2024-04-16 14:26:14 +00:00

6594 lines
353 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202441",
"Version": "oval:org.altlinux.errata:def:20202441",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2441: package `chromium-gost` update to version 83.0.4103.61-alt2.M90P.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2441",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2441",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02884",
"RefURL": "https://bdu.fstec.ru/vul/2019-02884",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02885",
"RefURL": "https://bdu.fstec.ru/vul/2019-02885",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03643",
"RefURL": "https://bdu.fstec.ru/vul/2019-03643",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04421",
"RefURL": "https://bdu.fstec.ru/vul/2019-04421",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04422",
"RefURL": "https://bdu.fstec.ru/vul/2019-04422",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04423",
"RefURL": "https://bdu.fstec.ru/vul/2019-04423",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04424",
"RefURL": "https://bdu.fstec.ru/vul/2019-04424",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04425",
"RefURL": "https://bdu.fstec.ru/vul/2019-04425",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04426",
"RefURL": "https://bdu.fstec.ru/vul/2019-04426",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04508",
"RefURL": "https://bdu.fstec.ru/vul/2019-04508",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00168",
"RefURL": "https://bdu.fstec.ru/vul/2020-00168",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00171",
"RefURL": "https://bdu.fstec.ru/vul/2020-00171",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00867",
"RefURL": "https://bdu.fstec.ru/vul/2020-00867",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01341",
"RefURL": "https://bdu.fstec.ru/vul/2020-01341",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01400",
"RefURL": "https://bdu.fstec.ru/vul/2020-01400",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01401",
"RefURL": "https://bdu.fstec.ru/vul/2020-01401",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01403",
"RefURL": "https://bdu.fstec.ru/vul/2020-01403",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01424",
"RefURL": "https://bdu.fstec.ru/vul/2020-01424",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01433",
"RefURL": "https://bdu.fstec.ru/vul/2020-01433",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01434",
"RefURL": "https://bdu.fstec.ru/vul/2020-01434",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01438",
"RefURL": "https://bdu.fstec.ru/vul/2020-01438",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01439",
"RefURL": "https://bdu.fstec.ru/vul/2020-01439",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01440",
"RefURL": "https://bdu.fstec.ru/vul/2020-01440",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01441",
"RefURL": "https://bdu.fstec.ru/vul/2020-01441",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01442",
"RefURL": "https://bdu.fstec.ru/vul/2020-01442",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01443",
"RefURL": "https://bdu.fstec.ru/vul/2020-01443",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01444",
"RefURL": "https://bdu.fstec.ru/vul/2020-01444",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01445",
"RefURL": "https://bdu.fstec.ru/vul/2020-01445",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01452",
"RefURL": "https://bdu.fstec.ru/vul/2020-01452",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01453",
"RefURL": "https://bdu.fstec.ru/vul/2020-01453",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01460",
"RefURL": "https://bdu.fstec.ru/vul/2020-01460",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01465",
"RefURL": "https://bdu.fstec.ru/vul/2020-01465",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01466",
"RefURL": "https://bdu.fstec.ru/vul/2020-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01467",
"RefURL": "https://bdu.fstec.ru/vul/2020-01467",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01476",
"RefURL": "https://bdu.fstec.ru/vul/2020-01476",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01477",
"RefURL": "https://bdu.fstec.ru/vul/2020-01477",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01479",
"RefURL": "https://bdu.fstec.ru/vul/2020-01479",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01483",
"RefURL": "https://bdu.fstec.ru/vul/2020-01483",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01487",
"RefURL": "https://bdu.fstec.ru/vul/2020-01487",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01489",
"RefURL": "https://bdu.fstec.ru/vul/2020-01489",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01493",
"RefURL": "https://bdu.fstec.ru/vul/2020-01493",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01495",
"RefURL": "https://bdu.fstec.ru/vul/2020-01495",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01498",
"RefURL": "https://bdu.fstec.ru/vul/2020-01498",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01502",
"RefURL": "https://bdu.fstec.ru/vul/2020-01502",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01503",
"RefURL": "https://bdu.fstec.ru/vul/2020-01503",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01505",
"RefURL": "https://bdu.fstec.ru/vul/2020-01505",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01506",
"RefURL": "https://bdu.fstec.ru/vul/2020-01506",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01509",
"RefURL": "https://bdu.fstec.ru/vul/2020-01509",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01511",
"RefURL": "https://bdu.fstec.ru/vul/2020-01511",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01518",
"RefURL": "https://bdu.fstec.ru/vul/2020-01518",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01519",
"RefURL": "https://bdu.fstec.ru/vul/2020-01519",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01522",
"RefURL": "https://bdu.fstec.ru/vul/2020-01522",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01604",
"RefURL": "https://bdu.fstec.ru/vul/2020-01604",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01605",
"RefURL": "https://bdu.fstec.ru/vul/2020-01605",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01606",
"RefURL": "https://bdu.fstec.ru/vul/2020-01606",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01607",
"RefURL": "https://bdu.fstec.ru/vul/2020-01607",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01608",
"RefURL": "https://bdu.fstec.ru/vul/2020-01608",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01609",
"RefURL": "https://bdu.fstec.ru/vul/2020-01609",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01610",
"RefURL": "https://bdu.fstec.ru/vul/2020-01610",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01611",
"RefURL": "https://bdu.fstec.ru/vul/2020-01611",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01612",
"RefURL": "https://bdu.fstec.ru/vul/2020-01612",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01613",
"RefURL": "https://bdu.fstec.ru/vul/2020-01613",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01614",
"RefURL": "https://bdu.fstec.ru/vul/2020-01614",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01615",
"RefURL": "https://bdu.fstec.ru/vul/2020-01615",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01616",
"RefURL": "https://bdu.fstec.ru/vul/2020-01616",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01617",
"RefURL": "https://bdu.fstec.ru/vul/2020-01617",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01618",
"RefURL": "https://bdu.fstec.ru/vul/2020-01618",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01619",
"RefURL": "https://bdu.fstec.ru/vul/2020-01619",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01620",
"RefURL": "https://bdu.fstec.ru/vul/2020-01620",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01621",
"RefURL": "https://bdu.fstec.ru/vul/2020-01621",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01622",
"RefURL": "https://bdu.fstec.ru/vul/2020-01622",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01623",
"RefURL": "https://bdu.fstec.ru/vul/2020-01623",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01624",
"RefURL": "https://bdu.fstec.ru/vul/2020-01624",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01625",
"RefURL": "https://bdu.fstec.ru/vul/2020-01625",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01626",
"RefURL": "https://bdu.fstec.ru/vul/2020-01626",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01627",
"RefURL": "https://bdu.fstec.ru/vul/2020-01627",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01628",
"RefURL": "https://bdu.fstec.ru/vul/2020-01628",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01629",
"RefURL": "https://bdu.fstec.ru/vul/2020-01629",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01630",
"RefURL": "https://bdu.fstec.ru/vul/2020-01630",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01631",
"RefURL": "https://bdu.fstec.ru/vul/2020-01631",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01634",
"RefURL": "https://bdu.fstec.ru/vul/2020-01634",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01635",
"RefURL": "https://bdu.fstec.ru/vul/2020-01635",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01636",
"RefURL": "https://bdu.fstec.ru/vul/2020-01636",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01637",
"RefURL": "https://bdu.fstec.ru/vul/2020-01637",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01638",
"RefURL": "https://bdu.fstec.ru/vul/2020-01638",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01639",
"RefURL": "https://bdu.fstec.ru/vul/2020-01639",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01644",
"RefURL": "https://bdu.fstec.ru/vul/2020-01644",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01646",
"RefURL": "https://bdu.fstec.ru/vul/2020-01646",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01671",
"RefURL": "https://bdu.fstec.ru/vul/2020-01671",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01672",
"RefURL": "https://bdu.fstec.ru/vul/2020-01672",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01673",
"RefURL": "https://bdu.fstec.ru/vul/2020-01673",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01674",
"RefURL": "https://bdu.fstec.ru/vul/2020-01674",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01684",
"RefURL": "https://bdu.fstec.ru/vul/2020-01684",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01693",
"RefURL": "https://bdu.fstec.ru/vul/2020-01693",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01694",
"RefURL": "https://bdu.fstec.ru/vul/2020-01694",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01695",
"RefURL": "https://bdu.fstec.ru/vul/2020-01695",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01696",
"RefURL": "https://bdu.fstec.ru/vul/2020-01696",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01697",
"RefURL": "https://bdu.fstec.ru/vul/2020-01697",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01698",
"RefURL": "https://bdu.fstec.ru/vul/2020-01698",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01699",
"RefURL": "https://bdu.fstec.ru/vul/2020-01699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01700",
"RefURL": "https://bdu.fstec.ru/vul/2020-01700",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01701",
"RefURL": "https://bdu.fstec.ru/vul/2020-01701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01702",
"RefURL": "https://bdu.fstec.ru/vul/2020-01702",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01703",
"RefURL": "https://bdu.fstec.ru/vul/2020-01703",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01704",
"RefURL": "https://bdu.fstec.ru/vul/2020-01704",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01705",
"RefURL": "https://bdu.fstec.ru/vul/2020-01705",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01706",
"RefURL": "https://bdu.fstec.ru/vul/2020-01706",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01724",
"RefURL": "https://bdu.fstec.ru/vul/2020-01724",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01725",
"RefURL": "https://bdu.fstec.ru/vul/2020-01725",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01748",
"RefURL": "https://bdu.fstec.ru/vul/2020-01748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01750",
"RefURL": "https://bdu.fstec.ru/vul/2020-01750",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01751",
"RefURL": "https://bdu.fstec.ru/vul/2020-01751",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01754",
"RefURL": "https://bdu.fstec.ru/vul/2020-01754",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01755",
"RefURL": "https://bdu.fstec.ru/vul/2020-01755",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01758",
"RefURL": "https://bdu.fstec.ru/vul/2020-01758",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01760",
"RefURL": "https://bdu.fstec.ru/vul/2020-01760",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01761",
"RefURL": "https://bdu.fstec.ru/vul/2020-01761",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01764",
"RefURL": "https://bdu.fstec.ru/vul/2020-01764",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01766",
"RefURL": "https://bdu.fstec.ru/vul/2020-01766",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01770",
"RefURL": "https://bdu.fstec.ru/vul/2020-01770",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01779",
"RefURL": "https://bdu.fstec.ru/vul/2020-01779",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01780",
"RefURL": "https://bdu.fstec.ru/vul/2020-01780",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01781",
"RefURL": "https://bdu.fstec.ru/vul/2020-01781",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01782",
"RefURL": "https://bdu.fstec.ru/vul/2020-01782",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01783",
"RefURL": "https://bdu.fstec.ru/vul/2020-01783",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01784",
"RefURL": "https://bdu.fstec.ru/vul/2020-01784",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01785",
"RefURL": "https://bdu.fstec.ru/vul/2020-01785",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01786",
"RefURL": "https://bdu.fstec.ru/vul/2020-01786",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01787",
"RefURL": "https://bdu.fstec.ru/vul/2020-01787",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01788",
"RefURL": "https://bdu.fstec.ru/vul/2020-01788",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01789",
"RefURL": "https://bdu.fstec.ru/vul/2020-01789",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01790",
"RefURL": "https://bdu.fstec.ru/vul/2020-01790",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01791",
"RefURL": "https://bdu.fstec.ru/vul/2020-01791",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01792",
"RefURL": "https://bdu.fstec.ru/vul/2020-01792",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01793",
"RefURL": "https://bdu.fstec.ru/vul/2020-01793",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01798",
"RefURL": "https://bdu.fstec.ru/vul/2020-01798",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01799",
"RefURL": "https://bdu.fstec.ru/vul/2020-01799",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01800",
"RefURL": "https://bdu.fstec.ru/vul/2020-01800",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01802",
"RefURL": "https://bdu.fstec.ru/vul/2020-01802",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01803",
"RefURL": "https://bdu.fstec.ru/vul/2020-01803",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01911",
"RefURL": "https://bdu.fstec.ru/vul/2020-01911",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01912",
"RefURL": "https://bdu.fstec.ru/vul/2020-01912",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01914",
"RefURL": "https://bdu.fstec.ru/vul/2020-01914",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01915",
