022 at 11:15PM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1270" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 01:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20247 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20247" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20246 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20246" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20245 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20245" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20244 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20244" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20243 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20243" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20242 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20242" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20241 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20241" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20240 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20240" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20239 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20239" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20238 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20238" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20237 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20237" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20236 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20236" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20235 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20235" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20234 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20234" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20233 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20233" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20232 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20232" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20231 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20231" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20230 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20230" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20229 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20229" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20228 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during the year 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20228" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2019-20227 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.<br> Published at: September 29, 2022 at 07:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20227" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2016-2338 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overflow.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2338" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2015-1931 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR1 FP10, 7 R1 before SR3 FP10, 7 before SR9 FP10, 6 R1 before SR8 FP7, 6 before SR16 FP7, and 5.0 before SR16 FP13 stores plaintext information in memory dumps, which allows local users to obtain sensitive information by reading a file.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1931" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2014-0148 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Qemu before 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_per_block' etc. A user able to alter the Qemu disk image could ise this flaw to crash the Qemu instance resulting in DoS.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0148" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2014-0147 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Qemu before 1.6.2 block diver for the various disk image formats used by Bochs and for the QCOW version 2 format, are vulnerable to a possible crash caused by signed data types or a logic error while creating QCOW2 snapshots, which leads to incorrectly calling update_refcount() routine.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0147" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2014-0144 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0144" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2012-4818 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM InfoSphere Information Server 8.1, 8.5, and 8,7 could allow a remote authenticated attacker to obtain sensitive information, caused by improper restrictions on directories. An attacker could exploit this vulnerability via the DataStage application to load or import content functionality to view arbitrary files on the system.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4818" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2012-2201 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM WebSphere MQ 7.1 is vulnerable to a denial of service, caused by an error when handling user ids. A remote attacker could exploit this vulnerability to bypass the security configuration setup on a SVRCONN channel and flood the queue manager.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2201" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2012-2160 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Rational Change 5.3 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using the SUPP_TEMPLATE_FLAG parameter in a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2160" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#000000!important"> New vulnerabilities from the NVD: CVE-2011-4820 </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> IBM Rational Asset Manager 7.5 could allow a remote attacker to bypass security restrictions. An attacker could exploit this vulnerability using the UID parameter to modify another user's preferences.