1778 lines
96 KiB
JSON
1778 lines
96 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151749",
|
|
"Version": "oval:org.altlinux.errata:def:20151749",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1749: package `mariadb` update to version 10.0.21-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1749",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1749",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00338",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00338",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00339",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00339",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00340",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00340",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00341",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00341",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00343",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00343",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00345",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00345",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00346",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00346",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00350",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00350",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00351",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00351",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00352",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00352",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00353",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00353",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00354",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00354",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00356",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00356",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00357",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00357",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2014-00361",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2014-00361",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09979",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09979",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09981",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09981",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09982",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09982",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09986",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09986",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09988",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09988",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09991",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09991",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09993",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09993",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09994",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09994",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11050",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11050",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11052",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11052",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11860",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11860",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11874",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11874",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11909",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11909",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11911",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11911",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-12154",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-12154",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-00640",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-00640",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01602",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01602",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-01656",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-01656",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03233",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03233",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03235",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03235",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03236",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03236",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2019-03900",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2019-03900",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-00431",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-00431",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-01528",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-01528",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-02584",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-02584",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-02644",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-02644",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-02647",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-02647",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-02648",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-02648",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2021-00422",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2021-00422",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2021-02455",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2021-02455",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2005-0004",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2005-0004",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5908",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5908",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0001",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0001",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0384",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0384",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0401",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0401",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0412",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0412",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0420",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0420",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0437",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0437",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2419",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2419",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2430",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2430",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2431",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2431",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2432",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2432",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2436",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2436",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2438",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2438",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2440",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2440",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-2494",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-2494",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4207",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4207",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4243",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4243",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4258",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4258",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4260",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4260",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4274",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4274",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4287",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4287",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6463",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6463",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6464",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6464",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6469",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6469",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6478",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6478",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6484",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6484",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6491",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6491",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6494",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6494",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6495",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6495",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6496",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6496",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6500",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6500",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6505",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6505",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6507",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6507",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6520",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6520",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6530",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6530",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6551",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6551",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6555",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6555",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6559",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6559",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-6568",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0374",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0381",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0382",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0391",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0391",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0411",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0432",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0433",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0433",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0441",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0441",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0499",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0499",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0501",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0501",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0505",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0505",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2325",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2325",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2568",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2568",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2571",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2571",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2573",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2573",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2582",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2582",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2620",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2620",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2643",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2643",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2648",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2648",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3152",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3152",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4752",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4752",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4757",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4757",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4816",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4816",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4819",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4819",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4864",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4864",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4879",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4879",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2481",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2481",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2614",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2614",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2627",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2627",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2737",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2737",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2739",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2739",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2740",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2740",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2805",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2805",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-2974",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-2974",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-2574",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-2574",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-2752",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-2752",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-2780",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-2780",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-2812",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-2812",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-2922",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-2922",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-2007",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2007",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2021-2144",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2144",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades mariadb to version 10.0.21-alt1. \nSecurity Fix(es):\n\n * BDU:2014-00338: Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00339: Уязвимость системы управления базами данных Marida DB, позволяющая злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2014-00340: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00341: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00343: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00345: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00346: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00350: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00351: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00352: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00353: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00354: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00356: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00357: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2014-00361: Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, прошедшим аутентификацию, оказать воздействие на доступность данных\n\n * BDU:2015-09979: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю, прошедшим аутентификацию, нарушить доступность данных\n\n * BDU:2015-09981: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09982: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09986: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09988: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09991: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09993: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09994: Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11050: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-11052: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю нарушить доступность защищаемой информации\n\n * BDU:2015-11860: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю получить доступ к системе управления базами данных или выполнить произвольный код\n\n * BDU:2015-11874: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю изменять данные\n\n * BDU:2015-11909: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю получить доступ к MySQL Server или выполнить произвольный код\n\n * BDU:2015-11911: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-12154: Уязвимость системы управления базами данных MySQL, позволяющая нарушителю нарушить доступность информации\n\n * BDU:2019-00640: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01602: Уязвимость компонента Server: Replication системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01656: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03233: Уязвимость подкомпонента Server : Pluggable Auth компонента MySQL Server системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03235: Уязвимость подкомпонента Server: Security: Privileges компонента MySQL Server системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03236: Уязвимость подкомпонента Server: XML компонента MySQL Server системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03900: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00431: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01528: Уязвимость компонента Server: Parser системы управления базами данных MySQL ,позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02584: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-02644: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02647: Уязвимость компонента Server: DML системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02648: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00422: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2021-02455: Уязвимость компонента Server: Parser системы управления базами данных Oracle MySQL Server, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2005-0004: The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.\n\n * CVE-2013-5908: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.\n\n * CVE-2014-0001: Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.\n\n * CVE-2014-0384: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.\n\n * CVE-2014-0401: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.\n\n * CVE-2014-0412: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.\n\n * CVE-2014-0420: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.\n\n * CVE-2014-0437: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.\n\n * CVE-2014-2419: Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.\n\n * CVE-2014-2430: Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.\n\n * CVE-2014-2431: Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.\n\n * CVE-2014-2432: Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.\n\n * CVE-2014-2436: Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.\n\n * CVE-2014-2438: Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.\n\n * CVE-2014-2440: Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.\n\n * CVE-2014-2494: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.\n\n * CVE-2014-4207: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.\n\n * CVE-2014-4243: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.\n\n * CVE-2014-4258: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.\n\n * CVE-2014-4260: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.\n\n * CVE-2014-4274: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.\n\n * CVE-2014-4287: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.\n\n * CVE-2014-6463: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.\n\n * CVE-2014-6464: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.\n\n * CVE-2014-6469: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.\n\n * CVE-2014-6478: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.\n\n * CVE-2014-6484: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.\n\n * CVE-2014-6491: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.\n\n * CVE-2014-6494: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.\n\n * CVE-2014-6495: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.\n\n * CVE-2014-6496: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.\n\n * CVE-2014-6500: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.\n\n * CVE-2014-6505: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.\n\n * CVE-2014-6507: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.\n\n * CVE-2014-6520: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.\n\n * CVE-2014-6530: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.\n\n * CVE-2014-6551: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.\n\n * CVE-2014-6555: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.\n\n * CVE-2014-6559: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.\n\n * CVE-2014-6568: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.\n\n * CVE-2015-0374: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.\n\n * CVE-2015-0381: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.\n\n * CVE-2015-0382: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.\n\n * CVE-2015-0391: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.\n\n * CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.\n\n * CVE-2015-0432: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.\n\n * CVE-2015-0433: Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.\n\n * CVE-2015-0441: Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.\n\n * CVE-2015-0499: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.\n\n * CVE-2015-0501: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.\n\n * CVE-2015-0505: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.\n\n * CVE-2015-2325: The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.\n\n * CVE-2015-2568: Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-2571: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.\n\n * CVE-2015-2573: Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.\n\n * CVE-2015-2582: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.\n\n * CVE-2015-2620: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-2643: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.\n\n * CVE-2015-2648: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.\n\n * CVE-2015-3152: Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.\n\n * CVE-2015-4752: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.\n\n * CVE-2015-4757: Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.\n\n * CVE-2015-4816: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.\n\n * CVE-2015-4819: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.\n\n * CVE-2015-4864: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.\n\n * CVE-2015-4879: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.\n\n * CVE-2019-2481: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2614: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2627: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2737: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2739: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2019-2740: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2805: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2019-2974: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-2574: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-2752: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-2780: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-2812: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-2922: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2007: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2021-2144: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-09-02"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-09-02"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2014-00338",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00338",
|
|
"Impact": "High",
|
|
"Public": "20140131"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00339",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00339",
|
|
"Impact": "High",
|
|
"Public": "20140131"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00340",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00340",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00341",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00341",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00343",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00343",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00345",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00345",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00346",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00346",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00350",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00350",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00351",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00351",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00352",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00352",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00353",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00353",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00354",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00354",
|
|
"Impact": "Low",
|
|
"Public": "20140415"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00356",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00356",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00357",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00357",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "BDU:2014-00361",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2014-00361",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09979",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09979",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09981",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09981",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09982",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09982",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09986",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09986",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09988",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09988",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09991",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09991",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09993",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09993",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09994",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09994",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11050",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11050",
|
|
"Impact": "Low",
|
|
"Public": "20150714"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11052",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11052",
|
|
"Impact": "Low",
|
|
"Public": "20150714"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11860",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11860",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11874",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11874",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11909",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11909",
|
|
"Impact": "High",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11911",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11911",
|
|
"Impact": "Low",
|
|
"Public": "20151022"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-12154",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-12154",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-00640",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-00640",
|
|
"Impact": "Low",
|
|
"Public": "20190116"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01602",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01602",
|
|
"Impact": "Low",
|
|
"Public": "20190416"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-01656",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-01656",
|
|
"Impact": "Low",
|
|
"Public": "20190416"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03233",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03233",
|
|
"Impact": "Low",
|
|
"Public": "20190716"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03235",
|
|
"CVSS": "AV:L/AC:L/Au:S/C:N/I:P/A:C",
|
|
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03235",
|
|
"Impact": "Low",
|
|
"Public": "20190716"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03236",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03236",
|
|
"Impact": "Low",
|
|
"Public": "20190716"
|
|
},
|
|
{
|
|
"ID": "BDU:2019-03900",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-404",
|
|
"Href": "https://bdu.fstec.ru/vul/2019-03900",
|
|
"Impact": "Low",
|
|
"Public": "20191015"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-00431",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-404",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-00431",
|
|
"Impact": "Low",
|
|
"Public": "20200114"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-01528",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-01528",
|
|
"Impact": "Low",
|
|
"Public": "20190723"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-02584",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-02584",
|
|
"Impact": "Low",
|
|
"Public": "20200414"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-02644",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-02644",
|
|
"Impact": "Low",
|
|
"Public": "20200412"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-02647",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-02647",
|
|
"Impact": "Low",
|
|
"Public": "20200412"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-02648",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-02648",
|
|
"Impact": "Low",
|
|
"Public": "20200412"
|
|
},
|
|
{
|
|
"ID": "BDU:2021-00422",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2021-00422",
|
|
"Impact": "Low",
|
|
"Public": "20210119"
|
|
},
|
|
{
|
|
"ID": "BDU:2021-02455",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2021-02455",
|
|
"Impact": "High",
|
|
"Public": "20210420"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2005-0004",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-59",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2005-0004",
|
|
"Impact": "Low",
|
|
"Public": "20050414"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5908",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5908",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0001",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0001",
|
|
"Impact": "High",
|
|
"Public": "20140131"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0384",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0384",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0401",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0401",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0412",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0412",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0420",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0420",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0437",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0437",
|
|
"Impact": "Low",
|
|
"Public": "20140115"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2419",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2419",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2430",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2430",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2431",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2431",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2432",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2432",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2436",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2436",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2438",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2438",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2440",
|
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2440",
|
|
"Impact": "Low",
|
|
"Public": "20140416"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-2494",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-2494",
|
|
"Impact": "Low",
|
|
"Public": "20140717"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4207",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4207",
|
|
"Impact": "Low",
|
|
"Public": "20140717"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4243",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4243",
|
|
"Impact": "Low",
|
|
"Public": "20140717"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4258",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4258",
|
|
"Impact": "Low",
|
|
"Public": "20140717"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4260",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4260",
|
|
"Impact": "Low",
|
|
"Public": "20140717"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4274",
|
|
"CVSS": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4274",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4287",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4287",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6463",
|
|
"CVSS": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6463",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6464",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6464",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6469",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6469",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6478",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6478",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6484",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6484",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6491",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6491",
|
|
"Impact": "High",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6494",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6494",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6495",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6495",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6496",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6496",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6500",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6500",
|
|
"Impact": "High",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6505",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6505",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6507",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6507",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6520",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6520",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6530",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6530",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6551",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6551",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6555",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6555",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6559",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6559",
|
|
"Impact": "Low",
|
|
"Public": "20141015"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-6568",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0374",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0381",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0382",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0391",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0391",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0411",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
|
|
"Impact": "High",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0432",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
|
|
"Impact": "Low",
|
|
"Public": "20150121"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0433",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0433",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0441",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0441",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0499",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0499",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0501",
|
|
"CVSS": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0501",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0505",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0505",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2325",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2325",
|
|
"Impact": "High",
|
|
"Public": "20200114"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2568",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2568",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2571",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2571",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2573",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2573",
|
|
"Impact": "Low",
|
|
"Public": "20150416"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2582",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2582",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2620",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2620",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2643",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2643",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2648",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2648",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3152",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-295",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3152",
|
|
"Impact": "Low",
|
|
"Public": "20160516"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4752",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4752",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4757",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4757",
|
|
"Impact": "Low",
|
|
"Public": "20150716"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4816",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4816",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4819",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4819",
|
|
"Impact": "High",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4864",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4864",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4879",
|
|
"CVSS": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4879",
|
|
"Impact": "Low",
|
|
"Public": "20151021"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2481",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2481",
|
|
"Impact": "Low",
|
|
"Public": "20190116"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2614",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2614",
|
|
"Impact": "Low",
|
|
"Public": "20190423"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2627",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2627",
|
|
"Impact": "Low",
|
|
"Public": "20190423"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2737",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2737",
|
|
"Impact": "Low",
|
|
"Public": "20190723"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2739",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2739",
|
|
"Impact": "Low",
|
|
"Public": "20190723"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2740",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2740",
|
|
"Impact": "Low",
|
|
"Public": "20190723"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2805",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2805",
|
|
"Impact": "Low",
|
|
"Public": "20190723"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-2974",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-2974",
|
|
"Impact": "Low",
|
|
"Public": "20191016"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-2574",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-2574",
|
|
"Impact": "Low",
|
|
"Public": "20200115"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-2752",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-2752",
|
|
"Impact": "Low",
|
|
"Public": "20200415"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-2780",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-2780",
|
|
"Impact": "Low",
|
|
"Public": "20200415"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-2812",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-2812",
|
|
"Impact": "Low",
|
|
"Public": "20200415"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-2922",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-2922",
|
|
"Impact": "Low",
|
|
"Public": "20200415"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-2007",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2007",
|
|
"Impact": "Low",
|
|
"Public": "20210120"
|
|
},
|
|
{
|
|
"ID": "CVE-2021-2144",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2144",
|
|
"Impact": "High",
|
|
"Public": "20210422"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749001",
|
|
"Comment": "libmariadbembedded is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749002",
|
|
"Comment": "libmariadbembedded-devel is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749003",
|
|
"Comment": "libmysqlclient-devel is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749004",
|
|
"Comment": "libmysqlclient18 is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749005",
|
|
"Comment": "mariadb is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749006",
|
|
"Comment": "mariadb-bench is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749007",
|
|
"Comment": "mariadb-client is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749008",
|
|
"Comment": "mariadb-common is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749009",
|
|
"Comment": "mariadb-server is earlier than 0:10.0.21-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151749010",
|
|
"Comment": "mariadb-server-perl is earlier than 0:10.0.21-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |