6594 lines
353 KiB
JSON
6594 lines
353 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20202441",
|
||
"Version": "oval:org.altlinux.errata:def:20202441",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-2441: package `chromium-gost` update to version 83.0.4103.61-alt2.M90P.1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-2441",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2441",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02884",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02884",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02885",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02885",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03643",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03643",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04421",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04421",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04422",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04422",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04423",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04423",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04424",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04424",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04425",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04425",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04426",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04426",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04508",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04508",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00168",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00168",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00171",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00171",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00867",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00867",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01341",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01341",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01400",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01400",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01401",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01401",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01403",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01403",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01424",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01424",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01433",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01433",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01434",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01434",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01438",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01438",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01439",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01439",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01440",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01440",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01441",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01441",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01442",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01442",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01443",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01443",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01445",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01445",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01452",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01452",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01453",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01453",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01460",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01460",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01465",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01465",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01467",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01467",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01476",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01476",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01477",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01477",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01479",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01479",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01483",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01483",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01487",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01487",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01489",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01489",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01493",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01493",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01495",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01495",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01498",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01498",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01502",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01502",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01503",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01503",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01505",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01505",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01506",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01506",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01509",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01509",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01511",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01511",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01518",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01518",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01519",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01519",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01522",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01522",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01604",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01604",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01605",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01605",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01606",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01606",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01607",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01607",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01608",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01608",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01609",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01609",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01610",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01610",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01611",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01611",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01612",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01612",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01613",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01613",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01614",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01614",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01615",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01615",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01616",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01616",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01617",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01617",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01618",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01618",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01619",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01619",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01620",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01620",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01621",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01621",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01622",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01622",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01623",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01623",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01624",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01624",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01625",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01625",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01626",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01626",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01627",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01627",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01628",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01628",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01629",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01629",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01630",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01630",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01631",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01631",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01634",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01634",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01635",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01635",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01636",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01636",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01637",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01637",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01638",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01638",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01639",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01639",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01644",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01644",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01646",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01646",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01671",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01671",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01672",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01672",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01673",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01673",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01674",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01674",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01684",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01684",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01693",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01693",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01694",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01694",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01695",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01695",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01696",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01696",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01697",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01697",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01698",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01698",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01699",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01699",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01700",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01700",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01701",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01701",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01702",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01702",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01703",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01703",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01704",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01704",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01705",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01705",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01706",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01706",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01724",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01724",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01725",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01725",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01748",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01748",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01750",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01750",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01751",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01751",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01754",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01754",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01755",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01755",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01758",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01758",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01760",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01760",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01761",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01761",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01764",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01764",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01766",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01766",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01770",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01770",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01779",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01779",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01780",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01780",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01781",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01781",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01782",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01782",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01783",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01783",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01784",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01784",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01785",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01785",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01786",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01786",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01787",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01787",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01788",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01788",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01789",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01789",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01790",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01790",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01791",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01791",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01792",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01792",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01793",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01793",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01798",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01798",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01799",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01799",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01800",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01800",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01802",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01802",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01803",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01803",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01911",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01911",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01912",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01912",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01914",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01914",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01915",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01915",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01916",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01916",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01917",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01917",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01918",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01918",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01919",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01919",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01961",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01961",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01962",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01962",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01967",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01967",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01968",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01968",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-01969",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-01969",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02034",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02034",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02263",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02263",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02444",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02444",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02857",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02857",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03666",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03666",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03667",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03667",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03668",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03668",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03669",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03669",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03670",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03670",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03671",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03671",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03674",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03674",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03675",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03675",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03715",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03715",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03716",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03716",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03717",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03717",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03718",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03718",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03719",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03719",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03720",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03720",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03721",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03721",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03722",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03722",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03723",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03723",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03736",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03736",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03737",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03737",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03738",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03738",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03739",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03739",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03740",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03740",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03741",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03741",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03742",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03742",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03743",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03743",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03744",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03744",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03745",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03745",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03746",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03746",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03747",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03747",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03748",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03748",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03749",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03749",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03750",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03750",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03751",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03751",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03752",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03752",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03753",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03753",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03754",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03754",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03755",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03755",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03756",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03756",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03757",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03757",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03811",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03811",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03832",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03832",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03833",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03833",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03834",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03834",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03835",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03835",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03836",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03836",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03837",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03837",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03839",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03839",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03840",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03840",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03841",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03841",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03842",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03842",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03843",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03843",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03844",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03844",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03845",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03845",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03846",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03846",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03847",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03847",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03848",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03848",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-03849",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-03849",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01061",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01061",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01062",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01062",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01063",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01063",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-01136",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-01136",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03818",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03818",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-03846",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-03846",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04927",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04927",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04937",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04937",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06414",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06414",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13659",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13660",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13661",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13662",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13663",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13664",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13665",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13666",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13667",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13668",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13669",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13670",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13671",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13673",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13674",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13675",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13676",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13677",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13678",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13679",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13680",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13681",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13682",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13683",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13685",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13686",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13687",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13688",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13691",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13692",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13693",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13694",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13695",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13697",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13699",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13700",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13701",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13702",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13703",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13704",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13705",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13706",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13707",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13708",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13709",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13710",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13711",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13713",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13715",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13716",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13717",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13718",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13719",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13720",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13721",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13723",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13724",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13725",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13726",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13727",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13728",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13729",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13730",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13732",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13734",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13735",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13736",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13737",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13738",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13739",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13740",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13741",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13742",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13743",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13744",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13745",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13746",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13747