<br> Published at: September 29, 2022 at 06:15AM<br> <a href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4820" target="_blank">View on website</a><br> <br> <a style="color:#000000!important;text-decoration:underline">September 29, 2022 at 08:33AM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via National Vulnerability Database <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><table class="m_3544229509873271307footer" style="color:#999999;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:12px;line-height:16px;text-align:center;font-weight:normal;text-align:center;vertical-align:top;width:100%"><tbody> </tbody></table> </td> </tr> </tbody></table> </td> </tr> </tbody></table> <img src="https://links.ifttt.com/wf/open?upn=gTIljih58KVdMrGgtPvQVA4A-2BHyGa7fQ07AExKxOnmh7I9kuQ5wLASM81pZdNcYUdsPhynmMIjUhNba5wackB6oeCIMl81bBAdQo6UJlwNtu-2FskkpUNnIkCieBPvBtDo6Ns-2BatG7aYyTZKOqlcd2q5KDeJLet4bBWls8g40bev9Cv40D4ZJLgW8rT75dEkKU8ENzLogYBLY6xoPhtqN8iZmDL6aZgYhdyRzKH1Q2dIQFfXgJLPwCVEob3NjEGG3oogvcCoJwgND9BOKw75RatSBnYQo92aB-2B-2FdJ93liiJ5VpgYy9pDqYBadbxybqDqrU" alt="" width="1" height="1" border="0" style="height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important"></div> </div></div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-75776277753887792882023-02-15T18:04:00.000+02:002023-02-15T18:13:24.230+02:00Цени в зимните ни ски курорти за сезон 2022/2023 (част 2) - Списание 360<div dir="ltr"><div><a href="https://www.360mag.bg/posts/135310">https://www.360mag.bg/posts/135310</a></div><div><br></div><div> <span class="gmail-td-post-date">03.02.2023</span> <br></div><div> <p><em>След като ви показахме актуален списък на <a href="https://www.360mag.bg/posts/134735" target="_blank" rel="noopener">цените в някои от големите ни зимни курорти за сезон 2022/2023,</a> сега събираме на едно място по-малко известните ски писти, на които също с голямо удоволствие да покараме тази зима.</em></p> <h3><strong>Ски център ОСОГОВО</strong></h3> <p><strong>Работят:</strong><br> Ски писта „Осогово"<br> Ски писта „Шейнарска"<br> Ски писта „Людмил Янков"<br> Ски писта „Плавилото"</p> <p>Има и <em>бордъркрос</em> трасе.</p> <p>ЦЕНИ:</p> <p>Целодневна карта възрастни 45 лв. Деца 35 лв.</p> <p>Полудневна карта: възрастни 35 лв. Деца 25 лв<br> Варианти: Сутрешна от 09:00-13:00 часа и следобедна 12:00-16:00 часа.</p> <p>Ски училище Ski School Osogovo: 40 лв. за урок от един астрономически час. (за индивидуалните уроци, до трима човека).</p> <p>Групови уроци (над трима души) 35 лв. на час.</p> </div><div><br></div><div><br></div><div><br></div><div> <h3><strong>УЗАНА</strong></h3> <p>Работи писта <strong>„Горското"</strong>, с дължина 200 метра.</p> <p><strong>Възрастни:</strong><br> Целодневна карта за влек 25 лв. Картата важи за двете писти.</p> <p>Карта за влек – 1/2 ден – 20 лв. Важи само следобед след 13:00 ч.</p> <p>Ски / сноуборд оборудване – 25 лв. Цената важи за дневно каране</p> <p>Ски училище (на час) – 40 лв. Ски инструктор с индивидуално отношение.</p> <p><strong>Цени за деца:</strong></p> <p>Целодневна карта за влек – 20 лв. Картата важи за двете писти.</p> <p>Карта за влек – 1/2 ден – 15 лв. Важи само следобед след 13:00 ч.</p> <p>Ски / сноуборд оборудване – 20 лв. Цената важи за дневно каране.</p> <p>Ски училище (на час) – 40 лв. Ски инструктор с индивидуално отношение</p> <p>Шейни – 15 лв. Цената важи за дневно каране.</p> <p><strong>Нощно Каране</strong><br> Карта за влек – 20 лв. Картата важи за двете писти.</p> <p>Ски / сноуборд оборудване – 20 лв.</p> <p>В местността Узана <strong>писта „Завоя"</strong> в момента не работи. За останалите писти няма информация.</p> </div><div><br></div><div><br></div><div> <h3><strong>КАРТОЛА</strong></h3> <p>Пистите са в местност Картола, край смолянското село Момчиловци.</p> <p><strong>Карта за влек:</strong><br> <span style="text-decoration:underline">Полудневна</span><br> Деца: 10 лв. Възрастни: 15 лв.<br> <span style="text-decoration:underline">Еднодневна</span><br> Деца: 15 лв. Възрастни: 20 лв.<br> <span style="text-decoration:underline">Тридневна</span><br> Деца: 38 лв. Възрастни: 50 лв.<br> <span style="text-decoration:underline">Петдневна</span><br> Деца: 60 лв. Възрастни: 80 лв.</p> </div><div><br></div><div><br></div><div> <h3><strong>СЕМКОВО</strong></h3> <p>Курортен комплекс „СЕМКОВО" се намира на 18 км. от гр.Белица, обл.Благоевград и 180 км от столицата София. Курортът е сгушен в полите на Южна Рила / около 1600 м.н.в. В местността към момента има много сняг и много добри условия, всички писти работят.</p> <p>Картите за влек се закупуват от рецепция на ТУ-София:</p> <p><strong>Цени за ски влек:</strong><br> Полудневна: 20 лв.<br> Еднодневна: 30 лв.<br> Тридневна: 75 лв.<br> Петдневна: 100 лв.<br> Шестдневна: 110 лв.<br> Седемдневна: 115 лв.<br> <strong>Ски гардероб:</strong><br> Наем на ски обувки, ски и щеки:<br> дете: 10 лв.<br> Възрастен: 15 лв.</p> </div><div><br></div><div><br></div><div> <h3><strong>ЮНДОЛА, писта „Старина"</strong></h3> <p>Планинската местност Юндола е на границата между планините Рила и Родопи. Намира се на 16 км северозападно от Велинград.</p> <p><strong>ЦЕНИ ЗА ЗИМА 2023</strong></p> <p>Ски влек – 20 лв. / ден<br> Ски влек за деца до 12 г. – 10 лв. / ден<br> Ски оборудване за възрастни – 20 лв. / ден<br> Ски оборудване за деца – 10 лв. / ден<br> Шейна за деца – 10 лв. / ден<br> Ски учител на човек – 10 лв. / макс 2 часа</p> <p>Езда на кон "Хафлингер" – 20 лв. / 30 мин.<br> Езда на пони – 10 лв. / 15 мин.</p> </div><div><br></div><div> <h3><strong>ЯЗОВИР БАТАК</strong></h3> <p>Пистата на <strong>Цигов чарк</strong> тази година не работи, очаква се да заработи през следващата. Условията там може да бъдат следени чрез <a href="https://villasantamaria.bg/webcam/" target="_blank" rel="noopener">уеб камера.