"RefURL": "https://bdu.fstec.ru/vul/2020-01915",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01916",
"RefURL": "https://bdu.fstec.ru/vul/2020-01916",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01917",
"RefURL": "https://bdu.fstec.ru/vul/2020-01917",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01918",
"RefURL": "https://bdu.fstec.ru/vul/2020-01918",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01919",
"RefURL": "https://bdu.fstec.ru/vul/2020-01919",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01961",
"RefURL": "https://bdu.fstec.ru/vul/2020-01961",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01962",
"RefURL": "https://bdu.fstec.ru/vul/2020-01962",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01967",
"RefURL": "https://bdu.fstec.ru/vul/2020-01967",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01968",
"RefURL": "https://bdu.fstec.ru/vul/2020-01968",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01969",
"RefURL": "https://bdu.fstec.ru/vul/2020-01969",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02034",
"RefURL": "https://bdu.fstec.ru/vul/2020-02034",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02263",
"RefURL": "https://bdu.fstec.ru/vul/2020-02263",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02444",
"RefURL": "https://bdu.fstec.ru/vul/2020-02444",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02857",
"RefURL": "https://bdu.fstec.ru/vul/2020-02857",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03666",
"RefURL": "https://bdu.fstec.ru/vul/2020-03666",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03667",
"RefURL": "https://bdu.fstec.ru/vul/2020-03667",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03668",
"RefURL": "https://bdu.fstec.ru/vul/2020-03668",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03669",
"RefURL": "https://bdu.fstec.ru/vul/2020-03669",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03670",
"RefURL": "https://bdu.fstec.ru/vul/2020-03670",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03671",
"RefURL": "https://bdu.fstec.ru/vul/2020-03671",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03674",
"RefURL": "https://bdu.fstec.ru/vul/2020-03674",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03675",
"RefURL": "https://bdu.fstec.ru/vul/2020-03675",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03715",
"RefURL": "https://bdu.fstec.ru/vul/2020-03715",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03716",
"RefURL": "https://bdu.fstec.ru/vul/2020-03716",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03717",
"RefURL": "https://bdu.fstec.ru/vul/2020-03717",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03718",
"RefURL": "https://bdu.fstec.ru/vul/2020-03718",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03719",
"RefURL": "https://bdu.fstec.ru/vul/2020-03719",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03720",
"RefURL": "https://bdu.fstec.ru/vul/2020-03720",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03721",
"RefURL": "https://bdu.fstec.ru/vul/2020-03721",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03722",
"RefURL": "https://bdu.fstec.ru/vul/2020-03722",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03723",
"RefURL": "https://bdu.fstec.ru/vul/2020-03723",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03736",
"RefURL": "https://bdu.fstec.ru/vul/2020-03736",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03737",
"RefURL": "https://bdu.fstec.ru/vul/2020-03737",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03738",
"RefURL": "https://bdu.fstec.ru/vul/2020-03738",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03739",
"RefURL": "https://bdu.fstec.ru/vul/2020-03739",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03740",
"RefURL": "https://bdu.fstec.ru/vul/2020-03740",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03741",
"RefURL": "https://bdu.fstec.ru/vul/2020-03741",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03742",
"RefURL": "https://bdu.fstec.ru/vul/2020-03742",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03743",
"RefURL": "https://bdu.fstec.ru/vul/2020-03743",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03744",
"RefURL": "https://bdu.fstec.ru/vul/2020-03744",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03745",
"RefURL": "https://bdu.fstec.ru/vul/2020-03745",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03746",
"RefURL": "https://bdu.fstec.ru/vul/2020-03746",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03747",
"RefURL": "https://bdu.fstec.ru/vul/2020-03747",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03748",
"RefURL": "https://bdu.fstec.ru/vul/2020-03748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03749",
"RefURL": "https://bdu.fstec.ru/vul/2020-03749",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03750",
"RefURL": "https://bdu.fstec.ru/vul/2020-03750",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03751",
"RefURL": "https://bdu.fstec.ru/vul/2020-03751",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03752",
"RefURL": "https://bdu.fstec.ru/vul/2020-03752",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03753",
"RefURL": "https://bdu.fstec.ru/vul/2020-03753",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03754",
"RefURL": "https://bdu.fstec.ru/vul/2020-03754",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03755",
"RefURL": "https://bdu.fstec.ru/vul/2020-03755",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03756",
"RefURL": "https://bdu.fstec.ru/vul/2020-03756",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03757",
"RefURL": "https://bdu.fstec.ru/vul/2020-03757",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03811",
"RefURL": "https://bdu.fstec.ru/vul/2020-03811",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03832",
"RefURL": "https://bdu.fstec.ru/vul/2020-03832",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03833",
"RefURL": "https://bdu.fstec.ru/vul/2020-03833",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03834",
"RefURL": "https://bdu.fstec.ru/vul/2020-03834",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03835",
"RefURL": "https://bdu.fstec.ru/vul/2020-03835",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03836",
"RefURL": "https://bdu.fstec.ru/vul/2020-03836",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03837",
"RefURL": "https://bdu.fstec.ru/vul/2020-03837",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03839",
"RefURL": "https://bdu.fstec.ru/vul/2020-03839",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03840",
"RefURL": "https://bdu.fstec.ru/vul/2020-03840",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03841",
"RefURL": "https://bdu.fstec.ru/vul/2020-03841",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03842",
"RefURL": "https://bdu.fstec.ru/vul/2020-03842",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03843",
"RefURL": "https://bdu.fstec.ru/vul/2020-03843",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03844",
"RefURL": "https://bdu.fstec.ru/vul/2020-03844",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03845",
"RefURL": "https://bdu.fstec.ru/vul/2020-03845",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03846",
"RefURL": "https://bdu.fstec.ru/vul/2020-03846",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03847",
"RefURL": "https://bdu.fstec.ru/vul/2020-03847",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03848",
"RefURL": "https://bdu.fstec.ru/vul/2020-03848",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03849",
"RefURL": "https://bdu.fstec.ru/vul/2020-03849",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01061",
"RefURL": "https://bdu.fstec.ru/vul/2021-01061",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01062",
"RefURL": "https://bdu.fstec.ru/vul/2021-01062",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01063",
"RefURL": "https://bdu.fstec.ru/vul/2021-01063",
"Source": "BDU"
},
{
"RefID": "BDU:2021-01136",
"RefURL": "https://bdu.fstec.ru/vul/2021-01136",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03818",
"RefURL": "https://bdu.fstec.ru/vul/2021-03818",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03846",
"RefURL": "https://bdu.fstec.ru/vul/2021-03846",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04927",
"RefURL": "https://bdu.fstec.ru/vul/2021-04927",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04937",
"RefURL": "https://bdu.fstec.ru/vul/2021-04937",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06414",
"RefURL": "https://bdu.fstec.ru/vul/2021-06414",
"Source": "BDU"
},
{
"RefID": "CVE-2019-13659",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13660",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13661",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13662",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13663",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13664",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13665",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13666",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13667",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13668",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13669",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13670",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13671",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13673",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13674",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13675",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13676",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13677",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13678",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13679",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13680",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13681",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13682",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13683",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13685",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13686",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13687",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13688",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13691",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13692",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13693",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13694",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13695",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13696",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13697",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13699",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13700",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13701",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13703",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13704",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13705",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13706",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13708",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13709",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13710",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13711",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13713",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13715",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13716",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13717",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13719",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13720",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13721",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13723",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13727",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13741",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13742",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13745",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13747",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13748",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13749",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13751",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13752",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13753",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13759",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13761",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13765",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13766",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13767",
"Source": "CVE"
},
{
"RefID": "CVE-2019-15903",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Source": "CVE"
},
{
"RefID": "CVE-2019-18197",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19925",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19926",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5867",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5868",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5869",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5870",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5871",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5873",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5875",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5876",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5877",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5878",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5879",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5880",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5881",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
"Source": "CVE"
},
{
"RefID": "CVE-2020-10531",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6377",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6377",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6378",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6378",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6379",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6379",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6380",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6380",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6381",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6382",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6383",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6384",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6385",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6388",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6389",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6390",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6391",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6392",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6393",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6394",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6395",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6396",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6397",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6398",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6399",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6400",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6401",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6403",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6404",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6405",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6409",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6414",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6415",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6416",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6418",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6419",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6420",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6422",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6423",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6424",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6425",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6426",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6427",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6428",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6429",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6430",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6431",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6432",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6433",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6434",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6435",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6436",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6437",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6438",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6439",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6440",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6441",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6442",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6443",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6444",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6445",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6446",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6447",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6448",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6449",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6450",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6451",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6452",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6453",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6454",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6455",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6456",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6457",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6457",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6461",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6463",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6465",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6465",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6466",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6466",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6467",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6467",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6468",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6468",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6469",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6469",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6470",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6470",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6471",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6471",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6472",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6472",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6473",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6473",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6474",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6474",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6475",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6475",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6476",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6476",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6477",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6477",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6478",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6478",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6479",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6479",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6480",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6480",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6481",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6481",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6482",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6482",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6483",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6483",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6484",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6484",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6485",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6485",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6486",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6486",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6487",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6487",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6488",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6488",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6489",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6489",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6490",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6490",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6491",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6491",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6499",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6500",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6501",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6502",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6831",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium-gost to version 83.0.4103.61-alt2.M90P.1. \nSecurity Fix(es):\n\n * BDU:2019-02884: Уязвимость компонента ExecuteFieldAction обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02885: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-03643: Уязвимость библиотеки для анализа XML-файлов libexpat, связанная с неверным ограничением xml-ссылок на внешние объекты, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04421: Уязвимость расширения Color Enhancer браузера Google Chrome, позволяющая нарушителю изменить данные HTML-страницы\n\n * BDU:2019-04422: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04423: Уязвимость браузера Google Chrome, связанная с неправильной авторизацией, позволяющая нарушителю обойти ограничения навигации\n\n * BDU:2019-04424: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04425: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2019-04426: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю скрыть пользовательский интерфейс безопасности\n\n * BDU:2019-04508: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-00168: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-00171: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2020-00867: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01341: Уязвимость функции xsltCopyText (transform.c) библиотеки libxslt, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2020-01400: Уязвимость дебаггера Skia браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01401: Уязвимость службы Bluetooth браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01403: Уязвимость службы Bluetooth браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01424: Уязвимость механизма ввода данных в Blink браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01433: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01434: Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01438: Уязвимость механизма обработки внешних протоколов браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01439: Уязвимость механизма обработки файлов cookie браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01440: Уязвимость механизма обработки аудио файлове браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01441: Уязвимость механизма в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01442: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01443: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01444: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01445: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01452: Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01453: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику оказать воздействие на целостность данных\n\n * BDU:2020-01460: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01465: Уязвимость механизма рендеринга в Android браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01466: Уязвимость инструментов разработки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01467: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01476: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01477: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с чтение за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01479: Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01483: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01487: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01489: Уязвимость компонента AppCache браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01493: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01495: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01498: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01502: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных\n\n * BDU:2020-01503: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01505: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01506: Уязвимость компонента SQLite браузера Google Chrome, связанная с чтением за границами буфера, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01509: Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01511: Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01518: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность\n\n * BDU:2020-01519: Уязвимость компонента SQLite браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01522: Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01604: Уязвимость реализации протокола WebRTC браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01605: Уязвимость встроенной базы данных IndexedDB браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01606: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01607: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01608: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01609: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01610: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01611: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01612: Уязвимость реализации протокола TLS браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01613: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01614: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01615: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01616: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01617: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01618: Уязвимость адресной строки Omnibox инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01619: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01620: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01621: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01622: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01623: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01624: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01625: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01626: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01627: Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01628: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01629: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01630: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01631: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01634: Уязвимость механизма навигации в Android браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01635: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01636: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01637: Уязвимость политики безопасности расширений браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01638: Уязвимость политики безопасности расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01639: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01644: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01646: Уязвимость механизма инициализации данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01671: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01672: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01673: Уязвимость инструментов разработчика браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01674: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01684: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01693: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01694: Уязвимость браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01695: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01696: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01697: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01698: Уязвимость браузера Google Chrome, связанная с доступом к ресурсу с использованием несовместимого типа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01699: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01700: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01701: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01702: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01703: Уязвимость браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-01704: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01705: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01706: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01724: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01725: Уязвимость системы высокопроизводительного рендеринга SwiftShader браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-01748: Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01750: Уязвимость браузера Google Chrome, связанная с выходом операции за границы памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01751: Уязвимость браузера Google Chrome, связанная с неправильным применением политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01754: Уязвимость библиотеки передачи сообщений Mojo браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01755: Уязвимость расширений браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01758: Уязвимость браузера Google Chrome, связанная с неправильной настройкой политики безопасности, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01760: Уязвимость браузера Google Chrome, связанная с недостаточной фильтрацией в URL строке, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01761: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01764: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01766: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-01770: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01779: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01780: Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01781: Уязвимость браузера Google Chrome, связанная с неправильным контролем доступа к критическому ресурсу, позволяющая нарушителю получить несанкционированный доступ\n\n * BDU:2020-01782: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01783: Уязвимость браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01784: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01785: Уязвимость установщика браузера Google Chrome, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01786: Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01787: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01788: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01789: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01790: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-01791: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01792: Уязвимость браузера Google Chrome, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01793: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01798: Уязвимость пользовательского интерфейса в интерстициалах браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01799: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01800: Уязвимость механизма загрузки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01802: Уязвимость функции типизации в JavaScript браузера Google Chrome позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01803: Уязвимость механизма подбора музыки браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01911: Уязвимость браузера Google Chrome, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-01912: Уязвимость компонента WebAudio браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01914: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01915: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01916: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01917: Уязвимость компонента аудио браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01918: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01919: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2020-01961: Уязвимость компонента мультимедиа браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01962: Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-01967: Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01968: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-01969: Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02034: Уязвимость функции UnicodeString::doAppend (unistr.cpp) библиотеки International Components for Unicode, связанная с целочисленным переполнением структуры данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных\n\n * BDU:2020-02263: Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю осуществить выход из изолированной программной среды\n\n * BDU:2020-02444: Уязвимость функции распознавания речи браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-02857: Уязвимость подсистемы media браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента\n\n * BDU:2020-03666: Уязвимость компонента Audio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03667: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03668: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03669: Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03670: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность\n\n * BDU:2020-03671: Уязвимость установщика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03674: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03675: Уязвимость компонента devtools браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03715: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с ошибками применения правила в расширениях, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03716: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03717: Уязвимость реализации WebView пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03718: Уязвимость расширений браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03719: Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03720: Уязвимость расширений браузера Google Chrome, связанная с недостатком механизма контроля привилегий и средств управления доступом, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03721: Уязвимость компонента Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03722: Уязвимость кэша приложения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03723: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03736: Уязвимость модуля WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03737: Уязвимость доверенных типов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03738: Уязвимость доверенных типов браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03739: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03740: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03741: Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03742: Уязвимость модуля WebSQL браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03743: Уязвимость браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03744: Уязвимость модуля PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03745: Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03746: Уязвимость механизма форматирования URL-адресов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03747: Уязвимость хранилища браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03748: Уязвимость планировщика заданий браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03749: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03750: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03751: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03752: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03753: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03754: Уязвимость буфера обмена браузера Google Chrome, связанная с недостатками используемых мер по защите структур веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03755: Уязвимость инструментов разработчика браузера Google Chrome , позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03756: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03757: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03811: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03832: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03833: Уязвимость модуля TabStrip браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03834: Уязвимость полноэкранного режима браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03835: Уязвимость механизма общего доступа браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03836: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03837: Уязвимость механизма форматирования URL-адресов браузера Google Chrome, связанная с ошибкой механизма управления ресурсами системы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03839: Уязвимость инструментов разработчика браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03840: Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03841: Уязвимость компонента ChromeDriver браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03842: Уязвимость навигационной системы браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03843: Уязвимость компонента media router браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03844: Уязвимость политики загрузок браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03845: Уязвимость политики загрузок браузера Google Chrome, связанная с недостатком механизма стандартных разрешений, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03846: Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03847: Уязвимость загрузчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2020-03848: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03849: Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-01061: Уязвимость функции распознавания речи SpeechRecognizerImpl::Abort веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01062: Уязвимость компонента распознавания речи Speech Recognizer веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-01063: Уязвимость расширений веб-браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2021-01136: Уязвимость полноэкранного режима веб-браузера Google Chrome, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-03818: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности при помощи специально созданного доменного имени\n\n * BDU:2021-03846: Уязвимость службы Safe Browsing веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2021-04927: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-04937: Уязвимость компонента Media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06414: Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения\n\n * CVE-2019-13659: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13660: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13661: UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.\n\n * CVE-2019-13662: Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13663: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13664: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13665: Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.\n\n * CVE-2019-13666: Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13667: Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13668: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13669: Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13670: Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13671: UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13673: Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13674: IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13675: Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13676: Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13677: Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13678: Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13679: Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.\n\n * CVE-2019-13680: Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.\n\n * CVE-2019-13681: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13682: Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13683: Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13685: Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13686: Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13687: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13688: Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13691: Insufficient validation of untrusted input in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13692: Insufficient policy enforcement in reader mode in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13693: Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13694: Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13695: Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13696: Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13697: Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13699: Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13700: Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13701: Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13702: Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.\n\n * CVE-2019-13703: Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13704: Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-13705: Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.\n\n * CVE-2019-13706: Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13707: Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.\n\n * CVE-2019-13708: Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13709: Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13710: Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.\n\n * CVE-2019-13711: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13713: Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13714: Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.\n\n * CVE-2019-13715: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13716: Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13717: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13718: Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13719: Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.\n\n * CVE-2019-13720: Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13721: Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13723: Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13724: Out of bounds memory access in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13725: Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13726: Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13727: Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13728: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13729: Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13730: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13732: Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13734: Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13735: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-13736: Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13737: Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13738: Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13739: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13740: Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13741: Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.\n\n * CVE-2019-13742: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-13743: Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13744: Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13745: Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13746: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13747: Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13748: Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13749: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13750: Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.\n\n * CVE-2019-13751: Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13752: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13753: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13754: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13755: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13756: Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13757: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13758: Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13759: Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13761: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13762: Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.\n\n * CVE-2019-13763: Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13764: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13765: Use-after-free in content delivery manager in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13766: Use-after-free in accessibility in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13767: Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-15903: In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.\n\n * CVE-2019-18197: In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.\n\n * CVE-2019-19923: flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n\n * CVE-2019-19925: zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n\n * CVE-2019-19926: multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n\n * CVE-2019-5867: Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5868: Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-5869: Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5870: Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2019-5871: Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5872: Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5873: Insufficient policy validation in navigation in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5874: Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-5875: Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-5876: Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5877: Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5878: Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5879: Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.\n\n * CVE-2019-5880: Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-5881: Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.\n\n * CVE-2020-6377: Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6378: Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6379: Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6380: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.