",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13748",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13749",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13750",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13751",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13752",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13753",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13754",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13755",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13756",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13757",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13758",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13759",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13761",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13762",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13763",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13764",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13765",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13766",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13767",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13767",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-15903",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-18197",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-19923",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-19925",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-19926",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5867",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5868",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5869",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5870",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5871",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5873",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5874",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5875",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5876",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5877",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5878",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5879",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5880",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5881",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-10531",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6377",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6377",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6378",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6378",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6379",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6379",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6380",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6380",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6381",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6382",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6383",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6384",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6385",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6386",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6387",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6388",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6389",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6390",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6391",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6392",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6393",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6394",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6395",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6396",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6397",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6398",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6399",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6400",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6401",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6402",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6403",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6404",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6405",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6406",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6407",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6408",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6409",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6410",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6411",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6412",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6413",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6414",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6415",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6416",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6417",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6418",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6419",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6420",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6422",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6423",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6424",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6425",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6426",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6427",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6428",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6429",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6430",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6431",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6432",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6433",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6434",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6435",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6436",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6437",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6438",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6439",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6440",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6441",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6442",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6444",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6445",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6446",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6447",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6448",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6449",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6450",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6451",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6452",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6453",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6454",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6455",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6456",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6457",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6457",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6458",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6459",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6460",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6461",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6462",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6463",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6464",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6465",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6465",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6466",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6466",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6467",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6467",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6468",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6468",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6469",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6469",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6470",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6470",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6472",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6472",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6474",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6474",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6475",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6475",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6478",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6478",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6479",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6479",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6480",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6480",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6481",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6481",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6482",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6482",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6483",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6483",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6484",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6484",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6485",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6485",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6486",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6486",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6487",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6487",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6488",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6488",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6489",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6489",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6490",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6490",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6491",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6491",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6499",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6500",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6501",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6502",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6572",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-6831",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium-gost to version 83.0.4103.61-alt2.M90P.1. \nSecurity Fix(es):\n\n * BDU:2019-02884: Уязвимость компонента ExecuteFieldAction обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02885: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03643: Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04421: Уязвимость расширения Color Enhancer браузера Google Chrome, позволяющая нарушителю изменить данные HTML-страницы\n\n * BDU:2019-04422: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04423: Уязвимость браузера Google Chrome, связанная с неправильной авторизацией, позволяющая нарушителю обойти ограничения навигации\n\n * BDU:2019-04424: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04425: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04426: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04508: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-00168: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-00171: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-00867: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01341: Уязвимость функции xsltCopyText (transform.c) библиотеки libxslt, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01400: Уязвимость дебаггера Skia браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01401: Уязвимость службы Bluetooth браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01403: Уязвимость службы Bluetooth браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01424: Уязвимость механизма ввода данных в Blink браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01433: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01434: Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01438: Уязвимость механизма обработки внешних протоколов браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01439: Уязвимость механизма обработки файлов cookie браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01440: Уязвимость механизма обработки аудио файлове браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01441: Уязвимость механизма в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01442: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01443: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01444: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01445: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01452: Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01453: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику оказать воздействие на целостность данных\n\n * BDU:2020-01460: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01465: Уязвимость механизма рендеринга в Android браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01466: Уязвимость инструментов разработки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01467: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01476: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01477: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с чтение за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01479: Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01483: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01487: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01489: Уязвимость компонента AppCache браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01493: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01495: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01498: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01502: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01503: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01505: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01506: Уязвимость компонента SQLite браузера Google Chrome, связанная с чтением за границами буфера, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01509: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01511: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01518: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01519: Уязвимость компонента SQLite браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01522: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01604: Уязвимость реализации протокола WebRTC браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01605: Уязвимость встроенной базы данных IndexedDB браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01606: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01607: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01608: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01609: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01610: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01611: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01612: Уязвимость реализации протокола TLS браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01613: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01614: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01615: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01616: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01617: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01618: Уязвимость адресной строки Omnibox инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01619: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01620: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01621: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01622: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01623: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01624: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01625: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01626: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01627: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01628: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01629: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01630: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01631: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01634: Уязвимость механизма навигации в Android браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01635: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01636: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01637: Уязвимость политики безопасности расширений браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01638: Уязвимость политики безопасности расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01639: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01644: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01646: Уязвимость механизма инициализации данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01671: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01672: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01673: Уязвимость инструментов разработчика браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01674: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01684: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01693: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01694: Уязвимость браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01695: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01696: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01697: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01698: Уязвимость браузера Google Chrome, связанная с доступом к ресурсу с использованием несовместимого типа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01699: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01700: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01701: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01702: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01703: Уязвимость браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-01704: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01705: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01706: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01724: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01725: Уязвимость системы высокопроизводительного рендеринга SwiftShader браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-01748: Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01750: Уязвимость браузера Google Chrome, связанная с выходом операции за границы памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01751: Уязвимость браузера Google Chrome, связанная с неправильным применением политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01754: Уязвимость библиотеки передачи сообщений Mojo браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01755: Уязвимость расширений браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01758: Уязвимость браузера Google Chrome, связанная с неправильной настройкой политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01760: Уязвимость браузера Google Chrome, связанная с недостаточной фильтрацией в URL строке, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01761: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01764: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01766: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01770: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01779: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01780: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01781: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01782: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01783: Уязвимость браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01784: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01785: Уязвимость установщика браузера Google Chrome, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01786: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01787: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01788: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01789: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01790: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01791: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01792: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01793: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01798: Уязвимость пользовательского интерфейса в интерстициалах браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01799: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01800: Уязвимость механизма загрузки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01802: Уязвимость функции типизации в JavaScript браузера Google Chrome позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01803: Уязвимость механизма подбора музыки браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01911: Уязвимость браузера Google Chrome, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01912: Уязвимость компонента WebAudio браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01914: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01915: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01916: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01917: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01918: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01919: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2020-01961: Уязвимость компонента мультимедиа браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01962: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01967: Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01968: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01969: Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02034: Уязвимость функции UnicodeString::doAppend (unistr.cpp) библиотеки International Components for Unicode, связанная с целочисленным переполнением структуры данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02263: Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю осуществить выход из изолированной программной среды\n\n * BDU:2020-02444: Уязвимость функции распознавания речи браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02857: Уязвимость подсистемы media браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента\n\n * BDU:2020-03666: Уязвимость компонента Audio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03667: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03668: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03669: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03670: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03671: Уязвимость установщика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03674: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03675: Уязвимость компонента devtools браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03715: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с ошибками применения правила в расширениях, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03716: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03717: Уязвимость реализации WebView пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03718: Уязвимость расширений браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03719: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03720: Уязвимость расширений браузера Google Chrome, связанная с недостатком механизма контроля привилегий и средств управления доступом, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03721: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03722: Уязвимость кэша приложения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03723: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03736: Уязвимость модуля WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03737: Уязвимость доверенных типов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03738: Уязвимость доверенных типов браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03739: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03740: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03741: Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03742: Уязвимость модуля WebSQL браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03743: Уязвимость браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03744: Уязвимость модуля PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03745: Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03746: Уязвимость механизма форматирования URL-адресов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03747: Уязвимость хранилища браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03748: Уязвимость планировщика заданий браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03749: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03750: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03751: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03752: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03753: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03754: Уязвимость буфера обмена браузера Google Chrome, связанная с недостатками используемых мер по защите структур веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03755: Уязвимость инструментов разработчика браузера Google Chrome , позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03756: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03757: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03811: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03832: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03833: Уязвимость модуля TabStrip браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03834: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03835: Уязвимость механизма общего доступа браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03836: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03837: Уязвимость механизма форматирования URL-адресов браузера Google Chrome, связанная с ошибкой механизма управления ресурсами системы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03839: Уязвимость инструментов разработчика браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03840: Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03841: Уязвимость компонента ChromeDriver браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03842: Уязвимость навигационной системы браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03843: Уязвимость компонента media router браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03844: Уязвимость политики загрузок браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03845: Уязвимость политики загрузок браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03846: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03847: Уязвимость загрузчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03848: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03849: Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01061: Уязвимость функции распознавания речи SpeechRecognizerImpl::Abort веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01062: Уязвимость компонента распознавания речи Speech Recognizer веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01063: Уязвимость расширений веб-браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-01136: Уязвимость полноэкранного режима веб-браузера Google Chrome, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-03818: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности при помощи специально созданного доменного имени\n\n * BDU:2021-03846: Уязвимость службы Safe Browsing веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2021-04927: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-04937: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06414: Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения\n\n * CVE-2019-13659: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13660: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13661: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13662: Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13663: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13664: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13665: Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.\n\n * CVE-2019-13666: Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13667: Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13668: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13669: Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13670: Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13671: UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13673: Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13674: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13675: Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13676: Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13677: Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13678: Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13679: Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.\n\n * CVE-2019-13680: Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.\n\n * CVE-2019-13681: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13682: Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13683: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13685: Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13686: Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13687: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13688: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13691: Insufficient validation of untrusted input in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13692: Insufficient policy enforcement in reader mode in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13693: Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13694: Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13695: Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13696: Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13697: Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13699: Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13700: Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13701: Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13702: Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.\n\n * CVE-2019-13703: Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13704: Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13705: Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.\n\n * CVE-2019-13706: Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13707: Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.\n\n * CVE-2019-13708: Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13709: Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13710: Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13711: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13713: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13714: Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.\n\n * CVE-2019-13715: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13716: Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13717: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13718: Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13719: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13720: Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13721: Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13723: Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13724: Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13725: Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13726: Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13727: Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13728: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13729: Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13730: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13732: Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13734: Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13735: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-13736: Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13737: Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13738: Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13739: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13740: Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13741: Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.\n\n * CVE-2019-13742: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-13743: Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13744: Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13745: Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13746: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13747: Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13748: Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13749: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13750: Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.\n\n * CVE-2019-13751: Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13752: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13753: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13754: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13755: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13756: Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13757: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13758: Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13759: Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13761: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13762: Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.\n\n * CVE-2019-13763: Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13764: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13765: Use-after-free in content delivery manager in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13766: Use-after-free in accessibility in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13767: Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.\n\n * CVE-2019-18197: In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.\n\n * CVE-2019-19923: flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n\n * CVE-2019-19925: zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n\n * CVE-2019-19926: multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n\n * CVE-2019-5867: Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5868: Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-5869: Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5870: Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2019-5871: Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5872: Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5873: Insufficient policy validation in navigation in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5874: Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-5875: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5876: Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5877: Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5878: Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5879: Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.\n\n * CVE-2019-5880: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-5881: Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.\n\n * CVE-2020-6377: Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6378: Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6379: Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6380: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.\n\n * CVE-2020-6381: Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6382: Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6383: Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6384: Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6385: Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2020-6386: Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6387: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6388: Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6389: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6390: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6391: Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6392: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6393: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6394: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6395: Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6396: Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6397: Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6398: Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6399: Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6400: Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6401: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6402: Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.\n\n * CVE-2020-6403: Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6404: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6405: Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6406: Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6407: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6408: Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.\n\n * CVE-2020-6409: Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.\n\n * CVE-2020-6410: Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.\n\n * CVE-2020-6411: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6412: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6413: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.\n\n * CVE-2020-6414: Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6415: Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6416: Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6417: Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.\n\n * CVE-2020-6418: Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6419: Out of bounds write in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6420: Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2020-6422: Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6423: Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6424: Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6425: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.\n\n * CVE-2020-6426: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6427: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6428: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6429: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6430: Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6431: Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6432: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6433: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6434: Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6435: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6436: Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6437: Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.\n\n * CVE-2020-6438: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.\n\n * CVE-2020-6439: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6440: Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.\n\n * CVE-2020-6441: Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6442: Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6443: Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.\n\n * CVE-2020-6444: Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6445: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6446: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6447: Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6448: Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6449: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6450: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6451: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6452: Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6453: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6454: Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2020-6455: Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6456: Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.\n\n * CVE-2020-6457: Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6458: Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6459: Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6460: Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2020-6461: Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6462: Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6463: Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6464: Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6465: Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6466: Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6467: Use after free in WebRTC in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6468: Type confusion in V8 in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6469: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6470: Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.\n\n * CVE-2020-6471: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6472: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.\n\n * CVE-2020-6473: Insufficient policy enforcement in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6474: Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6475: Incorrect implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6476: Insufficient policy enforcement in tab strip in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6477: Inappropriate implementation in installer in Google Chrome on OS X prior to 83.0.4103.61 allowed a local attacker to perform privilege escalation via a crafted file.\n\n * CVE-2020-6478: Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6479: Inappropriate implementation in sharing in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6480: Insufficient policy enforcement in enterprise in Google Chrome prior to 83.0.4103.61 allowed a local attacker to bypass navigation restrictions via UI actions.\n\n * CVE-2020-6481: Insufficient policy enforcement in URL formatting in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2020-6482: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6483: Insufficient policy enforcement in payments in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6484: Insufficient data validation in ChromeDriver in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted request.\n\n * CVE-2020-6485: Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6486: Insufficient policy enforcement in navigations in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6487: Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6488: Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6489: Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.\n\n * CVE-2020-6490: Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6491: Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name.\n\n * CVE-2020-6499: Inappropriate implementation in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass AppCache security restrictions via a crafted HTML page.\n\n * CVE-2020-6500: Inappropriate implementation in interstitials in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6501: Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6502: Incorrect implementation in permissions in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6572: Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2020-6831: A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 68.8, Firefox \u003c 76, and Thunderbird \u003c 68.8.0.\n\n * #36815: Некорректно отображается пункт программы в меню xfce: название отсутствует",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-07-23"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-07-23"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-02884",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02884",
|
||
"Impact": "High",
|
||
"Public": "20190806"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02885",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02885",
|
||
"Impact": "High",
|
||
"Public": "20190806"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03643",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-611",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03643",
|
||
"Impact": "High",
|
||
"Public": "20190828"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04421",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-74",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04421",
|
||
"Impact": "Low",
|
||
"Public": "20190710"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04422",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04422",
|
||
"Impact": "Low",
|
||
"Public": "20170831"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04423",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04423",
|
||
"Impact": "Low",
|
||
"Public": "20190919"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04424",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-922",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04424",
|
||
"Impact": "Low",
|
||
"Public": "20180503"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04425",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04425",
|
||
"Impact": "Low",
|
||
"Public": "20180720"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04426",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-922",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04426",
|
||
"Impact": "Low",
|
||
"Public": "20190131"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04508",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04508",
|
||
"Impact": "High",
|
||
"Public": "20191031"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00168",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00168",
|
||
"Impact": "High",
|
||
"Public": "20191012"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00171",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00171",
|
||
"Impact": "Low",
|
||
"Public": "20190626"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00867",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00867",
|
||
"Impact": "Low",
|
||
"Public": "20200224"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01341",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01341",
|
||
"Impact": "High",
|
||
"Public": "20191018"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01400",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01400",
|
||
"Impact": "High",
|
||
"Public": "20190621"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01401",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01401",
|
||
"Impact": "High",
|
||
"Public": "20191110"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01403",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01403",
|
||
"Impact": "High",
|
||