</a></p> <p>Над<strong> местност Дъното, в летовище „Свети Константин</strong>" по-голямата и по-стръмна писта не работи, тъй като няма достатъчно сняг. Работи малката писта с дължина около 150 метра.</p> </div><div><br></div><div> <p><strong>Цени за малката писта:</strong></p> <p>Наем на шейни /гуми – 10 лв. на ден!<br> Наем на ски за ден:<br> 12 лв. детски до 36 номер;<br> 14 лв. ски за възрастни – от номер 36 нагоре;<br> Сноуборд – 20 лв. /ден<br> Инструктор – 20 лв. един час занимание!<br> Работно време:<br> От 10.00 до 16.30 ч.</p> <h3><strong>ДОБРИНИЩЕ</strong></h3> <p>Цените са както следва:</p><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjQCKnSJvguR9SBg2fAC5buJFg8rZR57icIPT66x8kF6ZR7B4vrCqTzu7L1tkAbFSmhawuMqkTHVAMGZ4OqQyY9WSSL5vLLm17WCeuaivKc_SUjSsKbFR64D8LKdjFF_zoOceVZQbAfLMJCL2cB_MiSLfmSQJyNitoasAAywIfDFtSZrwk6L7TDcdQIVw"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEjQCKnSJvguR9SBg2fAC5buJFg8rZR57icIPT66x8kF6ZR7B4vrCqTzu7L1tkAbFSmhawuMqkTHVAMGZ4OqQyY9WSSL5vLLm17WCeuaivKc_SUjSsKbFR64D8LKdjFF_zoOceVZQbAfLMJCL2cB_MiSLfmSQJyNitoasAAywIfDFtSZrwk6L7TDcdQIVw=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416488585708338" /></a><br></div><div> <h3><strong>БЯЛА ЧЕРКВА</strong></h3> <p>Ски центърът се намира на 37 км южно от град Пловдив. Дължината на пистата е 1100 м, ширина 25-30м., денивелация 180 м. Надморската височина на ски-центъра е 1600 м. Ски пистата <span style="text-decoration:underline">в момента не работи.</span></p> <p>Цени за ски влек 2022/2023:</p> <table style="height:433px" width="590" cellspacing="3" cellpadding="2" border="1"><tbody><tr><td width="200" bgcolor="#dff6f8"><p style="text-align:center" align="RIGHT"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>ПЕРИОД</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>1 ДЕН</b></span></span></span></p> </td> </tr> <tr> <td width="200" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>САМО ПЛАЦ</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:medium">12 лв</span></span></span></p> </td> </tr> <tr> <td width="200" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>ВЪЗРАСТНИ</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:medium">30 лв</span></span></span></p> </td> </tr> <tr> <td width="200" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>ДЕЦА ДО 12 години</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:medium">25 лв</span></span></span></p> </td> </tr> <tr> <td width="200" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>СКИ УЧИТЕЛ<br> /за група до 6 деца/</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:medium">59 лв</span></span></span></p> </td> </tr> <tr> <td width="200" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:small"><b>СКИ УЧИТЕЛ<br> /за група от 7 до 12 деца/</b></span></span></span></p> </td> <td width="47" bgcolor="#dff6f8"> <p align="CENTER"><span style="color:rgb(0,0,0)"><span style="font-family:Verdana,sans-serif"><span style="font-size:medium">89 лв</span></span></span></p></td></tr></tbody></table> </div><div><br></div><div><br></div><div> <p><br></p> <h3><strong>НЕ РАБОТЯТ: </strong></h3> <p>Поради липса на достатъчно сняг не работят: Паничище, Пършевица, КОМ.<br> На х. Чумерна (към момента на изготвяне на материала) има 50 см снежна покривка, но пистата не работи от 10 години. По данни на местни жители, тя е собственост на общината.</p> </div><div><br></div><div><br></div><div> <h2><strong>Банско</strong></h2> <p>Ски сезонът в <strong>Банско</strong> бе открит на 17 декември 2022 г., въпреки нищожното количество сняг. <strong>На 15 януари, по случай Световния ден на снега, в Банско децата ще карат само срещу 1 лев. </strong>С 14% по-скъпо ще плащаме за лифт картите там през този зимен сезон. Най-купуваната и тази година е дневната, чиято цена от 79 лева вече е 90 лева.</p> <p><em>На 14.01.2023 г. в курорта бяха обявени намалени цени</em> (които са по-ниски от посочените по-долу). Актуалните тарифи може да следите на техния <a href="https://banskoski.com/bg/page/ceni" target="_blank" rel="noopener"><strong>уебсайт.</strong></a></p> <h4><strong>Цени за сезон 2022/2023:</strong></h4> </div><div><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgGlfV6ycq2qzB2rn2ckx480tjmJ6duvStqEeTMX8-wYSutwb7k7ixPLhvuLPH-nJlwDefCkQ5Ir4_F8jUc9NEJu-57EJDuOa0KazpPeLZEF8f_a_9t84z3d8-lUSz3WofX9yexEuqf_IBseZxBbGM7770uevTbTUdJLyChIQzFLQ5tcWZdfDbyApnh3A"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEgGlfV6ycq2qzB2rn2ckx480tjmJ6duvStqEeTMX8-wYSutwb7k7ixPLhvuLPH-nJlwDefCkQ5Ir4_F8jUc9NEJu-57EJDuOa0KazpPeLZEF8f_a_9t84z3d8-lUSz3WofX9yexEuqf_IBseZxBbGM7770uevTbTUdJLyChIQzFLQ5tcWZdfDbyApnh3A=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416495997851378" /></a><br></div><div><br></div><div><br></div><div> <h2><strong>Боровец</strong></h2> </div><div><a href="https://blogger.googleusercontent.com/img/a/AVvXsEj1vPahEiqa4Lps2-AT_RR6MqSjbtM_FrkPHmfN20ofoySpYzIC-iuQN1QO8HnCA4M0OnC5tnq05fo2otx3D8s7t1uVaiocLZZLSzOdMvbvJN3W8eWsSxomjS8aSp7N4e2sV67VzNRNLFXXQCuZBka85JdG7B0xqXSepe4Gp8-NXrjBWCjBSpSs3-q-_w"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEj1vPahEiqa4Lps2-AT_RR6MqSjbtM_FrkPHmfN20ofoySpYzIC-iuQN1QO8HnCA4M0OnC5tnq05fo2otx3D8s7t1uVaiocLZZLSzOdMvbvJN3W8eWsSxomjS8aSp7N4e2sV67VzNRNLFXXQCuZBka85JdG7B0xqXSepe4Gp8-NXrjBWCjBSpSs3-q-_w=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416506609226002" /></a><br></div><div><br></div><div><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhaV_sB2QTTvejaczdH4eAjrNOmubG_nC838zBJ5FR1qRCbISjL1oKofVJWKQordaLnRFXINyvzAZ-NZadghDbw-6-ER-GxZnzqeshdCK6hQvJ2qxTUq6vIjQr4AGFHn9_eFvKirhjdhH40LZiG83Vs9rromYfuvI0Qi2ahHsDK3QbnnIZ5gQHoao_XaQ"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEhaV_sB2QTTvejaczdH4eAjrNOmubG_nC838zBJ5FR1qRCbISjL1oKofVJWKQordaLnRFXINyvzAZ-NZadghDbw-6-ER-GxZnzqeshdCK6hQvJ2qxTUq6vIjQr4AGFHn9_eFvKirhjdhH40LZiG83Vs9rromYfuvI0Qi2ahHsDK3QbnnIZ5gQHoao_XaQ=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416514771342178" /></a><br></div><div><br></div><div><br></div><div> <h2><strong>Витоша</strong></h2> </div><div> <p>И този сезон ще можем да се радваме на <strong>нощно каране на Витоша.