\n\n * CVE-2020-6381: Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6382: Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6383: Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6384: Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6385: Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2020-6386: Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6387: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6388: Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6389: Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.\n\n * CVE-2020-6390: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6391: Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6392: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6393: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6394: Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6395: Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6396: Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6397: Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6398: Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6399: Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6400: Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6401: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6402: Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.\n\n * CVE-2020-6403: Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6404: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6405: Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6406: Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6407: Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6408: Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.\n\n * CVE-2020-6409: Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.\n\n * CVE-2020-6410: Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.\n\n * CVE-2020-6411: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6412: Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2020-6413: Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.\n\n * CVE-2020-6414: Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6415: Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6416: Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6417: Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.\n\n * CVE-2020-6418: Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6419: Out of bounds write in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6420: Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2020-6422: Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6423: Use after free in audio in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6424: Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6425: Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.149 allowed an attacker who convinced a user to install a malicious extension to bypass site isolation via a crafted Chrome Extension.\n\n * CVE-2020-6426: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6427: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6428: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6429: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6430: Type Confusion in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6431: Insufficient policy enforcement in full screen in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6432: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6433: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6434: Use after free in devtools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6435: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6436: Use after free in window management in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6437: Inappropriate implementation in WebView in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to spoof security UI via a crafted application.\n\n * CVE-2020-6438: Insufficient policy enforcement in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.\n\n * CVE-2020-6439: Insufficient policy enforcement in navigations in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6440: Inappropriate implementation in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.\n\n * CVE-2020-6441: Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page.\n\n * CVE-2020-6442: Inappropriate implementation in cache in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6443: Insufficient data validation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to execute arbitrary code via a crafted HTML page.\n\n * CVE-2020-6444: Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6445: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6446: Insufficient policy enforcement in trusted types in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6447: Inappropriate implementation in developer tools in Google Chrome prior to 81.0.4044.92 allowed a remote attacker who had convinced the user to use devtools to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6448: Use after free in V8 in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6449: Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6450: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6451: Use after free in WebAudio in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6452: Heap buffer overflow in media in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6453: Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.162 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6454: Use after free in extensions in Google Chrome prior to 81.0.4044.92 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.\n\n * CVE-2020-6455: Out of bounds read in WebSQL in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6456: Insufficient validation of untrusted input in clipboard in Google Chrome prior to 81.0.4044.92 allowed a local attacker to bypass site isolation via crafted clipboard contents.\n\n * CVE-2020-6457: Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6458: Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6459: Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6460: Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2020-6461: Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6462: Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6463: Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6464: Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6465: Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6466: Use after free in media in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6467: Use after free in WebRTC in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6468: Type confusion in V8 in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6469: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6470: Insufficient validation of untrusted input in clipboard in Google Chrome prior to 83.0.4103.61 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via crafted clipboard contents.\n\n * CVE-2020-6471: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.\n\n * CVE-2020-6472: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory or disk via a crafted Chrome Extension.\n\n * CVE-2020-6473: Insufficient policy enforcement in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2020-6474: Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6475: Incorrect implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6476: Insufficient policy enforcement in tab strip in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6477: Inappropriate implementation in installer in Google Chrome on OS X prior to 83.0.4103.61 allowed a local attacker to perform privilege escalation via a crafted file.\n\n * CVE-2020-6478: Inappropriate implementation in full screen in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6479: Inappropriate implementation in sharing in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6480: Insufficient policy enforcement in enterprise in Google Chrome prior to 83.0.4103.61 allowed a local attacker to bypass navigation restrictions via UI actions.\n\n * CVE-2020-6481: Insufficient policy enforcement in URL formatting in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2020-6482: Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.61 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2020-6483: Insufficient policy enforcement in payments in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6484: Insufficient data validation in ChromeDriver in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted request.\n\n * CVE-2020-6485: Insufficient data validation in media router in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6486: Insufficient policy enforcement in navigations in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6487: Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6488: Insufficient policy enforcement in downloads in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2020-6489: Inappropriate implementation in developer tools in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had convinced the user to take certain actions in developer tools to obtain potentially sensitive information from disk via a crafted HTML page.\n\n * CVE-2020-6490: Insufficient data validation in loader in Google Chrome prior to 83.0.4103.61 allowed a remote attacker who had been able to write to disk to leak cross-origin data via a crafted HTML page.\n\n * CVE-2020-6491: Insufficient data validation in site information in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to spoof security UI via a crafted domain name.\n\n * CVE-2020-6499: Inappropriate implementation in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass AppCache security restrictions via a crafted HTML page.\n\n * CVE-2020-6500: Inappropriate implementation in interstitials in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2020-6501: Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2020-6502: Incorrect implementation in permissions in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2020-6572: Use after free in Media in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2020-6831: A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 68.8, Firefox \u003c 76, and Thunderbird \u003c 68.8.0.\n\n * #36815: Некорректно отображается пункт программы в меню xfce: название отсутствует",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-07-23"
},
"Updated": {
"Date": "2020-07-23"
},
"BDUs": [
{
"ID": "BDU:2019-02884",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-02884",
"Impact": "High",
"Public": "20190806"
},
{
"ID": "BDU:2019-02885",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-02885",
"Impact": "High",
"Public": "20190806"
},
{
"ID": "BDU:2019-03643",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-611",
"Href": "https://bdu.fstec.ru/vul/2019-03643",
"Impact": "High",
"Public": "20190828"
},
{
"ID": "BDU:2019-04421",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2019-04421",
"Impact": "Low",
"Public": "20190710"
},
{
"ID": "BDU:2019-04422",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2019-04422",
"Impact": "Low",
"Public": "20170831"
},
{
"ID": "BDU:2019-04423",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://bdu.fstec.ru/vul/2019-04423",
"Impact": "Low",
"Public": "20190919"
},
{
"ID": "BDU:2019-04424",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://bdu.fstec.ru/vul/2019-04424",
"Impact": "Low",
"Public": "20180503"
},
{
"ID": "BDU:2019-04425",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04425",
"Impact": "Low",
"Public": "20180720"
},
{
"ID": "BDU:2019-04426",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://bdu.fstec.ru/vul/2019-04426",
"Impact": "Low",
"Public": "20190131"
},
{
"ID": "BDU:2019-04508",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04508",
"Impact": "High",
"Public": "20191031"
},
{
"ID": "BDU:2020-00168",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00168",
"Impact": "High",
"Public": "20191012"
},
{
"ID": "BDU:2020-00171",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-00171",
"Impact": "Low",
"Public": "20190626"
},
{
"ID": "BDU:2020-00867",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-00867",
"Impact": "Low",
"Public": "20200224"
},
{
"ID": "BDU:2020-01341",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01341",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "BDU:2020-01400",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01400",
"Impact": "High",
"Public": "20190621"
},
{
"ID": "BDU:2020-01401",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01401",
"Impact": "High",
"Public": "20191110"
},
{
"ID": "BDU:2020-01403",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01403",
"Impact": "High",
"Public": "20191110"
},
{
"ID": "BDU:2020-01424",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01424",
"Impact": "High",
"Public": "20200108"
},
{
"ID": "BDU:2020-01433",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01433",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01434",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01434",
"Impact": "High",
"Public": "20191209"
},
{
"ID": "BDU:2020-01438",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01438",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01439",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01439",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01440",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01440",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01441",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01441",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01442",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01442",
"Impact": "High",
"Public": "20191129"
},
{
"ID": "BDU:2020-01443",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01443",
"Impact": "High",
"Public": "20191129"
},
{
"ID": "BDU:2020-01444",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01444",
"Impact": "High",
"Public": "20191129"
},
{
"ID": "BDU:2020-01445",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01445",
"Impact": "High",
"Public": "20191129"
},
{
"ID": "BDU:2020-01452",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2020-01452",
"Impact": "High",
"Public": "20191222"
},
{