"Public": "20191110"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01424",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01424",
|
||
"Impact": "High",
|
||
"Public": "20200108"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01433",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01433",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01434",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01434",
|
||
"Impact": "High",
|
||
"Public": "20191209"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01438",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01438",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01439",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01439",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01440",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01440",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01441",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01441",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01442",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01442",
|
||
"Impact": "High",
|
||
"Public": "20191129"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01443",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01443",
|
||
"Impact": "High",
|
||
"Public": "20191129"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01444",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01444",
|
||
"Impact": "High",
|
||
"Public": "20191129"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01445",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01445",
|
||
"Impact": "High",
|
||
"Public": "20191129"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01452",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01452",
|
||
"Impact": "High",
|
||
"Public": "20191222"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01453",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01453",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01460",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01460",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01465",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01465",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01466",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01466",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01467",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01467",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01476",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01476",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01477",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01477",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01479",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01479",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01483",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01483",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01487",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01487",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01489",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01489",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01493",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01493",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01495",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01495",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01498",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01498",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01502",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01502",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01503",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01503",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01505",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01505",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01506",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01506",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01509",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01509",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01511",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01511",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01518",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01518",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01519",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01519",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01522",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01522",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01604",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01604",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01605",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01605",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01606",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01606",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01607",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01607",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01608",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01608",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01609",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01609",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01610",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01610",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01611",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01611",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01612",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01612",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01613",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01613",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01614",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01614",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01615",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01615",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01616",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01616",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01617",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01617",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01618",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01618",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01619",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01619",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01620",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01620",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01621",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01621",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01622",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01622",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01623",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01623",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01624",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01624",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01625",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01625",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01626",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01626",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01627",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01627",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01628",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01628",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01629",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01629",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01630",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01630",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01631",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01631",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01634",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01634",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01635",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01635",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01636",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01636",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01637",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01637",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01638",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01638",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01639",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01639",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01644",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01644",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01646",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01646",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01671",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01671",
|
||
"Impact": "High",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01672",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01672",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01673",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01673",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01674",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01674",
|
||
"Impact": "Low",
|
||
"Public": "20191022"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01684",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01684",
|
||
"Impact": "Critical",
|
||
"Public": "20190621"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01693",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01693",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01694",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01694",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01695",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01695",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01696",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01697",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01697",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01698",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01698",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01699",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01699",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01700",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01700",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01701",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01701",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01702",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01702",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01703",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01703",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01704",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01704",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01705",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01705",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01706",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01706",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01724",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01724",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01725",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01725",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01748",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-434",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01748",
|
||
"Impact": "High",
|
||
"Public": "20191224"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01750",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01750",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01751",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01751",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01754",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01754",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01755",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01755",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01758",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01758",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01760",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01760",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01761",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01761",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01764",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01764",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01766",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01766",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01770",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01770",
|
||
"Impact": "Low",
|
||
"Public": "20190621"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01779",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01779",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01780",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01780",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01781",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01781",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01782",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01782",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01783",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01783",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01784",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01784",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01785",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01785",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01786",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01786",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01787",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01787",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01788",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01788",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01789",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01789",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01790",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01790",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01791",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01791",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01792",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01792",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01793",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01793",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01798",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01798",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01799",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01799",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01800",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01800",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01802",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01802",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01803",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01803",
|
||
"Impact": "High",
|
||
"Public": "20200110"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01911",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01911",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01912",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01912",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01914",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01914",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01915",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01915",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01916",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01916",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01917",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01917",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01918",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01918",