</strong> Витоша ски отново ще предложи дневна карта за летене, от която могат да се възползват парапланеристите. Най-изгодно и през този сезон ще бъде семейният билет за кабинков лифт в двете посоки: семейство с едно дете до 7 г. 30лв.+5лв., семейство с две деца: 30лв.+10лв.</p> <a href="https://blogger.googleusercontent.com/img/a/AVvXsEi-walW1hizAdFhlo4aaH5hyKOj_VcEswI5AR-esR_1_DPChedQMmiHsP7odRUIhXL_52vCF6dbC7IvO64z9s1OmGKyyME3yRtbEAtFk_HFEJShieCQ5NpSuzuDaOBKSCf9qu0RTRXBEFBKV0fRppMYW8uFmJy8f_3SnBBl48lVJx0tcwL1G71X7Ciu_Q"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEi-walW1hizAdFhlo4aaH5hyKOj_VcEswI5AR-esR_1_DPChedQMmiHsP7odRUIhXL_52vCF6dbC7IvO64z9s1OmGKyyME3yRtbEAtFk_HFEJShieCQ5NpSuzuDaOBKSCf9qu0RTRXBEFBKV0fRppMYW8uFmJy8f_3SnBBl48lVJx0tcwL1G71X7Ciu_Q=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416520784743602" /></a><br> <h2><strong>КК „Мальовица"</strong></h2> </div><div> <p>КК „Мальовица" разполага с 2 ски писти, 2 учебни плаца, 1 ски път, предлага нощно каране и много възможности за Freeride и Ski Touring! Намира се на 1978 м надморска височина. До 6 февруари в комплекса са валидни <a href="https://malyovitsa.com/%d0%bd%d0%b0%d1%87%d0%b0%d0%bb%d0%be/%d1%86%d0%b5%d0%bd%d0%b8-%d1%81%d0%ba%d0%b8-%d1%83%d1%81%d0%bb%d1%83%d0%b3%d0%b8/?fbclid=IwAR2MpAxwSMlMr_9Gwon97RTk_6VRY299CohvXsMJzVvMEltXXodT1cfPswE" target="_blank" rel="noopener">промоционални</a> цени.</p> <p></p> <img class="gmail-size-full gmail-wp-image-135344" src="https://www.360mag.bg/wp-content/uploads/2023/01/malyovica_prices.png" alt="Цени Мальовица 2022-2023" style="margin-right: 0px;" width="188" height="92"><br><br> <h2><strong>Добринище / Безбог</strong></h2> <p>Все още няма условия за старт на сезона, работи само Детската писта. Очакват се и актуализираните цени. Ако все пак до откриване на сезона наминете натам, добрата новина е, че столовата в х. Безбог работи.</p> <p>Седалковият лифт от хижа „Гоце Делчев" до хижа „Безбог" работи всеки ден със зимно работно време 8:30 до 15:45 ч. От х. „Безбог" лифтът започва работа в 9:00 ч. Продължителността на изкачването/слизането от крайните точки е 27 минути с прекачване на една междинна станция.</p> <h4><strong>Цени за сезон 2022/2023:</strong></h4> <a href="https://www.360mag.bg/wp-content/uploads/2023/01/bezbog.jpg"><img class="gmail-size-full gmail-wp-image-134749" src="https://www.360mag.bg/wp-content/uploads/2023/01/bezbog.jpg" alt="Безбог, цени за сезон 2022/2023" width="509" height="362"></a> <h2><strong>Ски парк „Картала", Благоевград</strong></h2> <p>Ски паркът се намира над град Благоевград, на около 30 км. от града, в землището на с. Бистрица.</p> <p>Цени еднократен билет за лифта: възрастен – 15 лв., студенти – 13 лв., деца от 7-12 г. – 10 лв, деца до 6 г. – безплатно.</p> <h4><strong>Цени за сезон 2022/2023:</strong></h4><div><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi_8_3UmBHFD7UerSHjq_zVyhBvmjeOVFFwmhG7WCBKfETc3rWf8v7Q2VsfFkY17btIc1kTog7uxU1KzbdhsoMxoEf7HDj4tZwOHqcN_Sw7gN1Khv28IO5N8mjrtOjOJ_77C524pH4XoUxzsxCAt_HEyW9I9C4CGe51d0lMtyFfUgFhOdW8-8f1ct-yTQ"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEi_8_3UmBHFD7UerSHjq_zVyhBvmjeOVFFwmhG7WCBKfETc3rWf8v7Q2VsfFkY17btIc1kTog7uxU1KzbdhsoMxoEf7HDj4tZwOHqcN_Sw7gN1Khv28IO5N8mjrtOjOJ_77C524pH4XoUxzsxCAt_HEyW9I9C4CGe51d0lMtyFfUgFhOdW8-8f1ct-yTQ=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416527309354818" /></a><br></div><div><a href="https://blogger.googleusercontent.com/img/a/AVvXsEg0mUeX_Hlufoyc0maaU0OZk8y0RkhZAuplozExROJYDUgGqx1wTsK1DNlixt3tv5SMPrHKL1Pn5urgRAUlEaKg4RfhZQf_vo_PZwTMGKEWKmnpaysvaJ-oexhz1WWWfv8n1juxInzFnXRLgimdMpbiq02WuzWbuFNjzb9m7OTRGV1wmOYlz4lhUeaKUA"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEg0mUeX_Hlufoyc0maaU0OZk8y0RkhZAuplozExROJYDUgGqx1wTsK1DNlixt3tv5SMPrHKL1Pn5urgRAUlEaKg4RfhZQf_vo_PZwTMGKEWKmnpaysvaJ-oexhz1WWWfv8n1juxInzFnXRLgimdMpbiq02WuzWbuFNjzb9m7OTRGV1wmOYlz4lhUeaKUA=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416536707306578" /></a><br> <h2><strong>Седемте рилски езера / Паничище</strong></h2> <p>Поради липса на снежно покритие, ски пистите в Паничище не работят. Лифт „Рилски езера" е с работно време: всеки ден от <strong>9.00 до 16.30 часа.</strong></p> <p>Tекуща техническа профилактика: <strong>всеки понеделник до обяд и всеки последен понеделник на месеца – цял ден.</strong></p> <a href="https://blogger.googleusercontent.com/img/a/AVvXsEiaZNs_FizQ4MfjLRHkcGBmMZezvWofil3WBcElyz9mm2QVfh8hz4MdYzO58t501eCaJ1RE3gIuDVbyXHj9QnLV0QYtLe6FQ1fMOVozts5mU4ukdK34aQA1z98zSsiBwSCSX0N7CKOXgwX0PL4dO1tvZTG4zEa8mawfPubAO-ee41mJRgTXFm50A2LQ4A"><img src="https://blogger.googleusercontent.com/img/a/AVvXsEiaZNs_FizQ4MfjLRHkcGBmMZezvWofil3WBcElyz9mm2QVfh8hz4MdYzO58t501eCaJ1RE3gIuDVbyXHj9QnLV0QYtLe6FQ1fMOVozts5mU4ukdK34aQA1z98zSsiBwSCSX0N7CKOXgwX0PL4dO1tvZTG4zEa8mawfPubAO-ee41mJRgTXFm50A2LQ4A=s320" border="0" alt="" id="BLOGGER_PHOTO_ID_7200416539474745666" /></a><br><br></div> </div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-8616957946777817962022-10-27T15:54:00.000+03:002022-10-27T15:55:34.529+03:00Прогнози за ски сезона и ценитеТуристическият бранш очаква силен зимен сезон, цените нагоре до 20%
<br>
<br><a href="https://www.mediapool.bg/turisticheskiyat-bransh-ochakva-silen-zimen-sezon-tsenite-nagore-do-20-news341255.html">https://www.mediapool.bg/turisticheskiyat-bransh-ochakva-silen-zimen-sezon-tsenite-nagore-do-20-news341255.html</a>
<br>
<br>ва за възрастни и 25 лева за пенсионери и деца, като се предлагат и полудневни.
<br>
<br>Ски оборудването на ден за възрастни беше 25 лева, а за деца до 14
<br>години - 20 лева, като се правят отстъпки при наемане за повече дни.
<br>
<br>Ски екипировката по-висок клас струва 30 лева, наемане на сноуборд -
<br>също 30 лева. Училището разполага с петима лицензирани учители.
<br>Индивидуалното обучение беше 50 лева за час, а при груповото цените
<br>варират според броя на учениците.
<br>
<br>Безплатна е пързалката за най-малките в курортния комплекс, по която
<br>могат да се спускат с шейни, найлони и всякакви зимни приспособления.
<br>
<br>В непосредствена близост до пистите се намира семеен хотел "Сима",
<br>който разполага 45 места леглова база. Цените за нощувка варират от
<br>120 до 240 лева в зависимост дали клиентът избира стая, апартамент или
<br>мезонет.
<br>
<br>Повишението в сравнение с миналата година е около 30 лева, каза
<br>управителят на хотела Християна Малкиева. По думите ѝ вече има
<br>резервации и за новогодишните празници.
<br>
<br>Ски център "Каранашеви" край Котел
<br>
<br>Подготовката на съоръженията в ски център "Каранашеви" край Котел ще
<br>започне в началото на декември, каза собственикът Димитър Каранашев.
<br>
<br>Пистата се намира в местност "Трите вятъра" на 4 километра от града,
<br>като е предпочитана от туристи от източна България. По думите на
<br>Каранашев, клиентите им най-често идват в почивните дни и през
<br>ваканциите, и са предимно от Сливен, Ямбол, Бургас, Варна, Русе.
<br>
<br>Ски центърът разполага с малка писта с минимален наклон, където
<br>инструктор помага в първите стъпки на начинаещите. Мястото е подходящо
<br>и за малки деца с шейни.
<br>
<br>На второ ниво е пистата за начинаещи с дължина 250 метра. Третото ниво
<br>има стръмен склон с 30-градусов наклон и дължина 150 метра и е
<br>територия за по-напреднали. В стандартните категоризации тази писта е
<br>от клас червен, предпоследен в класификатора.
<br>
<br>Качването на високите писти се обезпечава със ски влекове. Има и две
<br>оръдия за сняг. На място е организиран ски гардероб, където под наем
<br>може да се вземат за ползване ски оборудване и шейни.
<br>
<br>Цената на ски оборудването през миналата година беше 15 лева дневно,
<br>същата е цената и на ски влека, каза Димитър Каранашев. По думите му
<br>през новия сезон вероятно ще бъде повишена цената на съоръженията с
<br>оглед разхода за електричество. В момента се подготвят помещения за
<br>туристическа спалня.
<br>
<br>Писта "Пършевица" края Враца
<br>
<br>Стопаните на единствената ски писта във Врачанския балкан –
<br>"Пършевица" вече се подготвят за зимния сезон. Проверява се
<br>техническото състояние на ски влековете и на машините за обработка на
<br>снега, правят се необходимите текущи ремонти, обясни Васил Милчев,
<br>който стопанисва както пистата, така и едноименната туристическа хижа.
<br>
<br>Пистата е дълга 1000 метра, има и две детски писти в близост - по 100
<br>метра. Ски съоръженията работят, когато в планината падне достатъчно
<br>сняг или от три до пет месеца през годината, защото не разполагат с
<br>оръдие за изкуствен сняг.
<br>
<br>Досега възрастните скиори можеха да се спускат по "Пършевица" срещу 25
<br>лева на ден и да ползват гардероб срещу 10 лева, а децата караха ски
<br>за 10 лева и ползваха гардероб срещу 5 лева дневно.
<br>
<br>Васил Милчев обясни, че вероятно цените ще се повишат през новия зимен
<br>сезон заради непрекъснато увеличаващите се цени на електроенергията,
<br>но това трябва да стане много внимателно, защото може да откаже
<br>любителите на зимните спортове да се качат в планината.
<br>
<br>Пистата във Врачанския балкан е много популярна сред жителите в
<br>областта и близките населени места от съседни области. Предпочитана е
<br>от тези, които, независимо от възрастта, са решили да се научат да
<br>карат ски.
<br>
<br>Най-близкото място за настаняване до ски пистата е хижа "Пършевица",
<br>която разполага с 40 легла, просторна столова и кухня. Цената за
<br>настаняване е 15 лева и хижата е отворена целогодишно за туристите.
<br>
<br>За по-взискателните към нощувките хотели има край пещера "Леденика", а
<br>тези, за които ежедневното пътуване до ски удоволствията не е проблем,
<br>могат да отседнат и в град Враца, който е на 20-ина километра от писта
<br>"Пършевица". Къщи за гости има и в селата, граничещи с Врачанския
<br>балкан - Згориград, Паволче и Челопек.
<br>
<br>Ски зона "Родопи" в област Пловдив
<br>
<br>През зимния сезон 2022/2023 г. в ски зона "Родопи" в Пловдивска област
<br>ще работят ски пистите "Хижа Здравец" - голяма и малка, "Копривките" -
<br>ски училище с плац за начинаещи и пистата на еко хотел "Здравец". Това
<br>каза Димитър Николов председател на ски клуб "Копривките".
<br>
<br>Курортът е на 20-ина минути път с кола от областния град, предлага
<br>писти с различна дължина и денивелация, което ги прави подходящи както
<br>за начинаещи, така и за по-напреднали скиори.
<br>
<br>Плацът за начинаещи скиори на "Копривките" има голяма ширина, а
<br>пистата е с дължина 400 метра. По-напредналите скиори могат да
<br>използват пистите на хижа "Здравец" като голямата е с дължина 1200
<br>метра, а малката - 300 метра.
