<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>CPR-Zero</title>
		<description>Check Point Research Vulnerability Repository</description>
		<link>https://cpr-zero.checkpoint.com</link>
		<atom:link href="https://cpr-zero.checkpoint.com/feed.xml" rel="self" type="application/rss+xml" />
		
		
			<item>
				<title>CVE-2025-33053</title>
				<product>Internet Shortcut Files (.URL)</product>
				<version>All available versions</version>
				<bug_type>External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.</bug_type>
				<cpr-id>2200</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2200/</guid>
			</item>
		
			<item>
				<title>CVE-2024-43504</title>
				<product>Microsoft Excel</product>
				<version>All available versions</version>
				<bug_type>Use after Free</bug_type>
				<cpr-id>2199</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2199/</guid>
			</item>
		
			<item>
				<title>CVE-2024-38112</title>
				<product>Microsoft Windows</product>
				<version>All supported Windows versions</version>
				<bug_type>Logic flaw</bug_type>
				<cpr-id>2198</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2198/</guid>
			</item>
		
			<item>
				<title>CVE-2024-21413</title>
				<product>Microsoft Outlook</product>
				<version>All supported versions</version>
				<bug_type>Logic flaw</bug_type>
				<cpr-id>2197</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2197/</guid>
			</item>
		
			<item>
				<title>CVE-2023-28302</title>
				<product>Microsoft Message Queuing</product>
				<version>All available Windows versions (clients and servers)</version>
				<bug_type>Out Of Bound Read (kernel level denial of service)</bug_type>
				<cpr-id>2196</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2196/</guid>
			</item>
		
			<item>
				<title>CVE-2023-21769</title>
				<product>Microsoft Message Queuing</product>
				<version>All available Windows versions (clients and servers)</version>
				<bug_type>Out Of Bound Read (application level denial of service)</bug_type>
				<cpr-id>2195</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2195/</guid>
			</item>
		
			<item>
				<title>CVE-2023-21554</title>
				<product>Microsoft Message Queuing</product>
				<version>All available Windows versions (clients and servers)</version>
				<bug_type>Out Of Bound Write</bug_type>
				<cpr-id>2194</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2194/</guid>
			</item>
		
			<item>
				<title>CVE-2022-23748</title>
				<product>Audinate Dante Application Library for Windows</product>
				<version>&lt;= 1.2.0</version>
				<bug_type>DLL Side Loading</bug_type>
				<cpr-id>2193</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2193/</guid>
			</item>
		
			<item>
				<title>CVE-2020-14125</title>
				<product>Xiaomi Trusted Execution Environment</product>
				<version>MIUI before 2022.01.26</version>
				<bug_type>Classic Buffer Overflow</bug_type>
				<cpr-id>2192</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2192/</guid>
			</item>
		
			<item>
				<title>CVE-2022-23747</title>
				<product>Sony OMX audio decoder</product>
				<version>Sony Xperia series 1, 5 and Pro</version>
				<bug_type>Classic Buffer Overflow</bug_type>
				<cpr-id>2191</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2191/</guid>
			</item>
		
			<item>
				<title>CVE-2022-20210</title>
				<product>Unisoc radio modem</product>
				<version>4G and 5G Unisoc chipsets</version>
				<bug_type>Integer Underflow</bug_type>
				<cpr-id>2190</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2190/</guid>
			</item>
		
