cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-6174,https://securityvulnerability.io/vulnerability/CVE-2020-6174,,TUF (aka The Update Framework) through 0.12.1 has Improper Verification of a Cryptographic Signature.,Linux,The Update Framework,9.8,CRITICAL,0.001970000099390745,false,,false,false,false,,,false,false,,2020-02-05T15:49:15.000Z,0 CVE-2020-6173,https://securityvulnerability.io/vulnerability/CVE-2020-6173,,TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption.,Linux,The Update Framework,5.3,MEDIUM,0.0009800000116229057,false,,false,false,false,,,false,false,,2020-01-14T18:50:31.000Z,0