|
||
"Impact": "Low",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01919",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01919",
|
||
"Impact": "Low",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01961",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01961",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01962",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01962",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01967",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01967",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01968",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01968",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-01969",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-01969",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02034",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02034",
|
||
"Impact": "High",
|
||
"Public": "20200312"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02263",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02263",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02444",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02444",
|
||
"Impact": "Critical",
|
||
"Public": "20200415"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-02857",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20, CWE-358",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02857",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03666",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03666",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03667",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03667",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03668",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03668",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03669",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03669",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03670",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03670",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03671",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03671",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03674",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03674",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03675",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03675",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03715",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03715",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03716",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03716",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03717",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03717",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03718",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03718",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03719",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03719",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03720",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-264",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03720",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03721",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03721",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03722",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03722",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03723",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-345",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03723",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03736",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03736",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03737",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03737",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03738",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03738",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03739",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03739",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03740",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03740",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03741",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03741",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03742",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03742",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03743",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03743",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03744",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03744",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03745",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03745",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03746",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03746",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03747",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03747",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03748",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03748",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03749",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03749",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03750",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03750",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03751",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03751",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03752",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03752",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03753",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03753",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03754",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03754",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03755",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03755",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03756",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03756",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03757",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03757",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03811",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03811",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03832",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03832",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03833",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03833",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03834",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03834",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03835",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03835",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03836",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03836",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03837",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03837",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03839",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03839",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03840",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03840",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03841",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03841",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03842",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-399",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03842",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03843",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03843",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03844",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03844",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03845",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03845",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03846",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03846",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03847",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03847",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03848",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03848",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-03849",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-03849",
|
||
"Impact": "Critical",
|
||
"Public": "20200526"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01061",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01061",
|
||
"Impact": "High",
|
||
"Public": "20191028"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01062",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01062",
|
||
"Impact": "High",
|
||
"Public": "20191212"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01063",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01063",
|
||
"Impact": "High",
|
||
"Public": "20191209"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-01136",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-01136",
|
||
"Impact": "Low",
|
||
"Public": "20191224"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03818",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03818",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-03846",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-254",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-03846",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04927",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04927",
|
||
"Impact": "High",
|
||
"Public": "20200331"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-04937",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04937",
|
||
"Impact": "High",
|
||
"Public": "20200407"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06414",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06414",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-13659",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13660",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13661",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13662",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13663",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13664",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13665",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13666",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13667",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13668",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13669",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13670",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13671",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13673",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13674",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13675",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13676",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13677",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13678",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13679",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13680",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13681",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-732",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13682",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13683",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13685",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13686",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13687",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13688",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13691",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13692",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13693",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13694",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13695",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13697",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13699",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13700",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13701",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13702",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13703",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13704",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13705",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13706",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13707",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13708",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13709",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13710",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13711",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13713",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13714",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13715",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-290",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13716",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13717",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-922",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13718",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13719",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-922",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13720",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13721",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13723",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13724",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13725",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13726",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13727",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-281",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13728",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13729",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13730",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13732",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13734",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13735",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13736",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13737",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13738",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-269",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13739",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13740",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-346",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13741",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13742",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13743",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13744",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13745",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13746",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13747",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13748",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13749",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13750",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13751",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13752",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13753",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13754",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13755",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13756",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13757",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13758",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13759",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13761",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13762",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-667",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13763",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