"ID": "BDU:2020-01453",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01453",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01460",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01460",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01465",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01465",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "BDU:2020-01466",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01466",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01467",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01467",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01476",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01476",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01477",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01477",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01479",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01479",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01483",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01483",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01487",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://bdu.fstec.ru/vul/2020-01487",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01489",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01489",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01493",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01493",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01495",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01495",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01498",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01498",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01502",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01502",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01503",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01503",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01505",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01505",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01506",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01506",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01509",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01509",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01511",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01511",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01518",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01518",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "BDU:2020-01519",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01519",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01522",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01522",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01604",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01604",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01605",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01605",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01606",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01606",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01607",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01607",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01608",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01608",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01609",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01609",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01610",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01610",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01611",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01611",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01612",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-01612",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01613",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01613",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01614",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01614",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01615",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01615",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01616",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01616",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01617",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01617",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01618",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01618",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01619",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01619",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01620",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01620",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01621",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01621",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01622",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01622",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01623",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01623",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01624",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01624",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01625",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01625",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01626",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01626",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01627",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01627",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01628",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01628",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01629",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01629",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01630",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01630",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01631",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01631",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01634",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01634",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01635",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01635",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01636",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01636",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01637",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01637",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01638",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01638",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01639",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01639",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01644",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01644",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01646",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01646",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01671",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01671",
"Impact": "High",
"Public": "20191022"
},
{
"ID": "BDU:2020-01672",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01672",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01673",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01673",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01674",
"Impact": "Low",
"Public": "20191022"
},
{
"ID": "BDU:2020-01684",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01684",
"Impact": "Critical",
"Public": "20190621"
},
{
"ID": "BDU:2020-01693",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01693",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01694",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01694",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01695",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01695",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01696",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01696",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01697",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01697",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01698",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01698",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01699",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01699",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01700",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01700",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01701",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01701",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01702",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-01702",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01703",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01703",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01704",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01704",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01705",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01705",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01706",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01706",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01724",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01724",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01725",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01725",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01748",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://bdu.fstec.ru/vul/2020-01748",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "BDU:2020-01750",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01750",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01751",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01751",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01754",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01755",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01755",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01758",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01758",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01760",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01760",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01761",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01761",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01764",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01764",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01766",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01766",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01770",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01770",
"Impact": "Low",
"Public": "20190621"
},
{
"ID": "BDU:2020-01779",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01779",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01780",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01780",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01781",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01781",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01782",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01782",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01783",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01783",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01784",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01784",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01785",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-01785",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01786",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01786",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01787",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01787",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01788",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01788",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01789",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01789",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01790",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01790",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01791",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01791",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01792",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://bdu.fstec.ru/vul/2020-01792",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01793",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01793",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01798",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01798",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01799",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01799",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01800",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01800",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01802",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01802",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "BDU:2020-01803",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01803",
"Impact": "High",
"Public": "20200110"
},
{
"ID": "BDU:2020-01911",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01911",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01912",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01912",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-01914",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01914",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01915",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01915",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01916",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01916",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01917",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01917",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01918",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01918",
"Impact": "Low",
"Public": "20200323"
},
{
"ID": "BDU:2020-01919",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01919",
"Impact": "Low",
"Public": "20200323"
},
{
"ID": "BDU:2020-01961",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01961",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01962",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01962",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-01967",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01967",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01968",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01968",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-01969",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01969",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2020-02034",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-02034",
"Impact": "High",
"Public": "20200312"
},
{
"ID": "BDU:2020-02263",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02263",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-02444",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-02444",
"Impact": "Critical",
"Public": "20200415"
},
{
"ID": "BDU:2020-02857",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20, CWE-358",
"Href": "https://bdu.fstec.ru/vul/2020-02857",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "BDU:2020-03666",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03666",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03667",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-03667",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03668",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03668",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03669",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03669",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03670",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03670",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03671",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://bdu.fstec.ru/vul/2020-03671",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03674",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03675",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03675",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03715",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03715",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03716",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03716",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03717",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03717",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03718",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03718",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03719",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03719",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03720",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2020-03720",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03721",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03721",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03722",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2020-03722",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03723",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-345",
"Href": "https://bdu.fstec.ru/vul/2020-03723",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03736",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03736",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03737",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03737",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03738",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03738",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03739",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-03739",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03740",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03740",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03741",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03741",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03742",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-03742",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "BDU:2020-03743",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03743",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "BDU:2020-03744",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03744",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03745",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03745",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03746",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03746",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03747",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03747",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03748",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03748",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03749",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-03749",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03750",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03750",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03751",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03751",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-03752",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03753",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03753",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2020-03754",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03755",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03755",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03756",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03756",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03757",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03757",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03811",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03811",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03832",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03832",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03833",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03833",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03834",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03834",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03835",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03835",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03836",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03836",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03837",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03837",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03839",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03839",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03840",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03840",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03841",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03841",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03842",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03842",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03843",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03843",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03844",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03844",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03845",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://bdu.fstec.ru/vul/2020-03845",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03846",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-03846",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03847",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://bdu.fstec.ru/vul/2020-03847",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03848",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-03848",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03849",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2020-03849",
"Impact": "Critical",
"Public": "20200526"
},
{
"ID": "BDU:2021-01061",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01061",
"Impact": "High",
"Public": "20191028"
},
{
"ID": "BDU:2021-01062",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-01062",
"Impact": "High",
"Public": "20191212"
},
{
"ID": "BDU:2021-01063",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-01063",
"Impact": "High",
"Public": "20191209"
},
{
"ID": "BDU:2021-01136",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-01136",
"Impact": "Low",
"Public": "20191224"
},
{
"ID": "BDU:2021-03818",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2021-03818",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2021-03846",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2021-03846",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "BDU:2021-04927",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-04927",
"Impact": "High",
"Public": "20200331"
},
{
"ID": "BDU:2021-04937",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04937",
"Impact": "High",
"Public": "20200407"
},
{
"ID": "BDU:2021-06414",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-06414",
"Impact": "Low",
"Public": "20200413"
}
],
"CVEs": [
{
"ID": "CVE-2019-13659",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13659",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13660",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13660",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13661",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13661",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13662",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13662",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13663",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13663",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13664",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13664",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13665",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13665",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13666",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13666",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13667",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13667",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13668",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13668",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13669",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13669",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13670",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13670",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13671",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13671",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13673",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13673",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13674",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13674",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13675",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13675",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13676",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13676",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13677",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13677",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13678",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13678",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13679",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13679",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13680",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13680",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13681",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-732",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13681",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13682",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13682",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13683",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-755",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13683",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13685",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13685",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13686",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13686",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13687",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13687",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13688",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13691",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13691",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13692",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13692",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13693",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13693",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13694",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13694",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13695",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13695",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13696",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13696",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13697",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13697",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13699",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13699",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13700",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13700",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13701",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13701",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13702",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13702",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13703",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13703",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13704",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13704",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13705",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13706",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13706",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13707",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13707",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13708",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13708",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13709",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13709",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13710",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13710",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13711",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13711",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13713",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13713",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13714",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13715",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-290",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13715",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13716",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13716",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13717",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13717",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13718",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13718",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13719",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-922",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13719",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13720",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13720",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13721",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13721",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13723",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13723",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13724",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13724",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-13725",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13726",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13727",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13728",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13729",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13730",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13732",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13734",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13735",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13736",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13737",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13738",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13739",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13740",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13741",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13742",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13743",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13744",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13745",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13746",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13747",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13748",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13749",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13750",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13751",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13753",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13755",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13756",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13757",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13758",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13759",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13761",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13762",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13763",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13765",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13765",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-13766",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13766",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-13767",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13767",
"Impact": "High",
"Public": "20200110"
},
{
"ID": "CVE-2019-15903",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15903",
"Impact": "High",
"Public": "20190904"
},
{
"ID": "CVE-2019-18197",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
"Impact": "High",
"Public": "20191018"
},
{
"ID": "CVE-2019-19923",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19925",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-434",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925",
"Impact": "High",
"Public": "20191224"
},
{
"ID": "CVE-2019-19926",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926",
"Impact": "High",
"Public": "20191223"
},
{
"ID": "CVE-2019-5867",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5867",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5868",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5868",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5869",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5869",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5870",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5870",
