<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Angular JS and weak TLS ciphers such as 128 bit vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/angular-js-and-weak-tls-ciphers-such-as-128-bit-vulnerability/m-p/358396#M87878</link>
    <description>&lt;P&gt;Hi Team&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;As we could not able to find out the below vulnerability which is found on below model during penetration testing So , Please help us to find out the details for this vulnerability and let us know if any workaround is there or not.&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;CVE-ID-2020-7676&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Anyone got the similar vulnerability ?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Oct 2020 09:44:48 GMT</pubDate>
    <dc:creator>MohammedAsik</dc:creator>
    <dc:date>2020-10-23T09:44:48Z</dc:date>
    <item>
      <title>Angular JS and weak TLS ciphers such as 128 bit vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/angular-js-and-weak-tls-ciphers-such-as-128-bit-vulnerability/m-p/358396#M87878</link>
      <description>&lt;P&gt;Hi Team&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;As we could not able to find out the below vulnerability which is found on below model during penetration testing So , Please help us to find out the details for this vulnerability and let us know if any workaround is there or not.&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;CVE-ID-2020-7676&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Anyone got the similar vulnerability ?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards&lt;/DIV&gt;&lt;DIV&gt;Mohammed Asik&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 09:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/angular-js-and-weak-tls-ciphers-such-as-128-bit-vulnerability/m-p/358396#M87878</guid>
      <dc:creator>MohammedAsik</dc:creator>
      <dc:date>2020-10-23T09:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Angular JS and weak TLS ciphers such as 128 bit vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/angular-js-and-weak-tls-ciphers-such-as-128-bit-vulnerability/m-p/358737#M87918</link>
      <description>&lt;P&gt;Here is the link to the CVE on the CVE web page&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676" target="_blank"&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-7676&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="vulnDescriptionTitle" data-testid="vuln-description-title"&gt;Current Description&lt;/H3&gt;
&lt;P data-testid="vuln-description"&gt;angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "&amp;lt;option&amp;gt;" elements in "&amp;lt;select&amp;gt;" ones changes parsing behavior, leading to possibly unsanitizing code.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A id="showVulnAnalysis" style="text-decoration: underline;" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676#vulnCurrentDescriptionTitle" target="_blank"&gt;&lt;I class="fa fa-minus"&gt;&lt;/I&gt; Hide Analysis Description&lt;/A&gt;&lt;/P&gt;
&lt;DIV id="vulnAnalysisDescription"&gt;
&lt;H3 data-testid="vuln-analysis-description-title"&gt;Analysis Description&lt;/H3&gt;
&lt;P data-testid="vuln-analysis-description"&gt;angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "&amp;lt;option&amp;gt;" elements in "&amp;lt;select&amp;gt;" ones changes parsing behavior, leading to possibly unsanitizing code.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV id="vulnCvssPanel" class="row bs-callout bs-callout-success cvssVulnDetail" data-testid="vuln-cvss-container"&gt;
&lt;H3 style="display: inline;"&gt;Severity&lt;/H3&gt;
 
&lt;DIV id="cvssVulnDetailBtn" class="btn-group"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="vulnCvssPanel" class="row bs-callout bs-callout-success cvssVulnDetail" data-testid="vuln-cvss-container"&gt;
&lt;DIV id="cvssVulnDetailBtn" class="btn-group"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;DIV id="Vuln3CvssPanel" class="container-fluid" data-testid="vuln-cvss3-panel"&gt;&lt;STRONG&gt;CVSS 3.x Severity and Metrics:&lt;/STRONG&gt;
&lt;DIV class="row no-gutters"&gt;&lt;BR /&gt;
&lt;DIV class="col-lg-3 col-sm-6"&gt;
&lt;DIV class="row"&gt;
&lt;DIV class="col-lg-3 col-sm-6"&gt;
&lt;DIV id="tinyMceEditorSteveCantwell_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="col-lg-9 col-sm-6"&gt;&lt;STRONG&gt;NIST:&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN class="wrapData" data-testid="vuln-cvss3-panel-source"&gt;NVD&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="col-lg-3 col-sm-6"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Base Score:&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN class="severityDetail"&gt; &lt;A id="Cvss3NistCalculatorAnchor" class="label label-warning" href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2020-7676&amp;amp;vector=AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N&amp;amp;version=3.1&amp;amp;source=NIST" data-testid="vuln-cvss3-panel-score" target="_blank"&gt;5.4 MEDIUM&lt;/A&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="col-lg-6 col-sm-12"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Vector:&lt;/STRONG&gt;&amp;nbsp; &lt;SPAN class="tooltipCvss3NistMetrics" title="" data-testid="vuln-cvss3-nist-vector" data-original-title=""&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="cvss3FootNote" class="cvssFootNote"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;I&gt;NVD Analysts use publicly available information to associate vector strings and CVSS scores. We also display any CVSS information provided within the CVE List from the CNA.&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;I&gt;Note: NVD Analysts have published a CVSS score for this CVE based on publicly available information at the time of analysis. The CNA has not provided a score within the CVE List.&lt;/I&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="row col-sm-12"&gt;
&lt;DIV id="vulnHyperlinksPanel"&gt;
&lt;H3&gt;References to Advisories, Solutions, and Tools&lt;/H3&gt;
&lt;P&gt;By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to &lt;A href="mailto:nvd@nist.gov" target="_blank"&gt;nvd@nist.gov&lt;/A&gt;.&lt;/P&gt;
&lt;TABLE class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-hyperlinks-table"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Hyperlink&lt;/TH&gt;
&lt;TH&gt;Resource&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR data-testid="vuln-hyperlinks-row-1"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-1"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-1"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-2"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-2"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-2"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-3"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-3"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-3"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-4"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-4"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-4"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-5"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-5"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-5"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-6"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-6"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-6"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-7"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-7"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-7"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-8"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-8"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-8"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-9"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-9"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-9"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-10"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-10"&gt;&lt;A class="external" href="https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E" target="_blank" rel="noopener"&gt;https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-10"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-testid="vuln-hyperlinks-row-11"&gt;
&lt;TD data-testid="vuln-hyperlinks-link-11"&gt;&lt;A class="external" href="https://snyk.io/vuln/SNYK-JS-ANGULAR-570058" target="_blank" rel="noopener"&gt;https://snyk.io/vuln/SNYK-JS-ANGULAR-570058&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-hyperlinks-resType-11"&gt;&lt;SPAN&gt; &lt;SPAN class="badge"&gt;Third Party Advisory&lt;/SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;DIV id="vulnTechnicalDetailsDiv" class="technicalDetails" data-testid="vuln-technical-details-container"&gt;
&lt;H3&gt;Weakness Enumeration&lt;/H3&gt;
&lt;TABLE class="table table-striped table-condensed table-bordered detail-table" data-testid="vuln-CWEs-table"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;CWE-ID&lt;/TH&gt;
&lt;TH&gt;CWE Name&lt;/TH&gt;
&lt;TH&gt;Source&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR data-testid="vuln-CWEs-row-0"&gt;
&lt;TD data-testid="vuln-CWEs-link-0"&gt;&lt;A href="http://cwe.mitre.org/data/definitions/79.html" target="_blank" rel="noopener"&gt;CWE-79&lt;/A&gt;&lt;/TD&gt;
&lt;TD data-testid="vuln-CWEs-link-0"&gt;Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')&lt;/TD&gt;
&lt;TD data-testid="vuln-cwes-assigner-0"&gt;
&lt;DIV id="tinyMceEditorSteveCantwell_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;SPAN class="cweSource" data-testid="vuln-cwes-assigner-0-0"&gt;&lt;SPAN&gt;NIST  &lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H3&gt;Known Affected Software Configurations &lt;SMALL&gt; &lt;A id="toggleCpeVersion" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676#vulnConfigurationsArea" target="_blank"&gt;Switch to CPE 2.2&lt;/A&gt;&lt;/SMALL&gt;&lt;/H3&gt;
&lt;DIV&gt;
&lt;DIV id="vulnCpeTree"&gt;&lt;STRONG data-testid="vuln-software-config-1"&gt;Configuration 1&lt;/STRONG&gt; (&lt;SMALL&gt;&lt;A id="toggle-configuration-1" style="text-decoration: underline;" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676#toggleConfig1" data-toggle-config="config-div-1" target="_blank"&gt; hide &lt;/A&gt;&lt;/SMALL&gt;)&lt;BR /&gt;
&lt;DIV id="config-div-1"&gt;
&lt;TABLE class="table table-bordered table-hover table-condensed basic"&gt;
&lt;TBODY&gt;
&lt;TR class="vulnerable"&gt;
&lt;TD&gt;&lt;STRONG data-testid="vuln-software-cpe-1-0-0"&gt;&lt;I class="fa fa-bug fa-flip-vertical"&gt;&lt;/I&gt; &amp;nbsp;cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:*&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SMALL&gt;&lt;A style="text-decoration: underline;" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676#range-6034290" data-cpe-range-toggle="6034290" data-list-depth="2" data-list-cveid="CVE-2020-7676" target="_blank"&gt;Show Matching CPE(s)&lt;I class="fa fa-caret-down"&gt;&lt;/I&gt; &lt;/A&gt;&lt;/SMALL&gt;&lt;/TD&gt;
&lt;TD width="20%" data-testid="vuln-software-cpe-1-0-0-end-range"&gt;&lt;STRONG&gt;Up to (excluding)&lt;BR /&gt;1.8.0&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;SMALL&gt; &lt;I class="fa fa-asterisk fa-smaller-icon"&gt;&lt;/I&gt; Denotes Vulnerable Software&lt;BR /&gt;&lt;A href="mailto:cpe_dictionary@nist.gov" target="_blank"&gt;Are we missing a CPE here? Please let us know&lt;/A&gt;.&lt;BR /&gt;&lt;/SMALL&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="vulnChangeHistoryDiv" data-testid="vuln-change-history-container"&gt;
&lt;H3 id="VulnChangeHistorySection"&gt;Change History&lt;/H3&gt;
&lt;SMALL&gt; 7 change records found &lt;A id="changeHistoryToggle" style="text-decoration: underline;" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7676#VulnChangeHistorySection" target="_blank"&gt;show changes&lt;/A&gt; &lt;/SMALL&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 26 Oct 2020 10:45:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/angular-js-and-weak-tls-ciphers-such-as-128-bit-vulnerability/m-p/358737#M87918</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-10-26T10:45:38Z</dc:date>
    </item>
  </channel>
</rss>

