![sas microsoft office sas microsoft office](http://what-when-how.com/Tutorial/topic-134jdno/Exchanging-Data-Between-SAS-and-Microsoft-Excel_images/img-gen453.png)
![sas microsoft office sas microsoft office](https://docplayer.net/docs-images/47/20949056/images/page_6.jpg)
XStream API: code execution via DeserializationĪn attacker can use a vulnerability via Deserialization of XStream API, in order to run code.ġ109925, CERTFR-2019-AVI-586, cpuapr2021, cpujan2021, cpujul2021, cpuoct2020, CVE-2019-10173, RHSA-2020:0445-01, VIGILANCE-VUL-30921 Computer vulnerabilities of SAS Add-in for Microsoft Office Apache Ant: file corruptionĪ local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Apache Ant.Ħ344075, cpuapr2021, cpujan2021, cpujul2020, cpujul2021, cpuoct2020, CVE-2020-1945, FEDORA-2020-52741b0a49, FEDORA-2020-7f07da3fef, openSUSE-SU-2020:1022-1, USN-4380-1, VIGILANCE-VUL-32379