"Impact": "Critical",
"Public": "20191125"
},
{
"ID": "CVE-2019-5871",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5871",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5872",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5872",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5873",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5873",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5874",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5874",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5875",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5875",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5876",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5876",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5877",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5877",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5878",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5878",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5879",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5879",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-5880",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5880",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2019-5881",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5881",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "CVE-2020-10531",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-10531",
"Impact": "High",
"Public": "20200312"
},
{
"ID": "CVE-2020-6377",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6377",
"Impact": "High",
"Public": "20200110"
},
{
"ID": "CVE-2020-6378",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6378",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6379",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6379",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6380",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6380",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6381",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6381",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6382",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6382",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6383",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6383",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6384",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6384",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6385",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6385",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6386",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6386",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6387",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6387",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6388",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6388",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6389",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6389",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6390",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6390",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6391",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6391",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6392",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6392",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6393",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6393",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6394",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6395",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6395",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6396",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6396",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6397",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6397",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6398",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6398",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6399",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6399",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6400",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6400",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6401",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6401",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6402",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6402",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6403",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6403",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6404",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6404",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6405",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6405",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6406",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6406",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6407",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6407",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6408",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6408",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6409",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6409",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6410",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6410",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6411",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6411",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6412",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6412",
"Impact": "Low",
"Public": "20200211"
},
{
"ID": "CVE-2020-6413",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6413",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6414",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6414",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6415",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6415",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6416",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6416",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6417",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6417",
"Impact": "High",
"Public": "20200211"
},
{
"ID": "CVE-2020-6418",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6418",
"Impact": "High",
"Public": "20200227"
},
{
"ID": "CVE-2020-6419",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6419",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "CVE-2020-6420",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6420",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6422",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6422",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6423",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6423",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6424",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6424",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6425",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6425",
"Impact": "Low",
"Public": "20200323"
},
{
"ID": "CVE-2020-6426",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6426",
"Impact": "Low",
"Public": "20200323"
},
{
"ID": "CVE-2020-6427",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6427",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6428",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6428",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6429",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6429",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6430",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6430",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6431",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6431",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6432",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6432",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6433",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6433",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6434",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6434",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6435",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6435",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6436",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6436",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6437",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6437",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6438",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-209",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6438",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6439",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6439",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6440",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6440",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6441",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6441",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6442",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6442",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6443",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-345",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6443",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6444",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6444",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6445",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6445",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6446",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6446",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6447",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6447",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6448",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6448",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6449",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6449",
"Impact": "High",
"Public": "20200323"
},
{
"ID": "CVE-2020-6450",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6450",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6451",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6451",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6452",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6452",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6453",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6453",
"Impact": "High",
"Public": "20200603"
},
{
"ID": "CVE-2020-6454",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6454",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6455",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6455",
"Impact": "High",
"Public": "20200413"
},
{
"ID": "CVE-2020-6456",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6456",
"Impact": "Low",
"Public": "20200413"
},
{
"ID": "CVE-2020-6457",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6457",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6458",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6459",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6460",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6461",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6462",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6463",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6464",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6465",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6465",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6466",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6466",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6467",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6467",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6468",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6468",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6469",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6469",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6470",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6470",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6471",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6471",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6472",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6472",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6473",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6473",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6474",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6474",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6475",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6475",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6476",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6476",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6477",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-59",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6477",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6478",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6478",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6479",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6479",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6480",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6480",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6481",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6481",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6482",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6482",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6483",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6483",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6484",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6484",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6485",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6485",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6486",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6486",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6487",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6487",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6488",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6488",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6489",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6489",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6490",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6490",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6491",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6491",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6499",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6499",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6500",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6500",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6501",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6501",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6502",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6502",
"Impact": "Low",
"Public": "20200603"
},
{
"ID": "CVE-2020-6572",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6572",
"Impact": "High",
"Public": "20210114"
},
{
"ID": "CVE-2020-6831",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
"Impact": "Critical",
"Public": "20200526"
}
],
"Bugzilla": [
{
"ID": "36815",
"Href": "https://bugzilla.altlinux.org/36815",
"Data": "Некорректно отображается пункт программы в меню xfce: название отсутствует"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202441001",
"Comment": "chromium-gost is earlier than 0:83.0.4103.61-alt2.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202441002",
"Comment": "chromium-gost-gnome is earlier than 0:83.0.4103.61-alt2.M90P.1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202441003",
"Comment": "chromium-gost-kde is earlier than 0:83.0.4103.61-alt2.M90P.1"
}
]
}
]
}
}
]
}