<br>
<br>Пистата при еко хотела е със средна трудност и дължина 300 метра.
<br>
<br>Пистите разполагат със система за технически сняг, но заради цената на
<br>тока, все още не е ясно дали ще се използва, уточни Николов. По думите
<br>му цените са по-социално насочени, в сравнение с големите курорти. Има
<br>и обособени места за шейни, найлони и други приспособления за
<br>пързаляне.
<br>
<br>За района е характерен еднодневния туризъм. Въпреки това, посетителите
<br>имат възможност да се настанят в къщи под наем, еко хотел "Здравец",
<br>хотел "Копривки", базата на КЦМ, хотел "Форест вю", който ще бъде
<br>открит официално тази година, след като частници закупиха и
<br>преустроиха почивната база на стъкларския завод.
<br>
<br>Община Куклен, на чиято територия се намира курорта, е направила
<br>предсезонна подготовка на пътищата - всички отводнителни канавки са
<br>почистени, предстои аварийно запълване на дупки, разширява се паркинга
<br>за туристите, разказа още Николов.
<br>
<br>Лечение, спа и ски на връх "Бузлуджа"
<br>
<br>Павел баня е целогодишен курорт, който привлича гости с лековитата си
<br>минерална вода. Той е балнеоложка и туристическа дестинация, в която
<br>има множество къщи за гости, както и хотели от висок клас, предлагащи
<br>пълна гама от спа процедури, каза кметът на общината Иса Бесоолу.
<br>
<br>Според него курортът е в готовност за започване на зимния туристически
<br>сезон и не се наблюдава отлив на туристи. Засега цените спрямо
<br>миналата година се запазват, което не се отразява на обслужването,
<br>коментира Бесоолу. По думите му има увеличение на заявената леглова
<br>база спрямо месец октомври 2021 г.
<br>
<br>Павел баня предлага различни възможности за туризъм през зимата.
<br>Наблизо се намират ски пистите на връх "Бузлуджа" и язовир "Копринка",
<br>а целогодишно работят както културните институти, така и заведенията в
<br>града и околностите.
<br>
<br>В Павел баня идват български и чужди туристи, които искат да съчетаят
<br>почивката с лечение. Курортът е профилиран за лечение на заболявания
<br>на опорно-двигателния апарат, болести на периферната нервна система,
<br>следоперативни манипулации, гинекологични заболявания и други.
<br>
<br>Минералната вода е една от най-богатите на флуор в Европа, като в
<br>същото време има слаба радиоактивност, което означава, че не е опасна,
<br>посочи Иса Бесоолу.
<br>
<br>Гледката на паметника на връх "Бузлуджа" създава интересна атмосфера
<br>за ски туризъм. На северната страна на върха се намира ски зона от две
<br>малки писти, а надморската височина е около 1400 метра. Локацията
<br>работи ежедневно при наличие на достатъчно сняг и разполага със
<br>снегоутъпкваща машина, има и ски учители. Около паметника има две хижи
<br>и един хотел, но в региона има различни възможности за настаняване.
<br>
<br>По БТАpippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-11789545099450948572021-12-09T10:08:00.001+02:002021-12-09T10:08:18.856+02:00Избор на ски обувки<div dir="ltr"> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Никoгa нe e къcнo дa зaпoчнeм дa кaрaмe cки. Дoри и дo тoзи мoмeнт дa нe cмe cтъпвaли нa cнeжнaтa пиcтa, мoжeм дa прoмeним тoвa мнoгo лecнo, кaтo прeди дa oргaнизирaмe зимнaтa пoчивкa, трябвa дa cи нaбaвим cкиoрcки eкип в прaвилeн рaзмeр. Тoй включвa рaзлични пo вид кoмпoнeнти, кaтo кaчecтвeни и удoбни cки oбувки, тeрмo чoрaпи, якe, шaпкa и ръкaвици, oчилa, кacкa и др.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Избрoeнитe eлeмeнти ca зaдължитeлнa чacт oт зимнoтo oблeклo, кaтo cъщитe e дoбрe дa бъдaт чиcтo нoви и в пoдхoдящия зa нac нoмeр/рaзмeр. Cъщo тaкa, oбщoтo тeглo нa cкиoрcкитe oбувкитe нe бивa дa e твърдe гoлямo, зaщoтo тoвa щe зaтрудни движeниятa ни и мaнeврeнocттa. Тe трябвa дa притeжaвaт oптимaлнa твърдocт, дa ce рeгулирaт лecнo и дa ca дocтaтъчнo издръжливи и в eкcтрeмни уcлoвия.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">C кaквo ce oтличaвaт cки oбувкитe</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Изпoлзвaт ce зa фикcaция нa cкитe и ce oтличaвaт cъc cтaбилния cи и нaдeждeн дизaйн. Зaдължитeлнo e дa ca кaчecтвeни и в пoдхoдящ рaзмeр, зa дa фикcирaт крaкa в прaвилнaтa пoзиция, кoeтo e вaжнo зa нeгoвoтo прeдпaзвaнe oт нaтъртвaния и дoри cчупвaнe при eвeнтуaлни пaдaния нa cнeгa.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Инвecтициятa в тoзи тaкa вaжeн eлeмeнт oт cкиoрcкo oблeклo e нaпълнo oпрaвдaнa, дoри и aкo тя възлизa нa мaлкo пo-гoлямa cумa пaри. Aкo cтe нaчинaeщи и зa Вac e вaжнo дa нaпрaвитe първитe cи cтъпки в cвeтa нa cнeжнитe cпoртoвe пoдoбaвaщo, нe прaвeтe кoмпрoмиcи cъc cкиoрcкoтo oблeклo, a прocтo гo избeрeтe в прaвилнaтa зa Вac нoмeрaция.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Кaк дa избeрeм пoдхoдящ мoдeл и рaзмeр</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Нaпълнo възмoжнo e дa ce пoчувcтвaтe и дocтa зaтруднeни при избoрa нa oбувки зa cки. Пaзaрът прeдлaгa вcякaкви мoдeли, някoи oт кoитo ca пoдхoдящи и зa прoфecиoнaлнa упoтрeбa. Критeриитe, пo кoитo трябвa дa ceлeктирaтe тoзи кoмпoнeнт oт cкиoрcкoтo oблeклo нe ce cвeждaт caмo дo кoрeктния рaзмeр, нo и дo фaктoри кaтo:</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Вид пoдплaтa и нивo нa тeрмoизoлaция;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Cцeплeниe, издръжливocт и здрaвинa;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Кoнcтрукция нa пoдмeткaтa;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Cиcтeмa зa нaклaнянe;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Рeгулируeм cпoйлeр;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Вoдoуcтoйчивocт;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Възмoжнocт зa лecнo рeгулирaнe, oбувaнe и cъбувaнe;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Външeн дизaйн;</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Прoизвoдитeл и др.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Имa дocтa зa кaквo дa пoмиcлитe, кoгaтo ce зaeмaтe c пoдгoтoвкaтa зa прeдcтoящия cки ceзoн. Зaпoчнeтe oт ceлeкциятa нa cкиoрcки oбувки в прaвилния рaзмeр, кoитo зaдължитeлнo трябвa дa бъдaт кoмбинирaни и c тoплo якe, кoeтo дa Ви пaзи oт влaгaтa и cтудa.</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Кaквo трябвa дa знaят нaчинaeщитe cкиoри</p> <p class="MsoNormal" style="margin:0cm 0cm 10pt;line-height:115%;font-size:11pt;font-family:"Calibri","sans-serif"">Ocвeн дa ce зaпoзнaeтe c тoвa кoи cкиoрcки oбувки ca нaиcтинa кaчecтвeни, трябвa oщe и дa cтe нaяcнo c вoдeщитe прoизвoдитeли в oблacттa нa зимнитe cтoки, бaзoвoтo oбoрудвaнe зa нaчинaeщи cкиoри и ocнoвнитe тeхники, кoитo вceки eнтуcиacт cкиoр трябвa дa влaдee.</p> </div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-38571024445253270972021-11-22T08:00:00.001+02:002021-11-22T08:00:37.591+02:00Цените на сезонните ски карти тръгнаха нагоре<div dir="ltr"> <p>Цените на сезонните ски карти за водещите зимни курорти в България вече поскъпват. Очакванията това да стане заради повишаващите се цени на електроенергията се потвърждават.</p><br><p>Пампорово обяви промоционални предложения, валидни при купуване до 10 декември. Според тях лифт-ĸapтaта зa възpacтeн за целия сезон е 1480 лева, a сезонната карта само за делничните дни е 1036 лева. За младежите от 12 до 18 години и за хората на възраст над 65 години сезонната карта е 1184 лева, а за децата до осем години е 888 лева.</p><br><p>Очаква се следващата седмица да бъдат представени цените на дневните карти.</p><br> <div class="gmail-banner-box" id="gmail-ad_lb_btf"> <div class="gmail-banner"> </div> </div> <p>Банско обяви, че сезонът започва на 18 декември, но при "подходящи метеорологични условия, някои писти в ски зоната ще бъдат обработени и отворени и преди официалното откриване на ски сезона".</p><br><p>От курорта посочват, че цената на сезонната карта се запазва 1300 лева за притежателите на картата за лоялност, ако бъде купена между 22 ноември и 18 декември.</p><br><p>До откриването на сезона намалената сезонна карта за останалите е 1450 лева. За студенти, ученици и пенсионери до 75 г. цената е 1350 лева, за децата от 7 до 12 г. (вкл.) е 750 лева, а за децата до 7 г. и за възрастните над 75 г. е 95 лева.</p><br><p>Във фейсбук страницата си от Банско отговарят, че цени, които ще са в сила след 18 декември, "обикновено се публикуват на по-късен етап, когато има по-ясна прогноза за цените на енергоносителите".</p><br><p>До момента от Боровец не са обявили цените за сезона.</p> <a href="https://www.dnevnik.bg/sport/2021/11/18/4282263_cenite_na_sezonnite_ski_karti_trugnaha_nagore/">https://www.dnevnik.bg/sport/2021/11/18/4282263_cenite_na_sezonnite_ski_karti_trugnaha_nagore/</a></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0tag:blogger.com,1999:blog-7654660405977665238.post-64949905517857980252021-09-27T08:00:00.001+03:002021-09-27T08:01:57.398+03:00Weekly Update: New diabetes clinical trial (13 items)<div dir="ltr"><div class="gmail_quote"><div class="m_8492796627014220510body"><table cellpadding="0" cellspacing="0" border="0" style="padding:0px;margin:0px;text-decoration:none;font-family:'Helvetica Neue','Helvetica','Arial','sans-serif';font-size:18px;line-height:1.4;color:#000000!important" width="100%"><tbody><tr><td align="left" valign="top"><table border="0" cellspacing="0" cellpadding="0" class="m_8492796627014220510mobile-shell"><tbody><tr><td style="border-bottom:3px solid #f5f5f5;padding:0px 2px 90px"><table class="m_8492796627014220510content" cellpadding="0" cellspacing="0" border="0" width="600"><tbody><tr><td><table style="border-collapse:collapse;width:100%;max-width:100%" cellpadding="0" cellspacing="0"><tbody><tr><td><a style="display:block;text-decoration:none"><table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"><tbody><tr><td><h2 style="margin:0"><font style="color:#055696!important">New diabetes clinical trial: Breaking up Sedentary Time to Improve Glucose Control in a Population at Risk for Developing Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 13, 2021 at 07:00PM<br> <b>Conditions</b>: Pre-diabetes; Overweight and Obesity<br> <b>Interventions</b>: Behavioral: BREAK; Behavioral: ONE<br> <b>Sponsor</b>: University of Colorado, Denver<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05041491?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05041491?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 13, 2021 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Effect of Dapagliflozin vs Sitagliptin on Liver Fat Accumulation and Body Composition in Patients With Diabetes Mellitus and Liver Transplantation </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 13, 2021 at 07:00PM<br> <b>Conditions</b>: Diabetes Mellitus; Liver Transplant; Complications<br> <b>Interventions</b>: Drug: Dapagliflozin 10Mg Tab; Drug: Sitagliptin 100mg<br> <b>Sponsor</b>: Medanta, The Medicity, India<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05042505?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05042505?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 13, 2021 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Learning Algorithm for MDI Individuals With Type 1 Diabetes to Adjust Recommendations for High Fat Meals and Exercise Management </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 13, 2021 at 07:00PM<br> <b>Condition</b>: Type 1 Diabetes<br> <b>Intervention</b>: Device: Sensor augmented MDI therapy plus mobile application<br> <b>Sponsor</b>: McGill University<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05041621?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05041621?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 13, 2021 at 05:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: HIT on Hypoglycaemic Risk in T1D </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 14, 2021 at 07:00PM<br> <b>Condition</b>: Type1diabetes<br> <b>Interventions</b>: Behavioral: moderate intensity continous training; Behavioral: high intensity interval training<br> <b>Sponsors</b>: Liverpool John Moores University; Society for Endocrinology; Royal Liverpool University Hospital; University of Birmingham; University of Exeter<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05044442?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05044442?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 14, 2021 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Retrospective Study to Evaluate the Safety of Duvie in Korean Patients With Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 14, 2021 at 07:00PM<br> <b>Condition</b>: Type2 Diabetes<br> <b>Intervention</b>: Drug: Duvie(Lobeglitazone) tab 0.5mg<br> <b>Sponsor</b>: Chong Kun Dang Pharmaceutical<br> <b>Completed</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05043467?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05043467?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 14, 2021 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Postprandial VLDL-triglycerid Metabolism in Type 2 Diabetes Patients With and Without NAFLD </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 14, 2021 at 07:00PM<br> <b>Conditions</b>: NAFLD; Type 2 Diabetes<br> <b>Intervention</b>: Dietary Supplement: High-fat mixed-meal tolerance test (HF-MMT)<br> <b>Sponsors</b>: University of Aarhus; Danish Diabetes Academy<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05044130?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05044130?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 14, 2021 at 07:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Research Study Looking Into Blood Levels of Semaglutide and NNC0480-0389 When Given in the Same Injection or in Two Separate Injections in Healthy People </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 16, 2021 at 07:00PM<br> <b>Condition</b>: Diabetes Mellitus, Type 2<br> <b>Interventions</b>: Drug: Co-formulation NNC0480 0389+Semaglutide A 10/1 mg/mL; Drug: semaglutide 1.34 mg/mL (placebo); Drug: Semaglutide 1.34 mg/mL; Drug: NNC0480-0389 A 10 mg/mL<br> <b>Sponsor</b>: Novo Nordisk A/S<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05046873?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05046873?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 16, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Personalized Dietary Management in Type 2 Diabetes </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 16, 2021 at 07:00PM<br> <b>Condition</b>: T2D<br> <b>Interventions</b>: Behavioral: Social Cognitive Theory (SCT)-Based Behavioral Counseling; Behavioral: Isocaloric Mediterranean Diet Advice; Behavioral: Personalized Guidance to Minimize Postprandial Glycemic Response (PPGR)<br> <b>Sponsors</b>: NYU Langone Health; National Institute of Nursing Research (NINR)<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05046886?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05046886?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 16, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: AMIloride for the Treatment of Nephrogenic Diabetes Insipidus for Patients With Bipolar Disorder Treated With Lithium </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 15, 2021 at 07:00PM<br> <b>Condition</b>: Bipolar Disorder<br> <b>Interventions</b>: Drug: Anhydrous Amiloride Hydrochloride; Drug: Placebo<br> <b>Sponsor</b>: Assistance Publique - Hôpitaux de Paris<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05044611?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05044611?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 16, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Metabolic Phenotyping and Follow-Up of Patients With and Without Diabetes After New Onset of STEMI </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 16, 2021 at 07:00PM<br> <b>Conditions</b>: ST Elevation Myocardial Infarction; Diabetes Mellitus<br> <b>Intervention</b>: <br> <b>Sponsor</b>: German Diabetes Center<br> <b>Recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05046483?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05046483?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 16, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: To Improve the Ability of Early Screening and Diagnosis in Patients With Diabetic Nephropathy </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 17, 2021 at 07:00PM<br> <b>Condition</b>: Diabetic Kidney Disease<br> <b>Intervention</b>: <br> <b>Sponsor</b>: Yiming Mu<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05047471?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05047471?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 17, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: A Study of LY3502970 in Participants With Type 2 Diabetes Mellitus </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 17, 2021 at 07:00PM<br> <b>Condition</b>: Type 2 Diabetes<br> <b>Interventions</b>: Drug: LY3502970; Drug: Dulaglutide; Drug: Placebo<br> <b>Sponsor</b>: Eli Lilly and Company<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05048719?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05048719?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 17, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> <tr> <td> <hr style="height:3px;background-color:#f5f5f5;border:none;margin:24px 0 36px"> <a style="display:block;text-decoration:none"> <table cellpadding="0" style="margin:24px 0;width:100%;border-radius:10px"> <tbody><tr> <td> <h2 style="margin:0"> <font style="color:#055696!important"> New diabetes clinical trial: Electronic Frailty Index (eFI)Cacious-Diabetes Care </font> </h2> </td> <td width="30" align="right"> </td> </tr> </tbody></table> </a> <div style="max-width:100%;padding:0;margin:0"> Published on: September 17, 2021 at 07:00PM<br> <b>Conditions</b>: Diabetes; Type2 Diabetes<br> <b>Intervention</b>: Behavioral: Pharmacist-Led Optimization Intervention<br> <b>Sponsor</b>: Wake Forest University Health Sciences<br> <b>Not yet recruiting</b><br> <a href="https://clinicaltrials.gov/ct2/show/NCT05047237?term=diabetes&sfpd_d=14" target="_blank">https://clinicaltrials.gov/ct2/show/NCT05047237?term=diabetes&sfpd_d=14</a> <a style="color:#000000!important;text-decoration:underline">September 17, 2021 at 06:22PM</a> <br> <p style="max-width:100%;padding:0;margin:0;margin-bottom:12px"> via ClinicalTrials.gov <a style="color:#000000!important;text-decoration:underline"></a> </p> </div> </td> </tr> </tbody></table> <br></td></tr></tbody></table></td></tr><tr><td><br></td></tr></tbody></table></td></tr></tbody></table></div> </div></div> pippohttp://www.blogger.com/profile/11311866156719132094noreply@blogger.com0