			<item>
				<title>CVE-2021-30351</title>
				<product>Qualcomm OMX audio decoder</product>
				<version>Qualcomm chipsets APQ8009, APQ8009W, APQ8017, AQT1000, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, IPQ4018, IPQ4028, IPQ4029, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078A, IPQ8173, IPQ8174, MDM9150, MDM9206, MDM9250, MDM9607, MDM9628, MSM8909W, MSM8996AU, QCA4024, QCA6174A, QCA6390, QCA6391, QCA6426, QCA6428, QCA6436, QCA6438, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595AU, QCA6696, QCA7500, QCA8075, QCA8081, QCA8337, QCA9367, QCA9377, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM6490, QCN5022, QCN5024, QCN5052, QCN5064, QCN5122, QCN5124, QCN5152, QCN5164, QCN5550, QCN9000, QCN9074, QCS2290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6490, QCX315, QET4101, QRB5165, QRB5165N, QSM8250, QSW8573, Qualcomm215, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SD 675, SD205, SD210, SD429, SD460, SD480, SD660, SD662, SD665, SD675, SD678, SD690 5G, SD720G, SD730, SD750G, SD765, SD765G, SD768G, SD778G, SD780G, SD845, SD855, SD865 5G, SD870, SD888, SD888 5G, SDA429W, SDM429W, SDW2500, SDX12, SDX20, SDX24, SDX55, SDX55M, SDX65, SDXR1, SDXR2 5G, SM6225, SM6250, SM6250P, SM6375, SM7250P, SM7315, SM7325P, SM8450, SM8450P, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6740, WCN6750, WCN6850, WCN6851, WCN6855, WCN6856, WSA8810, WSA8815, WSA8830, WSA8835</version>
				<bug_type>Classic Buffer Overflow</bug_type>
				<cpr-id>2189</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2189/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0675</title>
				<product>MediaTek OMX audio decoder</product>
				<version>MediaTek chipsets MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797</version>
				<bug_type>Improper restriction of operations within the bounds of a memory buffer</bug_type>
				<cpr-id>2188</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2188/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0674</title>
				<product>MediaTek OMX audio decoder</product>
				<version>MediaTek chipsets MT6570, MT6580, MT6735, MT6737, MT6739, MT6750, MT6750S, MT6753, MT6755, MT6755S, MT6757, MT6757C, MT6757CD, MT6757CH, MT6758, MT6761, MT6763, MT6765, MT6768,  MT6771, MT6779, MT6781, MT6785, MT6797, MT6799, MT6833, MT6853, MT6853T, MT6873, MT6877, MT6883, MT6885, MT6889, MT6893, MT8163, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8176, MT8183, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797</version>
				<bug_type>Improper input validation</bug_type>
				<cpr-id>2187</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2187/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0673</title>
				<product>MediaTek Audio Aurisys HAL</product>
				<version>MediaTek chipsets MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8183, MT8185, MT8195, MT8321, MT8385, MT8765, MT8766, MT8768, MT8771, MT8786, MT8788, MT8789, MT8791, MT8797</version>
				<bug_type>Improper Input Validation</bug_type>
				<cpr-id>2186</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2186/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0663</title>
				<product>Mediatek Audio DSP</product>
				<version>MediaTek chipsets MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8797</version>
				<bug_type>Heap-based Buffer Overflow</bug_type>
				<cpr-id>2185</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2185/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0662</title>
				<product>Mediatek Audio DSP</product>
				<version>MediaTek chipsets MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8797</version>
				<bug_type>Heap-based Buffer Overflow</bug_type>
				<cpr-id>2184</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2184/</guid>
			</item>
		
			<item>
				<title>CVE-2021-0661</title>
				<product>Mediatek Audio DSP</product>
				<version>MediaTek chipsets MT6779, MT6781, MT6785, MT6853, MT6853T, MT6873, MT6875, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8797</version>
				<bug_type>Heap-based Buffer Overflow</bug_type>
				<cpr-id>2183</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2183/</guid>
			</item>
		
			<item>
				<title>CVE-2021-30354</title>
				<product>Amazon Kindle e-reader</product>
				<version>&lt;= 5.13.4</version>
				<bug_type>Improper Privilege Management</bug_type>
				<cpr-id>2181</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2181/</guid>
			</item>
		
			<item>
				<title>CVE-2021-30354</title>
				<product>Amazon Kindle e-reader</product>
				<version>&lt;= 5.13.4</version>
				<bug_type>Integer Overflow leading to Heap-based Buffer Overflow</bug_type>
				<cpr-id>2180</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2180/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11292</title>
				<product>Qualcomm Data Modem</product>
				<version>Qualcomm chipsets - SA2150P, SM8150+SDX50M, SM8150, SM6150, APQ8098, SD460, SD622, MDM9205, MSM8909, MSM8909w, MSM8917, MSM8920, MDM9635M, MDM9640, MDM9650, MSM8905, MSM 8937, MSM8940, MSM8953, MSM8976, QCM6125, QCS605, QCS610, QM215, SD665,QCM2150, QCM2290, QCM4290, SD720G, SA415M, SC7180, SC8180X, SDM636, SDM660, SDM670, SDM710, SDM439, SDM450, SDM630, SDM632, SDM845, SDM850, SDX20, SDX24, MSM8996AU, MSM8998, SDM429, SDM429W, APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, SM7150, SXR1130, MSM8996, SDA845</version>
				<bug_type>Buffer Overflow</bug_type>
				<cpr-id>2179</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2179/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11209</title>
				<product>Qualcomm DSP</product>
				<version>Qualcomm chipsets - SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439</version>
				<bug_type>Improper Authorization</bug_type>
				<cpr-id>2178</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2178/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11208</title>
				<product>Qualcomm DSP</product>
				<version>Qualcomm chipsets - SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439</version>
				<bug_type>Integer Underflow</bug_type>
				<cpr-id>2177</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2177/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11207</title>
				<product>Qualcomm DSP (ComputerVision)</product>
				<version>Qualcomm chipsets -  APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P</version>
				<bug_type>Buffer Overflow</bug_type>
				<cpr-id>2176</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2176/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11206</title>
				<product>Qualcomm DSP (ComputerVision)</product>
				<version>Qualcomm chipsets - APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P</version>
				<bug_type>Untrusted Pointer Dereference</bug_type>
				<cpr-id>2175</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2175/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11202</title>
				<product>Qualcomm DSP (Video)</product>
				<version>Qualcomm chipsets - QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P</version>
				<bug_type>Improper Input Validation</bug_type>
				<cpr-id>2174</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2174/</guid>
			</item>
		
			<item>
				<title>CVE-2020-11201</title>
				<product>Qualcomm DSP (Video)</product>
				<version>Qualcomm chipsets - QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P</version>
				<bug_type>Untrusted Pointer Dereference</bug_type>
				<cpr-id>2173</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2173/</guid>
			</item>
		