|
||
"Impact": "Low",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13764",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
|
||
"Impact": "High",
|
||
"Public": "20191210"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13765",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
|
||
"Impact": "Low",
|
||
"Public": "20200103"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13766",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
|
||
"Impact": "Low",
|
||
"Public": "20200103"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-13767",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13767",
|
||
"Impact": "High",
|
||
"Public": "20200110"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-15903",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
|
||
"Impact": "High",
|
||
"Public": "20190904"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-18197",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
|
||
"Impact": "High",
|
||
"Public": "20191018"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-19923",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
|
||
"Impact": "High",
|
||
"Public": "20191224"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-19925",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-434",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
|
||
"Impact": "High",
|
||
"Public": "20191224"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-19926",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
|
||
"Impact": "High",
|
||
"Public": "20191223"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5867",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5868",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5869",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5870",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
|
||
"Impact": "Critical",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5871",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5872",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5873",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5874",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5875",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5876",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5877",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5878",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5879",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
|
||
"Impact": "Low",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5880",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5881",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
|
||
"Impact": "High",
|
||
"Public": "20191125"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-10531",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
|
||
"Impact": "High",
|
||
"Public": "20200312"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6377",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6377",
|
||
"Impact": "High",
|
||
"Public": "20200110"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6378",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6378",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6379",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6379",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6380",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6380",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6381",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6382",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6383",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
|
||
"Impact": "High",
|
||
"Public": "20200227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6384",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
|
||
"Impact": "High",
|
||
"Public": "20200227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6385",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-754",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6386",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
|
||
"Impact": "High",
|
||
"Public": "20200227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6387",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6388",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6389",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6390",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6391",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6392",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6393",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-862",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6394",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6395",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6396",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6397",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6398",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6399",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6400",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6401",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6402",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6403",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6404",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6405",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6406",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6407",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
|
||
"Impact": "High",
|
||
"Public": "20200227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6408",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6409",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6410",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6411",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6412",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
|
||
"Impact": "Low",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6413",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6414",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6415",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6416",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6417",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
|
||
"Impact": "High",
|
||
"Public": "20200211"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6418",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
|
||
"Impact": "High",
|
||
"Public": "20200227"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6419",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
|
||
"Impact": "High",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6420",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6422",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6423",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6424",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6425",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
|
||
"Impact": "Low",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6426",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
|
||
"Impact": "Low",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6427",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6428",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6429",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6430",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-843",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6431",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6432",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6433",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6434",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6435",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6436",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6437",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-Other",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6438",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-209",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6439",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6440",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6441",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6442",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6443",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-345",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6444",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-908",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6445",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6446",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6447",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6448",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6449",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
|
||
"Impact": "High",
|
||
"Public": "20200323"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6450",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6451",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6452",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6453",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
|
||
"Impact": "High",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6454",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6455",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
|
||
"Impact": "High",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6456",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
|
||
"Impact": "Low",
|
||
"Public": "20200413"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6457",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6457",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6458",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6459",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6460",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6461",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6462",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6463",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6464",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6465",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6465",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6466",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6466",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6467",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6467",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6468",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6468",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6469",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6469",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6470",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6470",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6471",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6471",
|
||
"Impact": "Critical",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6472",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6472",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6473",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-203",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6473",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6474",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6474",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6475",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6475",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6476",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6476",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6477",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-59",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6477",
|
||
"Impact": "High",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6478",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6478",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6479",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6479",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6480",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6480",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6481",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6481",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6482",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6482",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6483",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6483",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6484",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6484",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6485",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6485",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6486",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6486",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6487",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6487",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6488",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6488",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6489",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6489",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6490",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-668",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6490",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6491",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6491",
|
||
"Impact": "Low",
|
||
"Public": "20200521"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6499",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
|
||
"Impact": "Low",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6500",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
|
||
"Impact": "Low",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6501",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
|
||
"Impact": "Low",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6502",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-276",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
|
||
"Impact": "Low",
|
||
"Public": "20200603"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6572",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
|
||
"Impact": "High",
|
||
"Public": "20210114"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-6831",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
|
||
"Impact": "Critical",
|
||
"Public": "20200526"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "36815",
|
||
"Href": "https://bugzilla.altlinux.org/36815",
|
||
"Data": "Некорректно отображается пункт программы в меню xfce: название отсутствует"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202441001",
|
||
"Comment": "chromium-gost is earlier than 0:83.0.4103.61-alt2.M90P.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202441002",
|
||
"Comment": "chromium-gost-gnome is earlier than 0:83.0.4103.61-alt2.M90P.1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202441003",
|
||
"Comment": "chromium-gost-kde is earlier than 0:83.0.4103.61-alt2.M90P.1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |