vuln-list-alt/oval/c10f1/ALT-PU-2020-2640/definitions.json
2024-06-28 13:17:52 +00:00

1223 lines
77 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202640",
"Version": "oval:org.altlinux.errata:def:20202640",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2640: package `MySQL` update to version 8.0.21-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2640",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2640",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-04085",
"RefURL": "https://bdu.fstec.ru/vul/2019-04085",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02695",
"RefURL": "https://bdu.fstec.ru/vul/2020-02695",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02873",
"RefURL": "https://bdu.fstec.ru/vul/2020-02873",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03535",
"RefURL": "https://bdu.fstec.ru/vul/2020-03535",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03592",
"RefURL": "https://bdu.fstec.ru/vul/2020-03592",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03627",
"RefURL": "https://bdu.fstec.ru/vul/2020-03627",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03642",
"RefURL": "https://bdu.fstec.ru/vul/2020-03642",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03644",
"RefURL": "https://bdu.fstec.ru/vul/2020-03644",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03687",
"RefURL": "https://bdu.fstec.ru/vul/2020-03687",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03694",
"RefURL": "https://bdu.fstec.ru/vul/2020-03694",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03696",
"RefURL": "https://bdu.fstec.ru/vul/2020-03696",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03699",
"RefURL": "https://bdu.fstec.ru/vul/2020-03699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03707",
"RefURL": "https://bdu.fstec.ru/vul/2020-03707",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03709",
"RefURL": "https://bdu.fstec.ru/vul/2020-03709",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03761",
"RefURL": "https://bdu.fstec.ru/vul/2020-03761",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03762",
"RefURL": "https://bdu.fstec.ru/vul/2020-03762",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03763",
"RefURL": "https://bdu.fstec.ru/vul/2020-03763",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03764",
"RefURL": "https://bdu.fstec.ru/vul/2020-03764",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03765",
"RefURL": "https://bdu.fstec.ru/vul/2020-03765",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03766",
"RefURL": "https://bdu.fstec.ru/vul/2020-03766",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03767",
"RefURL": "https://bdu.fstec.ru/vul/2020-03767",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03768",
"RefURL": "https://bdu.fstec.ru/vul/2020-03768",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03769",
"RefURL": "https://bdu.fstec.ru/vul/2020-03769",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03859",
"RefURL": "https://bdu.fstec.ru/vul/2020-03859",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03869",
"RefURL": "https://bdu.fstec.ru/vul/2020-03869",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03874",
"RefURL": "https://bdu.fstec.ru/vul/2020-03874",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03880",
"RefURL": "https://bdu.fstec.ru/vul/2020-03880",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03906",
"RefURL": "https://bdu.fstec.ru/vul/2020-03906",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03929",
"RefURL": "https://bdu.fstec.ru/vul/2020-03929",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03933",
"RefURL": "https://bdu.fstec.ru/vul/2020-03933",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04263",
"RefURL": "https://bdu.fstec.ru/vul/2020-04263",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04264",
"RefURL": "https://bdu.fstec.ru/vul/2020-04264",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04271",
"RefURL": "https://bdu.fstec.ru/vul/2020-04271",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04274",
"RefURL": "https://bdu.fstec.ru/vul/2020-04274",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04277",
"RefURL": "https://bdu.fstec.ru/vul/2020-04277",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05390",
"RefURL": "https://bdu.fstec.ru/vul/2020-05390",
"Source": "BDU"
},
{
"RefID": "BDU:2020-05406",
"RefURL": "https://bdu.fstec.ru/vul/2020-05406",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00469",
"RefURL": "https://bdu.fstec.ru/vul/2021-00469",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00583",
"RefURL": "https://bdu.fstec.ru/vul/2021-00583",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00664",
"RefURL": "https://bdu.fstec.ru/vul/2021-00664",
"Source": "BDU"
},
{
"RefID": "CVE-2019-14540",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14539",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14539",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14540",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14540",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14547",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14547",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14550",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14550",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14553",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14553",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14559",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14559",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14568",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14568",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14575",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14575",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14576",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14576",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14586",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14586",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14591",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14591",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14597",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14597",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14614",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14614",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14619",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14619",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14620",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14620",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14623",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14624",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14631",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14631",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14632",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14632",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14633",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14633",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14634",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14634",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14641",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14641",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14643",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14651",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14654",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14654",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14656",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14656",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14663",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14663",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14672",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14672",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14678",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14678",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14680",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14680",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14697",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14697",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14702",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14725",
"Source": "CVE"
},
{
"RefID": "CVE-2020-14799",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-14799",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967",
"Source": "CVE"
},
{
"RefID": "CVE-2020-5258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-5258",
"Source": "CVE"
},
{
"RefID": "CVE-2020-5398",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-5398",
"Source": "CVE"
},
{
"RefID": "CVE-2021-1998",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-1998",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2012",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2012",
"Source": "CVE"
},
{
"RefID": "CVE-2021-2020",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-2020",
"Source": "CVE"
}
],
"Description": "This update upgrades MySQL to version 8.0.21-alt1. \nSecurity Fix(es):\n\n * BDU:2019-04085: Уязвимость функции FasterXML Java-библиотеки для грамматического разбора JSON файлов jackson-databind, позволяющая нарушителю получить полный контроль над системой\n\n * BDU:2020-02695: Уязвимость компонента Spring Framework программного продукта Oracle Retail Order Broker, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-02873: Уязвимость функции SSL_check_chain реализации протокола TLS библиотеки OpenSSL, связанная с с возможностью разыменования нулевого указателя в результате неправильной обработки TLS расширения «signature_algorithms_cert», позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03535: Уязвимость компонента Cluster: Packaging (dojo) системы управления базами данных Oracle MySQL Cluster, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-03592: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03627: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-03642: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03644: Уязвимость компонента Server: Security: Privileges системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить полный контроль над приложением\n\n * BDU:2020-03687: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-03694: Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03696: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03699: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных и вызвать отказ в обслуживании\n\n * BDU:2020-03707: Уязвимость компонента Server: Security: Roles системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных и вызвать отказ в обслуживании\n\n * BDU:2020-03709: Уязвимость компонента Server: Security: Roles системы управления базами данных MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или получить доступ на изменение, добавление или удаление данных\n\n * BDU:2020-03761: Уязвимость компонента InnoDBs системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03762: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю получить доступ на чтение, изменение, добавление или удаление данных\n\n * BDU:2020-03763: Уязвимость компонента Server: Options системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03764: Уязвимость компонента Server: Security: Audit системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03765: Уязвимость компонента Server: JSON системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03766: Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03767: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03768: Уязвимость компонента Server: Parser системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03769: Уязвимость компонента Server: Optimizer системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03859: Уязвимость компонента Server: UDF системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03869: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03874: Уязвимость компонента Audit Plug-in системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03880: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-03906: Уязвимость компонента Server: DML системы управления базами данных Oracle MySQL Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать зависание или отказ в обслуживании\n\n * BDU:2020-03929: Уязвимость компонента Server: Information Schema системы управления базами данных MySQL Server,связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-03933: Уязвимость компонента InnoDB системы управления базами данных MySQL Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04263: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04264: Уязвимость компонента Server: DML системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04271: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04274: Уязвимость компонента C API системы управления базами данных MySQL Client, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04277: Уязвимость компонента Server: Pluggable Auth системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных\n\n * BDU:2020-05390: Уязвимость компонента Server: Stored Procedure системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-05406: Уязвимость компонента Server: Security: Encryption системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00469: Уязвимость компонента Server: Security: Privileges системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00583: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-00664: Уязвимость компонента Server: Optimizer системы управления базами данных MySQL Server, позволяющая нарушителю получить доступ на изменение, добавление или удаление данных или вызвать отказ в обслуживании\n\n * CVE-2019-14540: A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.\n\n * CVE-2020-14539: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14540: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14547: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14550: Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14553: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2020-14559: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2020-14568: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14575: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14576: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14586: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14591: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14597: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14614: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14619: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14620: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14623: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14624: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14631: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14632: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14633: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).\n\n * CVE-2020-14634: Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\n * CVE-2020-14641: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n * CVE-2020-14643: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2020-14651: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).\n\n * CVE-2020-14654: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14656: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14663: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14672: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14678: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14680: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14697: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\n\n * CVE-2020-14702: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14725: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-14799: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2020-1967: Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the \"signature_algorithms_cert\" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).\n\n * CVE-2020-5258: In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript application object prototype of the base object by injecting other values. This has been patched in versions 1.12.8, 1.13.7, 1.14.6, 1.15.3 and 1.16.2\n\n * CVE-2020-5398: In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a \"Content-Disposition\" header in the response where the filename attribute is derived from user supplied input.\n\n * CVE-2021-1998: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).\n\n * CVE-2021-2012: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\n\n * CVE-2021-2020: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-08-20"
},
"Updated": {
"Date": "2020-08-20"
},
"BDUs": [
{
"ID": "BDU:2019-04085",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-200, CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04085",
"Impact": "Critical",
"Public": "20190910"
},
{
"ID": "BDU:2020-02695",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-79, CWE-494",
"Href": "https://bdu.fstec.ru/vul/2020-02695",
"Impact": "High",
"Public": "20200414"
},
{
"ID": "BDU:2020-02873",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-02873",
"Impact": "High",
"Public": "20200421"
},
{
"ID": "BDU:2020-03535",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-74, CWE-94",
"Href": "https://bdu.fstec.ru/vul/2020-03535",
"Impact": "Low",
"Public": "20200310"
},
{
"ID": "BDU:2020-03592",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03592",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03627",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03627",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03642",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2020-03642",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03644",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03644",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03687",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03687",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "BDU:2020-03694",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03694",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03696",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03696",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03699",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03699",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03707",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03707",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03709",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03709",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03761",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03761",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03762",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03762",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03763",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03763",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03764",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03764",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03765",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03765",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03766",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03766",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03767",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03767",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03768",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03768",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03769",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03769",
"Impact": "Low",
"Public": "20200714"
},
{
"ID": "BDU:2020-03859",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03859",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03869",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03869",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03874",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03874",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03880",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03880",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03906",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03906",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-03929",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03929",
"Impact": "Low",
"Public": "20200515"
},
{
"ID": "BDU:2020-03933",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03933",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04263",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04263",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04264",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04264",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04271",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04271",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04274",
"CVSS": "AV:N/AC:H/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04274",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-04277",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-04277",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "BDU:2020-05390",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05390",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2020-05406",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-05406",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "BDU:2021-00469",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00469",
"Impact": "Low",
"Public": "20210119"
},
{
"ID": "BDU:2021-00583",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2021-00583",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "BDU:2021-00664",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2021-00664",
"Impact": "Low",
"Public": "20210119"
}
],
"CVEs": [
{
"ID": "CVE-2019-14540",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-502",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14540",
"Impact": "Critical",
"Public": "20190915"
},
{
"ID": "CVE-2020-14539",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14539",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14540",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14540",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14547",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14547",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14550",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14550",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14553",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14553",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14559",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14559",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14568",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14568",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14575",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14575",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14576",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14576",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14586",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14586",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14591",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14591",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14597",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14597",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14614",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14614",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14619",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14619",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14620",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14620",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14623",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14623",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14624",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14624",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14631",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14631",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14632",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14632",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14633",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14633",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14634",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14634",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14641",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14641",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14643",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14643",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14651",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14651",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14654",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14654",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14656",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14656",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14663",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14663",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14672",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14672",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-14678",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14678",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14680",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14680",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14697",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14697",
"Impact": "High",
"Public": "20200715"
},
{
"ID": "CVE-2020-14702",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14702",
"Impact": "Low",
"Public": "20200715"
},
{
"ID": "CVE-2020-14725",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14725",
"Impact": "Low",
"Public": "20200724"
},
{
"ID": "CVE-2020-14799",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-14799",
"Impact": "Low",
"Public": "20201021"
},
{
"ID": "CVE-2020-1967",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967",
"Impact": "High",
"Public": "20200421"
},
{
"ID": "CVE-2020-5258",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-5258",
"Impact": "High",
"Public": "20200310"
},
{
"ID": "CVE-2020-5398",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-494",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-5398",
"Impact": "High",
"Public": "20200117"
},
{
"ID": "CVE-2021-1998",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-1998",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2012",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2012",
"Impact": "Low",
"Public": "20210120"
},
{
"ID": "CVE-2021-2020",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-2020",
"Impact": "Low",
"Public": "20210120"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202640001",
"Comment": "MySQL-client is earlier than 0:8.0.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202640002",
"Comment": "MySQL-server is earlier than 0:8.0.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202640003",
"Comment": "MySQL-server-perl is earlier than 0:8.0.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202640004",
"Comment": "libmysqlclient21 is earlier than 0:8.0.21-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202640005",
"Comment": "libmysqlclient21-devel is earlier than 0:8.0.21-alt1"
}
]
}
]
}
}
]
}