			<item>
				<title>CVE-2019-10574</title>
				<product>Qualcomm HLOS (Secure Key Storage Trustlet)</product>
				<version>Qualcomm chipsets APQ8009, APQ8016, APQ8017, APQ8053, APQ8076, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, QCM2150, QCS605, QM215, Rennell, SC7180, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SXR1130, SXR2130</version>
				<bug_type>Buffer Over-Read</bug_type>
				<cpr-id>2172</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2172/</guid>
			</item>
		
			<item>
				<title>CPRID-2171</title>
				<product>Samsung Android devices (Secure Storage Trustlet)</product>
				<version>O(8.x), P(9.0) devices with Qualcomm (SDM660, MSM8998, SDM845, SM8150) chipsets</version>
				<bug_type>Integer Underflow</bug_type>
				<cpr-id>2171</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2171/</guid>
			</item>
		
			<item>
				<title>CPRID-2170</title>
				<product>LG Android devices (Discretix Digital Content Protection Trustlet)</product>
				<version>Android 7.0, 7.1, 7.2, 8.0, 8.1</version>
				<bug_type>Buffer Over-Read</bug_type>
				<cpr-id>2170</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2170/</guid>
			</item>
		
			<item>
				<title>CPRID-2169</title>
				<product>LG Android devices</product>
				<version>Android 7.0, 7.1, 7.2, 8.0, 8.1, 9.0</version>
				<bug_type>Potential Phishing Flow in OMACP</bug_type>
				<cpr-id>2169</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2169/</guid>
			</item>
		
			<item>
				<title>CPRID-2168</title>
				<product>Samsung Android devices</product>
				<version>All devices with all OS versions &lt; May 2019</version>
				<bug_type>Potential Phishing Flow in OMACP</bug_type>
				<cpr-id>2168</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2168/</guid>
			</item>
		
			<item>
				<title>CPRID-2167</title>
				<product>Xiaomi Android devices</product>
				<version>All Xiaomi GuardProvider versions</version>
				<bug_type>Man-In-The-Middle attack leads to RCE</bug_type>
				<cpr-id>2167</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2167/</guid>
			</item>
		
			<item>
				<title>CVE-2021-31179</title>
				<product>Outlook, Office</product>
				<version>&lt;= 16.0.13628.20274</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2166</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2166/</guid>
			</item>
		
			<item>
				<title>CVE-2021-31178</title>
				<product>Outlook, Office</product>
				<version>&lt;= 16.0.13628.20274</version>
				<bug_type>Stack Based Out of Bound Read</bug_type>
				<cpr-id>2165</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2165/</guid>
			</item>
		
			<item>
				<title>CVE-2021-31939</title>
				<product>Outlook, Office</product>
				<version>&lt;= 16.0.13628.20274</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2164</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2164/</guid>
			</item>
		
			<item>
				<title>CVE-2021-31174</title>
				<product>Outlook, Office</product>
				<version>&lt;= 16.0.13628.20274</version>
				<bug_type>Stack Based Out of Bound Read</bug_type>
				<cpr-id>2163</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2163/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1895</title>
				<product>Instagram</product>
				<version>prior to 128.0.0.26.128</version>
				<bug_type>Integer Overflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2162</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2162/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6019</title>
				<product>Game Networking Sockets</product>
				<version>&lt; v1.2.0</version>
				<bug_type>Integer-Overflow leading to an Out-of-Bounds Read</bug_type>
				<cpr-id>2161</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2161/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6018</title>
				<product>Game Networking Sockets</product>
				<version>&lt; v1.2.0</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2160</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2160/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6017</title>
				<product>Game Networking Sockets</product>
				<version>&lt; v1.2.0</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2159</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2159/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6016</title>
				<product>Game Networking Sockets</product>
				<version>&lt; v1.2.0</version>
				<bug_type>Free of memory not on the heap</bug_type>
				<cpr-id>2158</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2158/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1510</title>
				<product>Windows 10 x64 1909 (OS Build 18363.719)</product>
				<version>10.0.18362.719 (WinBuild.160101.0800)</version>
				<bug_type>Out Of Bound Read</bug_type>
				<cpr-id>2157</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2157/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1350</title>
				<product>Windows DNS Server</product>
				<version>10.0.17763.1075 (WinBuild.160101.0800)</version>
				<bug_type>Integer Overflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2156</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2156/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1310</title>
				<product>Windows 8.1 x64 6.3 (Build 9600)</product>
				<version>6.3.9600.19650 (winblue_ltsb_escrow.200211-0156)</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2155</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2155/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1247</title>
				<product>Windows 10 x64 1909 (OS Build 18363.719)</product>
				<version>10.0.18362.719 (WinBuild.160101.0800)</version>
				<bug_type>Out Of Bound Read and Write</bug_type>
				<cpr-id>2154</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2154/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1054</title>
				<product>Windows 10 x64 1909</product>
				<version>10.0.18362.657 (WinBuild.160101.0800)</version>
				<bug_type>Out Of Bounds Write</bug_type>
				<cpr-id>2153</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2153/</guid>
			</item>
		
			<item>
				<title>CVE-2020-1143</title>
				<product>Windows 10 x64 1909</product>
				<version>10.0.18362.657 (WinBuild.160101.0800)</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2152</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2152/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6010</title>
				<product>LearnPress</product>
				<version>&lt;= 3.2.6.7</version>
				<bug_type>SQL Injection</bug_type>
				<cpr-id>2150</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2150/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6009</title>
				<product>LearnDash</product>
				<version>&lt; 3.1.6</version>
				<bug_type>Unauthenticated Second-Order SQL Injection</bug_type>
				<cpr-id>2149</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2149/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6008</title>
				<product>LifterLMS</product>
				<version>&lt; 3.37.15</version>
				<bug_type>Arbitrary File Write</bug_type>
				<cpr-id>2148</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2148/</guid>
			</item>
		
			<item>
				<title>CVE-2020-0791</title>
				<product>Windows 10 x64 1909</product>
				<version>10.0.18362.657 (WinBuild.160101.0800)</version>
				<bug_type>Out Of Bounds Read and Write</bug_type>
				<cpr-id>2147</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2147/</guid>
			</item>
		
			<item>
				<title>CVE-2020-9498</title>
				<product>Apache Guacamole</product>
				<version>&lt; 1.2.0</version>
				<bug_type>Use-After-Free (Dangling Pointer)</bug_type>
				<cpr-id>2144</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2144/</guid>
			</item>
		
			<item>
				<title>CVE-2020-9497 (v3)</title>
				<product>Apache Guacamole</product>
				<version>&lt; 1.2.0</version>
				<bug_type>Out-of-Bounds Read</bug_type>
				<cpr-id>2143</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2143/</guid>
			</item>
		
			<item>
				<title>CVE-2020-9497 (v2)</title>
				<product>Apache Guacamole</product>
				<version>&lt; 1.2.0</version>
				<bug_type>Out-of-Bounds Read</bug_type>
				<cpr-id>2142</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2142/</guid>
			</item>
		
			<item>
				<title>CVE-2020-9497 (v1)</title>
				<product>Apache Guacamole</product>
				<version>&lt; 1.2.0</version>
				<bug_type>Out-of-Bounds Read</bug_type>
				<cpr-id>2141</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2141/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1234</title>
				<product>Azure Stack</product>
				<version>&lt; Azure Stack 1910</version>
				<bug_type>Azure Stack Spoofing Vulnerability</bug_type>
				<cpr-id>2140</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2140/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1372</title>
				<product>Azure App Service</product>
				<version>&lt; 84.0.2</version>
				<bug_type>Heap Based Buffer-Overflow in DWASInterop.dll</bug_type>
				<cpr-id>2139</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2139/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1286</title>
				<product>Windows 10 x64 1903</product>
				<version>10.0.18362.113 (WinBuild.160101.0800)</version>
				<bug_type>Null Pointer Dereference</bug_type>
				<cpr-id>2138</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2138/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1256</title>
				<product>Windows 10 x64 1903</product>
				<version>10.0.18362.113 (WinBuild.160101.0800)</version>
				<bug_type>Null Pointer Dereference</bug_type>
				<cpr-id>2137</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2137/</guid>
			</item>
		
			<item>
				<title>CVE-2020-0655</title>
				<product>Microsoft Windows</product>
				<version>All versions</version>
				<bug_type>Path Traversal</bug_type>
				<cpr-id>2136</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2136/</guid>
			</item>
		
			<item>
				<title>CVE-2019-8460</title>
				<product>OpenBSD</product>
				<version>&lt;= 6.5</version>
				<bug_type>Denial of Service</bug_type>
				<cpr-id>2135</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2135/</guid>
			</item>
		
			<item>
				<title>CVE-2020-6007</title>
				<product>Philips Hue Bridge 2.X</product>
				<version>&lt;= 1935144020</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2134</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2134/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1164</title>
				<product>Windows 10 x64 1903</product>
				<version>10.0.18362.113 (WinBuild.160101.0800)</version>
				<bug_type>Out-Of-Bounds Read\Write</bug_type>
				<cpr-id>2133</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2133/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1159</title>
				<product>Windows 10 x64 1903</product>
				<version>10.0.18362.113 (WinBuild.160101.0800)</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2132</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2132/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1096</title>
				<product>Windows 10 x64 1809</product>
				<version>10.0.17763.437 (WinBuild.160101.0800)</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2131</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2131/</guid>
			</item>
		
			<item>
				<title>CVE-2019-5995</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Design Error</bug_type>
				<cpr-id>2130</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2130/</guid>
			</item>
		
			<item>
				<title>CVE-2019-1014</title>
				<product>Windows 10 x64 1809</product>
				<version>10.0.17763.348 (WinBuild.160101.0800)</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2129</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2129/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2705</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2128</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2128/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2613</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Out-of-Bounds Memory Access</bug_type>
				<cpr-id>2127</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2127/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2612</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Out-of-Bounds Memory Access</bug_type>
				<cpr-id>2126</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2126/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2611</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Out-of-Bounds Memory Access</bug_type>
				<cpr-id>2125</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2125/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2610</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Out-of-Bounds Memory Access</bug_type>
				<cpr-id>2124</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2124/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2609</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Out-of-Bounds Memory Access</bug_type>
				<cpr-id>2123</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2123/</guid>
			</item>
		
			<item>
				<title>CVE-2019-2608</title>
				<product>Oracle OutsideIn</product>
				<version>8.5.3, 8.5.4</version>
				<bug_type>Access Violation</bug_type>
				<cpr-id>2122</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2122/</guid>
			</item>
		
			<item>
				<title>CVE-2019-8602</title>
				<product>Apple iOS \ macOS</product>
				<version>&lt; iOS 12.3 \ &lt; Mojave 10.14.5</version>
				<bug_type>Untrusted pointer dereference leads to Code Execution</bug_type>
				<cpr-id>2121</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2121/</guid>
			</item>
		
			<item>
				<title>CVE-2019-8600</title>
				<product>Apple iOS \ macOS</product>
				<version>&lt; iOS 12.3 \ &lt; Mojave 10.14.5</version>
				<bug_type>Heap-Based Buffer Oveflow leading to RCE</bug_type>
				<cpr-id>2120</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2120/</guid>
			</item>
		
			<item>
				<title>CVE-2019-8577</title>
				<product>Apple iOS \ macOS</product>
				<version>&lt; iOS 12.3 \ &lt; Mojave 10.14.5</version>
				<bug_type>Persistencey and Privilege Escalation</bug_type>
				<cpr-id>2119</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2119/</guid>
			</item>
		
			<item>
				<title>CVE-2019-8598</title>
				<product>Apple iOS \ macOS</product>
				<version>&lt; iOS 12.3 \ &lt; Mojave 10.14.5</version>
				<bug_type>Info Leak</bug_type>
				<cpr-id>2118</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2118/</guid>
			</item>
		
			<item>
				<title>CVE-2019-6001</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2117</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2117/</guid>
			</item>
		
			<item>
				<title>CVE-2019-6000</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2116</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2116/</guid>
			</item>
		
			<item>
				<title>CVE-2019-5999</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2115</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2115/</guid>
			</item>
		
			<item>
				<title>CVE-2019-5998</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2114</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2114/</guid>
			</item>
		
			<item>
				<title>CVE-2019-5994</title>
				<product>Canon DSLR Cameras</product>
				<version>&lt; 1.0.3</version>
				<bug_type>Buffer Overflow over the Globals</bug_type>
				<cpr-id>2113</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2113/</guid>
			</item>
		
			<item>
				<title>CPRID-2112</title>
				<product>MuPDF</product>
				<version>&lt; commit ee80ef5284a38c6de592d83f437c48d1efd89e2d</version>
				<bug_type>Null Dereference</bug_type>
				<cpr-id>2112</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2112/</guid>
			</item>
		
			<item>
				<title>CVE-2019-7081</title>
				<product>Acrobat Reader DC</product>
				<version>&lt; 2019.010.20069</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2111</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2111/</guid>
			</item>
		
			<item>
				<title>CVE-2019-7080</title>
				<product>Acrobat Reader DC</product>
				<version>&lt; 2019.010.20069</version>
				<bug_type>Double Free</bug_type>
				<cpr-id>2110</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2110/</guid>
			</item>
		
			<item>
				<title>CPRID-2109</title>
				<product>MuPDF</product>
				<version>&lt; commit 33d28276c666f1e58a0e36299aabb8247779a851</version>
				<bug_type>Floating Point exception (div by zero)</bug_type>
				<cpr-id>2109</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2109/</guid>
			</item>
		
			<item>
				<title>CPRID-2108</title>
				<product>MuPDF</product>
				<version>&lt; commit 8023beb7d79cbe2e6a37b8ac3be31493b5927cec</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2108</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2108/</guid>
			</item>
		
			<item>
				<title>CPRID-2104</title>
				<product>MuPDF</product>
				<version>&lt; commit b09f19fe7f2771de93d84c96e26a25361dfe0e31</version>
				<bug_type>Arbitrary Read/Write</bug_type>
				<cpr-id>2104</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2104/</guid>
			</item>
		
			<item>
				<title>CPRID-2102</title>
				<product>MuPDF</product>
				<version>&lt; commit 8023beb7d79cbe2e6a37b8ac3be31493b5927cec</version>
				<bug_type>Stack-Based Buffer Overflow</bug_type>
				<cpr-id>2102</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2102/</guid>
			</item>
		
			<item>
				<title>CVE-2018-0802</title>
				<product>Microsoft Office Equation Editor (2007 to 2016)</product>
				<version>17081400</version>
				<bug_type>Stack based buffer overflow</bug_type>
				<cpr-id>2100</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2100/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8464</title>
				<product>Microsoft Edge (Windows.Data.Pdf.dll)</product>
				<version>10.0.17134.48 (WinBuild.160101.0800)</version>
				<bug_type>Out-Of-Bounds read</bug_type>
				<cpr-id>2098</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2098/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15956</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2097</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2097/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15955</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bound Write</bug_type>
				<cpr-id>2096</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2096/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15954</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2095</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2095/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15953</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2094</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2094/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15952</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2093</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2093/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15938</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2092</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2092/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15937</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2091</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2091/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15936</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2090</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2090/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15935</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2089</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2089/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15934</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2088</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2088/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15933</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2087</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2087/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15932</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2086</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2086/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15931</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2085</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2085/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15930</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2084</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2084/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15929</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2083</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2083/</guid>
			</item>
		
			<item>
				<title>CVE-2018-15927</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2082</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2082/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12875</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>stack based overflow</bug_type>
				<cpr-id>2081</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2081/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12874</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2080</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2080/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12873</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2079</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2079/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12872</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2078</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2078/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12871</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2077</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2077/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12870</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2076</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2076/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12869</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2075</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2075/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12867</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2074</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2074/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12866</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2073</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2073/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12865</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2072</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2072/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12864</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2071</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2071/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12863</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2070</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2070/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12862</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2069</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2069/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12861</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2068</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2068/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12860</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2067</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2067/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12859</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2066</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2066/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12857</title>
				<product>Acrobat DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2065</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2065/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12850</title>
				<product>Acrobat DC</product>
				<version>2018.011.20058</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2064</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2064/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12849</title>
				<product>Acrobat DC</product>
				<version>2018.011.20058</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2063</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2063/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12848</title>
				<product>Acrobat DC</product>
				<version>2018.011.20058</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2062</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2062/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12840</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20058</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2061</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2061/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12839</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20063</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2060</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2060/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12768</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2059</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2059/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12767</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2058</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2058/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12766</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2057</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2057/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12765</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2056</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2056/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12764</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out of bound read</bug_type>
				<cpr-id>2055</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2055/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12755</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2054</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2054/</guid>
			</item>
		
			<item>
				<title>CVE-2018-12754</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2053</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2053/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5070</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2052</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2052/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5069</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2051</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2051/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5068</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2050</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2050/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5065</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Read after free</bug_type>
				<cpr-id>2049</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2049/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5064</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2048</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2048/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5063</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20040</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2047</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2047/</guid>
			</item>
		
			<item>
				<title>CVE-2018-4985</title>
				<product>Acrobat Reader DC</product>
				<version>2018.011.20038</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2046</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2046/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20249</title>
				<product>Foxit Quick PDF</product>
				<version>&lt; 16.12</version>
				<bug_type>Out of Bounds Memory Access</bug_type>
				<cpr-id>2045</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2045/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20248</title>
				<product>Foxit Quick PDF</product>
				<version>&lt; 16.12</version>
				<bug_type>Out of Bounds Memory Access</bug_type>
				<cpr-id>2044</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2044/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20247</title>
				<product>Foxit Quick PDF</product>
				<version>&lt; 16.12</version>
				<bug_type>Stack Overflow</bug_type>
				<cpr-id>2043</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2043/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20251</title>
				<product>WinRAR</product>
				<version>&lt; 5.7</version>
				<bug_type>Protection Mechanism Failure</bug_type>
				<cpr-id>2042</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2042/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20250</title>
				<product>WinRAR</product>
				<version>&lt; 5.7</version>
				<bug_type>Absolute Path Traversal</bug_type>
				<cpr-id>2039</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2039/</guid>
			</item>
		
			<item>
				<title>CPRID-2038</title>
				<product>WinRAR</product>
				<version>&lt; 5.6.1</version>
				<bug_type>Use After Free</bug_type>
				<cpr-id>2038</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2038/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20253</title>
				<product>WinRAR</product>
				<version>&lt; 5.6.1</version>
				<bug_type>Out-Of-Bound Write</bug_type>
				<cpr-id>2037</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2037/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20252</title>
				<product>WinRAR</product>
				<version>&lt; 5.6.1</version>
				<bug_type>Out-Of-Bound Write</bug_type>
				<cpr-id>2036</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2036/</guid>
			</item>
		
			<item>
				<title>CVE-2019-5764</title>
				<product>libvpx</product>
				<version>versions prior to and including 1.7.0</version>
				<bug_type>Use-After-Free</bug_type>
				<cpr-id>2035</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2035/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20182</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Globals-Based Buffer Overflow</bug_type>
				<cpr-id>2034</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2034/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20181</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer Underflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2033</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2033/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20180</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer Underflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2032</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2032/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20179</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer-Underflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2031</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2031/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20178</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2030</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2030/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20177</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer-Overflow leading to Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2029</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2029/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20176</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2027, 2028</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2027,%202028/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20175</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer Signedness Error</bug_type>
				<cpr-id>2025, 2026</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2025,%202026/</guid>
			</item>
		
			<item>
				<title>CVE-2018-20174</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Heap-Based Buffer Over-Read leading to Information Leak</bug_type>
				<cpr-id>2024</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2024/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8800</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2023</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2023/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8799</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2022</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2022/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8798</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read leading to information leak</bug_type>
				<cpr-id>2021</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2021/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8797</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2020</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2020/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8796</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2019</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2019/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8795</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer-Overflow leading to Out-Of-Bounds Write</bug_type>
				<cpr-id>2018</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2018/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8794</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Integer-Overflow leading to Out-Of-Bounds Write</bug_type>
				<cpr-id>2017</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2017/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8793</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2016</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2016/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8792</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read</bug_type>
				<cpr-id>2015</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2015/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8791</title>
				<product>rdesktop</product>
				<version>&lt;= v1.8.3</version>
				<bug_type>Out-Of-Bounds Read leading to information leak</bug_type>
				<cpr-id>2014</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2014/</guid>
			</item>
		
			<item>
				<title>CPRID-2013</title>
				<product>MSTSC.exe</product>
				<version>all versions (no patch available)</version>
				<bug_type>Black List Bypass</bug_type>
				<cpr-id>2013</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2013/</guid>
			</item>
		
			<item>
				<title>CVE-2019-0887</title>
				<product>MSTSC.exe</product>
				<version>&lt; 09-Jul-19</version>
				<bug_type>Path Traversal</bug_type>
				<cpr-id>2012</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2012/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8789</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Out-Of-Bounds Reads</bug_type>
				<cpr-id>2010, 2011</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2010,%202011/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8788</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Out-Of-Bounds Write</bug_type>
				<cpr-id>2009</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2009/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8787</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Integer Overflow leading to a Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2008</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2008/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8786</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Integer Truncation leading to RCE</bug_type>
				<cpr-id>2007</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2007/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8785</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2006</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2006/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8784</title>
				<product>FreeRDP</product>
				<version>&lt; 2.0.0-rc4</version>
				<bug_type>Heap-Based Buffer Overflow</bug_type>
				<cpr-id>2005</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2005/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5925</title>
				<product>HP InkJet Printers</product>
				<version>Almost every Inkjet printer up to 2018</version>
				<bug_type>Globals Buffer Overflow</bug_type>
				<cpr-id>2003</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2003/</guid>
			</item>
		
			<item>
				<title>CVE-2018-5924</title>
				<product>HP InkJet Printers</product>
				<version>Almost every Inkjet printer up to 2018</version>
				<bug_type>Stack-Based Buffer Overflow leading to RCE</bug_type>
				<cpr-id>2002</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2002/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8781</title>
				<product>Linux Kernel</product>
				<version>3.4 and up to and including 4.15</version>
				<bug_type>Integer Overflow leading to Local Privilege Escalation</bug_type>
				<cpr-id>2001</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-2001/</guid>
			</item>
		
			<item>
				<title>CPRID-1030</title>
				<product>Xiaomi Android devices</product>
				<version>All Xiaomi Browser versions</version>
				<bug_type>Man-In-The-Disk attack leads to LPE</bug_type>
				<cpr-id>1030</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1030/</guid>
			</item>
		
			<item>
				<title>CVE-2018-4993</title>
				<product>Multiple PDF Readers</product>
				<version>Acrobat Reader DC 2018.011.20038 and earlier versions, 2017.011.30079 and earlier versions, 2015.006.30417 and earlier versions; Foxit Reader &lt; version 9.1</version>
				<bug_type>NTLMv2 hash leakage leads to credential theft</bug_type>
				<cpr-id>1029</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1029/</guid>
			</item>
		
			<item>
				<title>CPRID-1028</title>
				<product>LG Android devices</product>
				<version>Android 4.4, 5.0, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0</version>
				<bug_type>Man-In-The-Middle attack due to path-traversal vulnerability leads to RCE</bug_type>
				<cpr-id>1028</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1028/</guid>
			</item>
		
			<item>
				<title>CPRID-1027</title>
				<product>LG Android devices</product>
				<version>Android 6.0, 6.0.1, 7.0, 7.1, 7.2, 8.0, 8.1</version>
				<bug_type>Man-In-The-Disk attack leads to LPE</bug_type>
				<cpr-id>1027</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1027/</guid>
			</item>
		
			<item>
				<title>CPRID-1026</title>
				<product>LG Android devices</product>
				<version>Android 6.0, 6.0.1, 7.0, 7.1, 7.2, 8.0, 8.1</version>
				<bug_type>Man-In-The-Disk attack leads to LPE</bug_type>
				<cpr-id>1026</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1026/</guid>
			</item>
		
			<item>
				<title>CPRID-1025</title>
				<product>Android devices</product>
				<version>Google Text-to-speech &lt;= 3.14.9</version>
				<bug_type>Man-In-The-Disk attack leads to DoS</bug_type>
				<cpr-id>1025</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1025/</guid>
			</item>
		
			<item>
				<title>CPRID-1024</title>
				<product>Android devices</product>
				<version>Google Voice Typing &lt;= 7.21.23</version>
				<bug_type>Man-In-The-Disk attack leads to DoS</bug_type>
				<cpr-id>1024</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1024/</guid>
			</item>
		
			<item>
				<title>CVE-2016-2504</title>
				<product>Nexus 5, 5X, 6, 6P, and 7 (2013) devices</product>
				<version>Qualcomm GPU driver before 2016-08-05</version>
				<bug_type>LPE</bug_type>
				<cpr-id>1023</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1023/</guid>
			</item>
		
			<item>
				<title>CVE-2016-5340</title>
				<product>Android devices based on Qualcomm chipset</product>
				<version>Linux kernel &lt;= 3.19.3</version>
				<bug_type>LPE</bug_type>
				<cpr-id>1022</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1022/</guid>
			</item>
		
			<item>
				<title>CVE-2016-2503</title>
				<product>Nexus 5X and 6P devices</product>
				<version>Qualcomm GPU driver before 2016-07-05</version>
				<bug_type>Use after free due to race conditions leads to LPE</bug_type>
				<cpr-id>1021</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1021/</guid>
			</item>
		
			<item>
				<title>CVE-2016-2059</title>
				<product>Android devices based on Qualcomm chipset</product>
				<version>Linux kernel &lt;= 3.19.3</version>
				<bug_type>Race condition flaw leads to LPE</bug_type>
				<cpr-id>1020</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1020/</guid>
			</item>
		
			<item>
				<title>CVE-2016-6869</title>
				<product>TrendMicro-Premium10</product>
				<version>8.0, 8.0.2063, 10.0, 10.0.1186</version>
				<bug_type>DOS - lack of usermod-input validation of the IOCTL (I/O Control Code)</bug_type>
				<cpr-id>1019</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1019/</guid>
			</item>
		
			<item>
				<title>CVE-2016-2219</title>
				<product>Palo Alto Networks PAN-OS</product>
				<version>&lt; 7.0.8</version>
				<bug_type>Cross-site scripting</bug_type>
				<cpr-id>1018</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1018/</guid>
			</item>
		
			<item>
				<title>CVE-2016-1712</title>
				<product>Palo Alto Networks PAN-OS</product>
				<version>before 5.0.19, 5.1.x before 5.1.12, 6.0.x before 6.0.14, 6.1.x before 6.1.12, and 7.0.x before 7.0.8</version>
				<bug_type>Local privilege escalation</bug_type>
				<cpr-id>1017</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1017/</guid>
			</item>
		
			<item>
				<title>CVE-2016-1345</title>
				<product>Cisco FireSIGHT</product>
				<version>5.4.0 through 6.0.1</version>
				<bug_type>Bypass malware protection</bug_type>
				<cpr-id>1016</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1016/</guid>
			</item>
		
			<item>
				<title>CVE-2015-5832</title>
				<product>iOS</product>
				<version>iOS 9</version>
				<bug_type>Information Disclosure</bug_type>
				<cpr-id>1015</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1015/</guid>
			</item>
		
			<item>
				<title>CVE-2018-8476</title>
				<product>Windows Deployment Services</product>
				<version>All windows servers since 2008</version>
				<bug_type>Use-After-Free Leads to RCE</bug_type>
				<cpr-id>1011</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1011/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8316</title>
				<product>Eclipse</product>
				<version>&lt; 4.7</version>
				<bug_type>XML External Entity attack (XXE)</bug_type>
				<cpr-id>1010</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1010/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8315</title>
				<product>Eclipse</product>
				<version>&lt; 4.7</version>
				<bug_type>XML External Entity attack (XXE)</bug_type>
				<cpr-id>1009</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1009/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8314</title>
				<product>Kodi</product>
				<version>&lt;= Krypton 17.2-RC1</version>
				<bug_type>Directory Traversal leading to RCE</bug_type>
				<cpr-id>1008</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1008/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8313</title>
				<product>VLC</product>
				<version>&lt;= 2.2.5</version>
				<bug_type>Heap out-of-bound read</bug_type>
				<cpr-id>1007</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1007/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8312</title>
				<product>VLC</product>
				<version>&lt;= 2.2.5</version>
				<bug_type>Heap out-of-bound read</bug_type>
				<cpr-id>1006</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1006/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8311</title>
				<product>VLC</product>
				<version>&lt;= 2.2.5</version>
				<bug_type>Potential heap based buffer leads to RCE</bug_type>
				<cpr-id>1005</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1005/</guid>
			</item>
		
			<item>
				<title>CVE-2017-8310</title>
				<product>VLC</product>
				<version>&lt;= 2.2.5</version>
				<bug_type>Heap Out-of-Bound Read leads to DoS</bug_type>
				<cpr-id>1004</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1004/</guid>
			</item>
		
			<item>
				<title>CVE-2016-7480</title>
				<product>PHP</product>
				<version>7.0.11</version>
				<bug_type>PHP-7 unserialize Use of Uninitialized Value</bug_type>
				<cpr-id>1003</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1003/</guid>
			</item>
		
			<item>
				<title>CVE-2016-7479</title>
				<product>PHP</product>
				<version>7.1.0RC1</version>
				<bug_type>PHP-7 unserialize UAF</bug_type>
				<cpr-id>1002</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1002/</guid>
			</item>
		
			<item>
				<title>CVE-2016-7478</title>
				<product>PHP</product>
				<version>&lt; 5.6.26</version>
				<bug_type>PHP unserialize remote DoS</bug_type>
				<cpr-id>1001</cpr-id>
				<guid isPermaLink="true">https://cpr-zero.checkpoint.com/vulns/cprid-1001/</guid>
			</item>
		
	</channel>
</rss>